20 Cyber Security Terms You Should Know

NextGen Automation • May 27, 2022

Cyber Security 101: Basic Terminology You Should Know. 

There is no doubt that cyber security is becoming an increasingly important part of our daily lives. As our society shifts to a more digital era, many things are done digitally, such as online forms, banking, schooling, and remote work. Consequently, it is imperative that we protect our information and are familiar with different types of cyber security threats.


We understand that cybersecurity can be intimidating, especially if you aren't familiar with IT or security. Cyber security remains one of the hardest fields to understand and remain current with due to all the tools, technologies, methods, and attacks appearing.


Learn the basics of cyber security with these 20 key terms.


Let's dive in!


Antivirus – A software that scans a device or network to detect, block and remove security threats such as viruses, malware and ransomware.


Breach – A breach is when information is being accessed without authorization, often by a hacker. It results in unauthorized access to computer data, applications, networks or devices.  


Bot/Botnet – A network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker. Botnets can be used to steal data, send spam, perform DoS attacks, and allow the attacker to access the device and it’s connection.


Clickjacking – A hacking attack that tricks web users into clicking on an unintended link or button that is often disguised as a harmless element.


Cloud – Computing resources that allow you to access your files and services from anywhere in the world. This is made possible by a collection of computers with large storage capabilities that remotely serve requests.  


Data Loss Prevention (DLP) – Any security measures related to detecting and preventing data loss.


DDoS (Distributed Denial of Service) -  A form of cyber attack that involves multiple connected online devices, collectively known as a botnet, which are used to overwhelm a target website with fake traffic, rendering it unusable.


Encryption - A way of disguising data so that only authorized parties can understand that information. This is done to prevent theft by ensuring the data can only be accessed with a key.


Firewall – A defensive technology designed to prevent unauthorized access to a network. It inspects incoming and outgoing traffic. Firewalls can be hardware or software-based.


IP Address – An IP Address “Internet Protocol” is an address identifying the connection between a computer and its network provider.


Malware – An intrusive software specifically designed to disrupt, damage or gain unauthorized access to a computer system. Common forms of Malware can include: viruses, trojans, worms and ransomware.


Phishing – A technique used by hackers to acquire sensitive information, such as bank account numbers. This is often done by designing hand-crafted emails, tricking the user into believing its from a legitimate business or reputable source to reveal confidential personal and corporate information.  


Ransomware – A type of malware that deliberately prevents access to your data or computer system. It will encrypt these files – holding your information hostage until a ransom fee is paid to gain access to the decryption key.


Rootkit – A type of malware used by cybercriminals used to gain control over a computer or network. Rootkits often appear as a single piece of software but can be made up of a collection of tools that allow hackers administrator level control over the targeted device.


Social Engineering – A technique used to manipulate and deceive people into revealing sensitive or private information like passwords and banking information. Criminals impersonate themselves as someone trustworthy and use the seemingly legitimate pretext to make a user share data.


Spyware – A type of malware that monitors and spies on user activity without their knowledge or permission. It can steal sensitive information like bank details and passwords.


Trojan Horse – A type of malicious code that allows hackers to gain remote access and take control of your computer through a “back door”. It is designed to damage, disrupt, or steal from your data or network. Often these attacks are disguised in email attachments.


Virus –  A type of malware that can infect and harm a file, system or a network. The virus is usually attached to a harmlessly looking file or app, which to the user will appear to be valid and safe. Some viruses can replicate themselves.  


VPN (Virtual Private Network) – A service that protect your internet connection and privacy online. The VPN service creates an encrypted “tunnel” over the internet. This secures the data traveling between you and your destination.


Worm – A piece of malware that can replicate itself to spread from one infected device to other connected computers.


We've just scratched the surface in terms of cyber security, but that should get you started. Get the information and tools you need to protect your business now - knowledge is power! Subscribe to our mailing list below to receive future tips and advice from NextGen Automation


Newsletter Signup

Industry News

By NextGen Automation November 4, 2024
NextGen Automation announces the acquisition of Com Pro Managed IT Services, expanding its expertise in Managed IT, Office Equipment, Software Integration, and Print Solutions across Western Canada. Learn how this strategic partnership enhances our offerings and supports our vision of becoming your all-in-one technology partner for streamlined business operations and improved productivity.
By NextGen Automation August 20, 2024
Is Your Cyber Insurance Up to the Task? A Deep Dive into Cybersecurity Coverage In today’s digital landscape, cyber threats are constantly evolving, and the potential financial impact on your business is more significant than ever. While you might have comprehensive business insurance, are you sure it covers the unique and growing risks associated with cybersecurity? If not, you could be leaving your business vulnerable to significant losses in the event of a cyberattack.  In this post, we take a deep dive into the world of cyber insurance, providing you with the insights you need to ensure your coverage is up to the task. Here’s what you need to know.
Show More
Share by: