The ABC’s of Cybersecurity: U-Z
Cybersecurity can seem an intimidating undertaking; requiring in-depth knowledge of computers and coding, along with a whole new vocabulary to-boot. In this blog series, The ABC’s of Cyber Security, we’ll give you the base-knowledge you need to feel confident in approaching the subject of cyber security. In our age of constant connection, and increasingly storing our valuable information online, it’s important for everyone- even those with non-technical backgrounds- to build an awareness of cyberattacks and have an idea of how to prevent, report, track and mitigate these attacks. In case you’ve just stumbled upon this series, you can find A-E here, but without further ado, here are our Cyber Security Vocabulary Basics U-Z:
An update becomes available when a user or developer finds a flaw in a software and fixes the code to prevent the problem. Installing updates ensures said precaution coding is added to your software.
When a hacker gives an ID number to a page address allowing them to track the user’s web behavior.
USB stands for Universal Serial Bus which is a hardware used for data storage that is supported by most of the major operating systems.
A virus is a piece of code which has the capabilities to copy itself and carry out malicious actions such as destroying data.
Virtual Private Networks, or VPNS, are exactly as the sound: two computers which can connect securely over the internet.
A process conducted by a program which identifies security vulnerabilities in a system/network automatically.
White Hat Hacker
A security specialist who performs penetration tests and network scans to expose system/network vulnerabilities before that hackers find them.
White Box Testing
Testing the internal structure of a program, or the program source coding.
A worm acts similarly to a virus: self-replicating, typically malicious code. However, worms are also self-distributing so they do not require a host program or human to propagate.
Or Cross-site Scripting attacks, are a malicious injection which are injected into usually trusted websites.
An XPath injection uses a query to gather information about how XML data is used to authenticate a user, allowing them to find access.
An unknown exploit which exposes a vulnerability in software or hardware, unwittingly to the owner/vendor/user.
Typically, a home-based PC exploited by a remote hacker set up to forward transmittions/communications to other computers on the internet.
Zeus Trojan (Zbot)
A particular Trojan built to run on various Microsoft Windows versions, typically used to steal banking information.
Many of these terms make instinctual sense with your, already vast, knowledge of the English language. Terminology in cyber security is simply explaining virtual actions, events and objects in a physical way. As you become more accustomed to the various ways in which we discuss networks, systems and cyberattacks- you will find yourself understanding the ABC’s of cybersecurity and empowered to learn how it all works together.