The ABC’s of Cybersecurity U-Z

The ABC’s of Cybersecurity: U-Z

Cybersecurity can seem an intimidating undertaking; requiring in-depth knowledge of computers and coding, along with a whole new vocabulary to-boot. In this blog series, The ABC’s of Cyber Security, we’ll give you the base-knowledge you need to feel confident in approaching the subject of cyber security. In our age of constant connection, and increasingly storing our valuable information online, it’s important for everyone- even those with non-technical backgrounds- to build an awareness of cyberattacks and have an idea of how to prevent, report, track and mitigate these attacks. In case you’ve just stumbled upon this series, you can find A-E here, but without further ado, here are our Cyber Security Vocabulary Basics U-Z:




An update becomes available when a user or developer finds a flaw in a software and fixes the code to prevent the problem. Installing updates ensures said precaution coding is added to your software.

URL Poisoning

When a hacker gives an ID number to a page address allowing them to track the user’s web behavior.


USB stands for Universal Serial Bus which is a hardware used for data storage that is supported by most of the major operating systems.



A virus is a piece of code which has the capabilities to copy itself and carry out malicious actions such as destroying data.


Virtual Private Networks, or VPNS, are exactly as the sound: two computers which can connect securely over the internet.

Vulnerability Scanning

A process conducted by a program which identifies security vulnerabilities in a system/network automatically.


White Hat Hacker

A security specialist who performs penetration tests and network scans to expose system/network vulnerabilities before that hackers find them.

White Box Testing

Testing the internal structure of a program, or the program source coding.


A worm acts similarly to a virus: self-replicating, typically malicious code. However, worms are also self-distributing so they do not require a host program or human to propagate.


XSS Attacks

Or Cross-site Scripting attacks, are a malicious injection which are injected into usually trusted websites.

XPath injection

An XPath injection uses a query to gather information about how XML data is used to authenticate a user, allowing them to find access.


Zero-day exploit

An unknown exploit which exposes a vulnerability in software or hardware, unwittingly to the owner/vendor/user.

Zombie (bot)

Typically, a home-based PC exploited by a remote hacker set up to forward transmittions/communications to other computers on the internet.

Zeus Trojan (Zbot)

A particular Trojan built to run on various Microsoft Windows versions, typically used to steal banking information.

Many of these terms make instinctual sense with your, already vast, knowledge of the English language. Terminology in cyber security is simply explaining virtual actions, events and objects in a physical way. As you become more accustomed to the various ways in which we discuss networks, systems and cyberattacks- you will find yourself understanding the ABC’s of cybersecurity and empowered to learn how it all works together.

CyberTraining 365 is an online academy that offers nearly 1,000 hours of relevant and cutting edge cyber security training. Our training provides the most in demand industry certification prep courses including EC-Council, CompTIA, (ISC)2 and Cisco; all taught by leading cyber security experts. All of our offerings are aligned with the national initiative for cyber security education (NICE) and ensure the most up-to-date information for this constantly shifting field. With engaging content in a scenario-based format, CyberTraining 365 uses bite-sized micro-learning methodology ensures learners are not overwhelmed with information. On Demand LMS platform has white-label capabilities ideal for internal training purposes.

Leave a Reply

Your email address will not be published. Required fields are marked *