The ABC’s of Cybersecurity: P- T

The ABC’s of Cybersecurity: P-T

Cybersecurity can seem an intimidating undertaking requiring in-depth knowledge of computers and coding along with a whole new vocabulary to-boot. In this blog series, The ABC’s of Cyber Security, we’ll give you the base-knowledge you need to feel confident in approaching the subject of cyber security. In our age of constant connection, and increasingly storing our valuable information online, it’s important for everyone- even those with non-technical backgrounds- to build an awareness of cyberattacks and have an idea of how to prevent, report, track and mitigate these attacks. You can find A-E here, but without further ado, here are our Cyber Security Vocabulary Basics P-T:

cybersecurity p-t


Password Cracker

Password cracking is a method of identifying an unknown or forgotten password using a password using either brute-force or dictionary searches. Password cracking is most used by hackers in an attempt to gain unauthorized access to a network or system. (This is why you need a complex password.)


A patch is a software designed to fix (or patch) security vulnerabilities.

Penetration Testing

Penetration testing is a means of discovering vulnerabilities in a system by simulating an attack on it. This allows for network owners to patch weaknesses before they are exploited.


Quick Response Code (QR code)

A barcode consisting of a matrix of dots which can be read with a QR scanner or built-in smartphone camera.


Attempt to retrieve information from a computer system/software program, such as a search engine query.


A computer program can only process so much at once. When it is sent multiple jobs it adds them to a list (or queue) as a way to order its tasks.



A specific type of malware which requires a user to pay a ransom in order to regain control/access.

Remote Access Trojan (RAT)

A RAT is a Trojan malware which has been designed to allow an attacker remote access to a system/network. Making it one of the most apropos acronyms around.

Reverse Engineering

Reverse engineering is a means of analyzing the functions of a piece of software/hardware so that the behavior can be understood. In cybersecurity, reverse engineering is commonly used to create defense mechanisms against malware.


Session Hijacking

When an attacker captures a valid session ID so they can gain unauthorized access to a web server.

Social Engineering

Social engineering covers a broad range of ways in which hackers manipulate users to gain necessary information they can use to access a server/network unauthorized. This could be in the form of fake social media profiles or phishing emails. To learn about all the signs of social engineering, check out our Data Security & Privacy Compliance training.


Spyware is a form of malware which covertly collects information and monitors a user’s activities.


Targeted Attack

Just what it sounds like, a targeted attack is an attack aimed at a specific individual or organization. Targeted attacks most often utilize advanced persistent threat attacks (APT) and are most commonly seen in industrial espionage, business disruption and hacktivist political statements.

Threat Modeling

Thread modeling is a process of determining whether a threat is a malicious or incidental threat as well as where the most effort should be applied to keep a system/network secure.


Named after the mythological Trojan horse (from Greek mythology) a Trojan presents itself as a benign, or harmless, program, but is actually a form of malware.

Many of these terms make instinctual sense with your, already vast, knowledge of the English language. Terminology in cyber security is simply explaining virtual actions, events and objects in a physical way. As you become more accustomed to the various ways in which we discuss networks, systems and cyberattacks- you will find yourself understanding the ABC’s of cybersecurity and empowered to learn how it all works together.

CyberTraining 365 is a comprehensive library of cybersecurity classes which enable practical application while allowing the student to control their learning pace and absorption rate. With interactive labs and a responsive community, CyberTraining 365 provides solutions for a variety of learning styles while covering an array of imperative, relevant and current topics and certifications surrounding cybersecurity. Our LMS is also ideal for training use by enterprise, government and educational organizations.

Leave a Reply

Your email address will not be published. Required fields are marked *