The ABC’s of Cybersecurity: F- J

The ABC’s of Cybersecurity: F- J

Cybersecurity can seem an intimidating undertaking requiring in-depth knowledge of computers and coding along with a whole new vocabulary to-boot. In this blog series, The ABC’s of Cyber Security, we’ll give you the base-knowledge you need to feel confident in approaching the subject of cyber security. In our age of constant connection, and increasingly storing our valuable information online, it’s important for everyone- even those with non-technical backgrounds- to build an awareness of cyberattacks and have an idea of how to prevent, report, track and mitigate these attacks. You can find A-E here, but without further ado, here are our Cyber Security Vocabulary Basics F-J:




Firewalls monitor incoming and outgoing traffic between a secure, internal network and an outside network (i.e. the internet).


Your digital footprint are the traces you leave behind, when using the internet. Footprinting means that you are not covering your tracks, leaving a trail, for hackers to follow, to your important- and vulnerable- information.


Computer forensics are means of using techniques of investigation and analysis to uncover evidence from computing devices in accordance with building a case for the Federal Court System


Gigabyte (GB)

Gigabytes are how we measure digital information. This unit will have varying value depending on the context.

Going Dark

Coming from military jargon, going dark is the sudden termination of communication. It can also apply to communication which has seemed to stop, but has actually just moved to a private channel. You can get more information about going dark here.

Gray Hat Hacking

Gray Hat Hackers are hackers with no malicious intent. They exploit security weaknesses to bring the vulnerability’s attention to the owner of the network, computer system or product.



Hacking is an elusive term, for hacking itself implies a number of possible actions and intentions. Generally, a hacker is a skilled programmer, coder and proficient in computer operating systems and networks.


The process of mapping large data items to a fixed-length string. Hashing condenses the mapping, making the string shorter. The string is then, often, used as the original data’s identification/fingerprint.


In whole, heuristics are the process of gaining experiential knowledge. In our cyber world, heuristics refers to software that filters messages which likely contain a virus or other malicious software.


Identity theft

When someone acquires private, identifying information for personal use. This information is often gained through social engineering and spyware to gather information such as social security numbers and bank account numbers to use, typically, for financial gain.


An interrupt implies any time a software or hardware is directed to another process which it was not performing in that moment. For instance: a hard disk is being read, a service error is detected, or if a process is acting slow, a CPU (central processing unit) will perform an interrupt to switch to a speedier process.

IP Address

Your computer’s IP address is an identifying string of numbers which allows your computer to communicate with other computers over the internet. It also allows for tracking online activity.



One of the most widely-used, interpreted programming languages.


Just as described in Webster’s dictionary (“irregular, random movement”) a jitter indicates a deviation or displacement of high-frequency, digital signal pulses.

Jump Bag

As in any field, your jump bag contains everything you need to get your job done- at a moment’s notice. As an IT/security professional your jump bag will include: your laptop, chargers, electrical tape, and anything else your job may require.

Many of these terms make instinctual sense with your, already vast, knowledge of the English language. Terminology in cyber security is simply explaining virtual actions, events and objects in a physical way. As you become more accustomed to the various ways in which we discuss networks, systems and cyberattacks- you will find yourself understanding the ABC’s of cyber security and empowered to learn how it all works together.

CyberTraining 365 is a comprehensive library of cybersecurity classes which enable practical application while allowing the student to control their learning pace and absorption rate. With interactive labs and a responsive community, CyberTraining 365 provides solutions for a variety of learning styles while covering an array of imperative, relevant and current topics and certifications surrounding cybersecurity. Our LMS is also ideal for training use by enterprise, government and educational organizations. 

One thought on “The ABC’s of Cybersecurity: F- J


    you are actually a excellent webmaster. The site loading
    pace is incredible. It kind of feels that you’re doing any unique trick.
    Also, The contents are masterwork. you have performed a
    magnificent activity in this topic!


Leave a Reply

Your email address will not be published. Required fields are marked *