There is no doubt that cyber security is becoming an increasingly important part of our daily lives. As our society shifts to a more digital era, many things are done digitally, such as online forms, banking, schooling, and remote work. Consequently, it is imperative that we protect our information and are familiar with different types of cyber security threats.
We understand that cybersecurity can be intimidating, especially if you aren't familiar with IT or security. Cyber security remains one of the hardest fields to understand and remain current with due to all the tools, technologies, methods, and attacks appearing.
Learn the basics of cyber security with these 20 key terms.
Let's dive in!
Antivirus – A software that scans a device or network to detect, block and remove security threats such as viruses, malware and ransomware.
Breach – A breach is when information is being accessed without authorization, often by a hacker. It results in unauthorized access to computer data, applications, networks or devices.
Bot/Botnet – A network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker. Botnets can be used to steal data, send spam, perform DoS attacks, and allow the attacker to access the device and it’s connection.
Clickjacking – A hacking attack that tricks web users into clicking on an unintended link or button that is often disguised as a harmless element.
Cloud – Computing resources that allow you to access your files and services from anywhere in the world. This is made possible by a collection of computers with large storage capabilities that remotely serve requests.
Data Loss Prevention (DLP) – Any security measures related to detecting and preventing data loss.
DDoS (Distributed Denial of Service) - A form of cyber attack that involves multiple connected online devices, collectively known as a botnet, which are used to overwhelm a target website with fake traffic, rendering it unusable.
Encryption - A way of disguising data so that only authorized parties can understand that information. This is done to prevent theft by ensuring the data can only be accessed with a key.
Firewall – A defensive technology designed to prevent unauthorized access to a network. It inspects incoming and outgoing traffic. Firewalls can be hardware or software-based.
IP Address – An IP Address “Internet Protocol” is an address identifying the connection between a computer and its network provider.
Malware – An intrusive software specifically designed to disrupt, damage or gain unauthorized access to a computer system. Common forms of Malware can include: viruses, trojans, worms and ransomware.
Phishing – A technique used by hackers to acquire sensitive information, such as bank account numbers. This is often done by designing hand-crafted emails, tricking the user into believing its from a legitimate business or reputable source to reveal confidential personal and corporate information.
Ransomware – A type of malware that deliberately prevents access to your data or computer system. It will encrypt these files – holding your information hostage until a ransom fee is paid to gain access to the decryption key.
Rootkit – A type of malware used by cybercriminals used to gain control over a computer or network. Rootkits often appear as a single piece of software but can be made up of a collection of tools that allow hackers administrator level control over the targeted device.
Social Engineering – A technique used to manipulate and deceive people into revealing sensitive or private information like passwords and banking information. Criminals impersonate themselves as someone trustworthy and use the seemingly legitimate pretext to make a user share data.
Spyware – A type of malware that monitors and spies on user activity without their knowledge or permission. It can steal sensitive information like bank details and passwords.
Trojan Horse – A type of malicious code that allows hackers to gain remote access and take control of your computer through a “back door”. It is designed to damage, disrupt, or steal from your data or network. Often these attacks are disguised in email attachments.
Virus – A type of malware that can infect and harm a file, system or a network. The virus is usually attached to a harmlessly looking file or app, which to the user will appear to be valid and safe. Some viruses can replicate themselves.
VPN (Virtual Private Network) – A service that protect your internet connection and privacy online. The VPN service creates an encrypted “tunnel” over the internet. This secures the data traveling between you and your destination.
Worm – A piece of malware that can replicate itself to spread from one infected device to other connected computers.
We've just scratched the surface in terms of cyber security, but that should get you started. Get the information and tools you need to protect your business now - knowledge is power! Subscribe to our mailing list below to receive future tips and advice from NextGen Automation
For over 26 years we have provided leading edge print and IT services for offices in Western Canada.
For over 20 years we have provided leading edge products and solutions for offices in Western Canada.