Skip to content
All posts

Christmas Cyber Security Glossary: TSC's Jargon Buster

Confused by cyber security jargon? Our festive Cyber Decurity Glossary breaks down key terms to help you stay safe and informed this Christmas.

We'll be the first to admit that cybersecurity terminology can be a little tricky. So to help you stay cyber safe this Christmas, we've created a Cybersecurity Glossary, below. 

Cyber glossary

Anti-virus or antivirus

Software designed to detect, stop, and remove viruses.

Cloud

An online space where resources are stored so they can be accessed from anywhere with an internet connection.

Cyber attack

Unauthorised access to technology by an individual or organisation, usually with criminal or disruptive intentions.

Encryption

The conversion of data into an unreadable code to prevent unauthorised access.

Firewall

Hardware or software that acts as a network barrier by controlling incoming and outgoing network traffic.

Hacker

An individual who will intentionally violate computer security systems to gain unauthorised access to data.

Malvertising

Online adverts or posts in social media that may tempt you with offers, deals, or discounts, but actually take you to a fake site to gather your information or install malware.

Malware

Software designed to disrupt, damage, or gain access to a computer system.

Phishing

An overall term for attempts to trick you into downloading malware or supplying personal or confidential information. They usually ask you to act urgently, open an attachment, click on a link, verify your account, or make a payment.

Ransomware

A type of malicious software designed to block access to a computer system or device until the victim pays a sum of money to the attacker's account.

Smart device

A device with internet connectivity and the ability to run programs or apps. For example, some mobile phones, tablets, television,s and watches.

SMishing

A phishing attempt via text (SMS). They usually ask you to click a link or reply with personal information.

Social engineering

Social engineering is behind most scams. Criminals try to manipulate (engineer) you into doing what they want, such as clicking to install malware, supplying login credentials, or providing financial details.

Spear phishing

A customised attack to target a specific group, organisation, department, or person.

Two-factor or multi-factor authentication

Often shortened to 2FA or MFA, two-factor authentication is a method to confirm your identity when logging into a restricted area. For example, entering a password to an online account and receiving a pass code via a mobile phone.

Virus

A piece of malicious code that is loaded onto a computer without the user's knowledge, usually to cause damage to the device.

Vishing

A phishing attempt over the phone (voice phishing). They usually claim to be a company, such as your bank, utilities company, or insurer.