This website uses cookies to ensure you get the best experience on our website.
Learn more
ACCEPT
IT Specialist Newsletter
|
IT Specialist Cybersecurity Group
LinkedIn
Twitter
Search
Blogs
Media
Cybersecurity Threats
Cybersecurity Defenses
Research
Glossaries
Cybersecurity Glossary
Information Technology Glossary
Forums
Events
About Us
Newsletter
Contact Us
Blogs
Media
Cybersecurity Threats
Cybersecurity Defenses
Research
Glossaries
Cybersecurity Glossary
Information Technology Glossary
Forums
Events
About Us
Newsletter
Contact Us
My Account
My Account
Technology Glossaries
cybersecurity & information technology Terms
Cybersecurity Terms & Nomenclature
Words to Know
Trending Terminology in Cybersecurity
Search
FIDO
Fast Identity Online
is a technical specification for online user identity authentication.
MFA
Multi-factor Authentication is a verification method requiring two or more elements to gain access to a system or computer.
Zero-Day
Zero-day is a software vulnerability that is unknown to its developer or vendor and prone to attack by hackers.
Bot/Botnet
A malicious software script designed by hackers to take control of a remote computer(s).
Leading Cybersecurity Threat Terms
DDOS
An Acronym or shorthand for
Distributed Denial of Service
attack in which end users are denied access to a server or network due to a flood in traffic or packets.
Advanced Persistent Threat
A state-sponsored group of hackers or "actors" operating in total stealth and largely motivated by politics or economic gain. Their weapon of choice is
malware
.
Backdoor
A method of illegal entry into a system or computer using compromised remote access protocols. A
Backdoor
can also consist of secretly embedded code in apps and operating systems.
Cryptojacking
The illegal mining of crypto currencies such as Bitcoin using compromised computers unbeknownst to the user or owner of the hijacked computer. Malware is the primary vector used for
Cryptojacking
.
Phishing
Social Engineering
designed to trick users into taking actions or divulging information inadvertently.
Phishing
is currently a worldwide epidemic and its primary threat vector is email. The remedy is security awareness training.
Ransomware
Ransomware
is one of the most dangerous cybersecurity and financial extortion threats to organizations worldwide. Installed malware encrypts an organization's data files and requires a decryption key to unlock it.
More Cybersecurity Terms
Information Technology
AI
Artificial Intelligence or AI is the theory and development of computer systems able to perform tasks that normally require human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.
Software
Software is a generic term used to describe computer programs that run on PCs, mobile phones, tablets, or other smart devices. Software is often used to describe all the functional aspects of a computer that do not refer to its physical components (hardware).
Hardware
Computer hardware includes the physical parts of a computer, such as the case, central processing unit (CPU), random access memory (RAM), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard.
Network
A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other.
More Information Technology Terms
Site Features
Blogs
Media
Research
Forums
Events
Glossaries
Videos & Podcasts
Application Security
Information Security
Disaster Recovery
Operational Security
Network Security
Social NEtworks
LinkedIn
Twitter
YouTube
About Us
IT Specialist Network
Contact info
info@itspecialist.com
follow us
LinkedIn
Twitter
YouTube
© 2022 IT Specialist Network, Inc. All Rights Reserved. |
Terms of Use |
Privacy Policy
Powered by Vanjaro