Christmas Cyber Security Glossary: TSC's Jargon Buster
Confused by cyber security jargon? Our festive Cyber Decurity Glossary breaks down key terms to help you stay safe and informed this Christmas.
We'll be the first to admit that cybersecurity terminology can be a little tricky. So to help you stay cyber safe this Christmas, we've created a Cybersecurity Glossary, below.
Anti-virus or antivirus
Software designed to detect, stop, and remove viruses.
Cloud
An online space where resources are stored so they can be accessed from anywhere with an internet connection.
Cyber attack
Unauthorised access to technology by an individual or organisation, usually with criminal or disruptive intentions.
Encryption
The conversion of data into an unreadable code to prevent unauthorised access.
Firewall
Hardware or software that acts as a network barrier by controlling incoming and outgoing network traffic.
Hacker
An individual who will intentionally violate computer security systems to gain unauthorised access to data.
Malvertising
Online adverts or posts in social media that may tempt you with offers, deals, or discounts, but actually take you to a fake site to gather your information or install malware.
Malware
Software designed to disrupt, damage, or gain access to a computer system.
Phishing
An overall term for attempts to trick you into downloading malware or supplying personal or confidential information. They usually ask you to act urgently, open an attachment, click on a link, verify your account, or make a payment.
Ransomware
A type of malicious software designed to block access to a computer system or device until the victim pays a sum of money to the attacker's account.
Smart device
A device with internet connectivity and the ability to run programs or apps. For example, some mobile phones, tablets, television,s and watches.
SMishing
A phishing attempt via text (SMS). They usually ask you to click a link or reply with personal information.
Social engineering
Social engineering is behind most scams. Criminals try to manipulate (engineer) you into doing what they want, such as clicking to install malware, supplying login credentials, or providing financial details.
Spear phishing
A customised attack to target a specific group, organisation, department, or person.
Two-factor or multi-factor authentication
Often shortened to 2FA or MFA, two-factor authentication is a method to confirm your identity when logging into a restricted area. For example, entering a password to an online account and receiving a pass code via a mobile phone.
Virus
A piece of malicious code that is loaded onto a computer without the user's knowledge, usually to cause damage to the device.
Vishing
A phishing attempt over the phone (voice phishing). They usually claim to be a company, such as your bank, utilities company, or insurer.