RedFox RedFox
  • OUR SOLUTIONS
  • BLOG

Cyber Security Glossary

Unsure of some of the terms used in cybersecurity? You’ve come to the right place.

Read our glossary of helpful terms and their definitions.

Cybersecurity Terms and Definitions

We compiled a glossary of cybersecurity common terms as a free and constantly updated resource in order to make security accessible to everyone. We know security language can be intimidating, so if you’re looking for clear cybersecurity definitions and terminology, look no further. 
Below you’ll find the terms often used in discussions of cyber security, briefly defined. 

Antivirus or Anti-malware

For the most part, “antivirus” and “anti-malware” mean the same thing. They both refer to software designed to detect, protect against, and remove malicious software. Antivirus software protects against more than viruses–it just uses a slightly antiquated name to describe what it does. Anti-malware just uses a more modern name that encompasses all kinds of malicious software, including viruses.

Malware

Malware, or malicious software, is a blanket term for any kind of software with malicious intent. Most online threats are some form of malware. Malware seeks to invade, damage, or disable computers, networks, tablets, and mobile devices, often by taking partial control over a device’s operations. Like the human flu, it interferes with normal functioning.

Ransomware

Ransomware or ransom malware, is an emerging type of malware that prevents users from accessing their device or personal files and demands an anonymous ransom payment in order to regain access.

Adware

Adware is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your behavior online so it can target you with specific ads. Typically, it uses an underhanded method to either disguise itself as legitimate, or piggyback on another program to trick you into installing it on your PC, tablet, or mobile device.

Spyware

Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information like your usernames and passwords, bank details, payment information, and the emails you send and receive.

Trojan

Trojans are programs that claim to perform one function but actually do another, typically malicious. They use deception and social engineering to trick unsuspecting users into running seemingly benign computer programs that hide malicious ulterior motives. Trojans can take the form of attachments, downloads, and fake videos.

Computer virus

A computer virus is malware attached to another program (such as a document), which can replicate and spread after an initial execution on a target system where human interaction is required. Many viruses are harmful and can destroy data and slow down system resources. Today, cybercriminals aren’t creating new viruses, instead they are focusing their efforts on more sophisticated and lucrative threats.

Identity theft

Identity theft occurs when a criminal obtains or uses the personal information; e.g. name, login, Social Security number, date of birth, etc., of someone else to assume their identity or access their accounts for the purpose of committing fraud, receiving benefits, or gaining financially in some way.

Hacker

Hacking is the process of identifying and exploiting weakness in digital devices, such as computers, smartphones, tablets, and even entire networks to gain unauthorized access to data and system resources. Hackers are motivated by personal gain, to make a statement, or just because they can.

Phishing

Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication. Typically carried out by email spoofing, instant messaging, text messaging or phone call.

Spoofing

Spoofing is when a cybercriminal disguises himself as another person, business, or entity in order to gain the victim's confidence and commit malicious acts like get access to a system, steal data, or spread malware.

Cyberattack

A cyberattack is an assault launched by cybercriminals using one or more computers against a single or multiple computers, smartphones or networks. A cyberattack can maliciously disable devices, steal data, or use a breached device as a launch point for other attacks. Cybercriminals use a variety of methods to launch a cyberattack, including malware, phishing, ransomware etc.

Data breach

A data breach is the release of confidential, private, or otherwise sensitive information to an unauthorized person or into an unsecured environment. A data breach can occur accidentally, or as the result of a cyberattack.

DDoS

A DDoS attack is an attempt to make an online service unavailable by overwhelming it with false traffic from multiple sources.This may be combined with an extortion threat of a more devastating attack unless the company pays a cryptocurrency ransom.

Spam

Spam is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. Most of the time, spamming is commercial in nature, and though the spam is bothersome, it isn’t necessarily malicious or fraudulent (though sometimes it can be a serious threat).

Pharming

Pharming is a kind of cyberattack in which criminals redirect internet users trying to reach a specific website to a different, fake site for the purpose of stealing usernames, passwords, social security numbers, financial data, and other personal information.

DOWNLOAD NOW

IPHONE GET REDFOX MOBILE SECURITY & ANTIVIRUS ON GOOGLE PLAY

IPHONE GET REDFOX ANTI-PHISHING & SCAM DETECTOR ON GOOGLE PLAY

(c) RedFox Cyber Security App by NTrigo

Facebook Twitter