Download - 10 Cybersecurity Terms You Need To Know
With high profile hacking attacks making news worldwide, keeping tabs on the latest cybersecurity trends is an important task for SMEs doing business over the Web – which, in this day and age, is just about every company. To help you stay abreast of developments in the field, we’ve illustrated 10 of the most commonly used cybersecurity terms.
10CYBERSECURITY TERMS YOU NEED TO KNOW
Malware can refer to a variety of different types of malicious programs, including adware, Trojans, spyware,
ransomware, and more.
Keylogger software of this type functions by recording keystrokes and internet browsing data. This is then transmitted to a 3rd party who may
use it for nefarious purposes.
Phishing occurs when cyber criminals attempt
to fool people into providing vital information, such as passwords and account numbers, by sending them emails
that appear to come from a legitimate source.
01
03
05
02
04
Malware
Keylogger
Phishing
Trojan
Penetration testing
Trojans are usually distributed via emails, or downloads. When
the software is installed it provides entry for malicious
actors who steal your data or impede
the functioning of your computer.
Penetration testing involves engaging an outside IT security
firm or a “white hat” hacker to see if
they can gain entry to your system. To
be performed on an annual basis.
333 Latimer Rd, London W10 6RA | 020 3031 9500
Anti-virus software can protect your
system from known threats. However, a particularly nasty form of malware involves zero-day exploits, or an exploit
which has not been used previously.
Adware infections result in the propagation of unwanted advertisements on your computer. These often consist of pop-up ads that appear
over and over until the software is removed.
A distributed denial of service occurs when a
server is overwhelmed with access requests and becomes unable to function properly. Attacks of this type are often used for
political purposes or by hackers.
06
08
10
07
09
Zero-day exploit
Adware
DDoS
Encryption
Social Engineering
Data encryption makes your data invulnerable to being deciphered by anyone without
the encryption key. Be cautious when sending sensitive
data that isn’t encrypted over the
Internet.
Phishing is one form of social engineering; another is calling a help desk or other company resource whilst pretending to be someone authorised to gain access to valuable information or resources.