The ABC’s of Cybersecurity: K- O

The ABC’s of Cybersecurity: K-O

Cybersecurity can seem an intimidating undertaking requiring in-depth knowledge of computers and coding along with a whole new vocabulary to-boot. In this blog series, The ABC’s of Cyber Security, we’ll give you the base-knowledge you need to feel confident in approaching the subject of cyber security. In our age of constant connection, and increasingly storing our valuable information online, it’s important for everyone- even those with non-technical backgrounds- to build an awareness of cyberattacks and have an idea of how to prevent, report, track and mitigate these attacks. You can find A-E here, but without further ado, here are our Cyber Security Vocabulary Basics K- O:




There are two different uses for the term key. 1) A variable value, applied using an algorithm, to produce encrypted text or decrypt encrypted text. 2) A field selected for sorting.

Key Logger

A Key Logger is a useful tool for crackers allowing them to obtain passwords by logging which keys have been pressed on a keyboard. This gives hackers the ability to bypass other security measures.

Keying Material

Any form of authentication information whether physical or electronic.


Least Privilege

Granting entities only the minimal requirements/resources to access what they need to perform their official duties.

Licensed Penetration Tester (LPT)

A licensed professional who performs penetration testing on corporate networks to find vulnerabilities which need patching. Take our EC-Council courses to become a LPT yourself!

Link Encryption

Encryption of data along a communications path, including routing data.



A malicious software designed to perform unauthorized processes disrupting, damaging, intruding a system/computer, usually covertly.


The processes of lessening the severity of a cyberattack.

Man-in-the-Middle (MitM) Attack

An attack involving a hacker intercepting communication between two devices with the ability to not only capture, but manipulate, sensitive information- in real-time.



An information system with interconnected components such as: routers, cabling, key distribution, etc.

Network Sniffing

Acting as both a review and target identification/analysis technique, network sniffing is a way of passively monitoring network communication.

Network Vulnerability Scanning

The inspection of potential exploits on a network, in order to identify and security vulnerabilities.


Off-line Attack

This attack entails a hacker obtaining data to be analyzed on a system of their own choosing.

Open Storage

Consists of any information or data being stored outside of approved containers.

Operational Controls

Security controls implemented by people rather than systems.

Many of these terms make instinctual sense with your, already vast, knowledge of the English language. Terminology in cyber security is simply explaining virtual actions, events and objects in a physical way. As you become more accustomed to the various ways in which we discuss networks, systems and cyberattacks- you will find yourself understanding the ABC’s of cybersecurity and empowered to learn how it all works together.

CyberTraining 365 is a comprehensive library of cybersecurity classes which enable practical application while allowing the student to control their learning pace and absorption rate. With interactive labs and a responsive community, CyberTraining 365 provides solutions for a variety of learning styles while covering an array of imperative, relevant and current topics and certifications surrounding cybersecurity. Our LMS is also ideal for training use by enterprise, government and educational organizations.

One thought on “The ABC’s of Cybersecurity: K- O

  1. Industrial PC

    Cyber security is something that gets massively overlooked. I work in cyber security and the amount of new clients we get simply because the client has ignored their online or digital security. Then we have to clean up and make it secure again. It is a full department within each company that gets pushed to the side, and for me, it is one of the most important.

    Great article!


Leave a Reply

Your email address will not be published. Required fields are marked *