Terms and Definitions

Common cybersecurity terminologies and definitions

fundamentals

administrative access control

Organizational policies that dictates who has access to what information. This policies are usually signed by Senior level management.

logical access control

A pre-configured system that controls an individuals ability to access computer system resources such as database

physical access control

Hardwares or physical mechanisms that controls access to assets. Eg security guard, mantrap, wall, etc

cybersecurity

The practice of ensuring confidentiality, integrity, and availability of information by protecting assets such as networks, data from unauthorized access or exposure

threat actor

Any person or group who presents a security risk

compliance

It is the process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches.

security frameworks

They are guidelines used for building plans to help mitigate risks and threats to data and privacy.

security posture

It is an organization’s ability to manage its defense of critical assets and data and react to change. A strong security posture leads to lower risk for the organization.

internal threat

An internal threat can be a current or former employee, an external vendor, or a trusted partner who poses a security risk. At times, an internal threat is accidental. For example, an employee who accidentally clicks on a malicious email link would be considered an accidental threat. Other times, the internal threat actor intentionally engages in risky activities, such as unauthorized data access.

logs

A log is a record of events that occur within an organization’s systems

database

Database is an organized collection of data

asset

An object that is of value to an organization or individual. Example intellectual property, data center, etc

metrics

Key technical attributes such as response time, availability, and failure rate, which are used to assess the performance of a software application

incident response

An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach

chronicle

A cloud-native tool designed to retain, analyze, and search data

networking

Application programming interface (API)

A set of routines, standards, protocols, and tools for building software applications to access a web-based software application or web tool.

Hubs

They are devices used to connect multiple computers in a network. They are also called repeaters

Network

A network is simply two or more computers linked together to share data or resources

OSI model

Open System Interconnection model was developed to establish a standardized way to describe the communication between connected devices/computers

Firewall

A firewall is a device used to monitor and filter incoming and outgoing network traffic

Network security

Network security is the practice of keeping an organization's network infrastructure secure from unauthorized access. This includes data, services, systems, and devices that are stored in an organization’s network.

Cloud Security

Cloud security is the process of ensuring that assets stored in the cloud are properly configured, or set up correctly, and access to those assets is limited to authorized users. The cloud is a network made up of a collection of servers or computers that store resources and data in remote physical locations known as data centers that can be accessed via the internet. Cloud security is a growing subfield of cybersecurity that specifically focuses on the protection of data, applications, and infrastructure in the cloud.

attacks

Phishing

Phishing is the use of digital communications to trick people into revealing sensitive data or deploying malicious software.

Spear phishing

A malicious email attack that targets a specific user or group of users. The email seems to originate from a trusted source.

whaling

A form of spear phishing. Threat actors target company executives to gain access to sensitive data.

Vishing

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.

smishing

The use of text messages to trick users, in order to obtain sensitive information or to impersonate a known source.

malware

Malware is simply any software that harms computers, networks, devices, etc

viruses

Malicious code written to interfere with computer operations and cause damage to data and software. A virus needs to be initiated by a user/agent (i.e., a threat actor), who transmits the virus via a malicious attachment or file download.

worms

Malware that can duplicate and spread itself across systems on its own. In contrast to a virus, a worm does not need to be downloaded by a user. Instead, it self-replicates and spreads from an already infected computer to other devices on the same network.

ransomware

A malicious attack where threat actors encrypt an organization's data and demand payment to restore access.

spyware

Malware that’s used to gather and sell information without consent. Spyware can be used to access devices. This allows threat actors to collect personal data, such as private emails, texts, voice and image recordings, and locations.

adversarial artificial intelligence

Adversarial artificial intelligence is a technique that manipulates [artificial intelligence and machine learning](https://www.nccoe.nist.gov/ai/adversarial-machine-learning) technology to conduct attacks more efficiently. Adversarial artificial intelligence falls under both the communication and network security and the identity and access management domains.

abbreviations

CISSP

Certified information Systems Security Professional

PII

Personally Identifiable Information (PII): It is any data/information of an individual such as name, and phone number that can be used to infer the identity of a person

SPII

sensitive Personally Identifiable Information(SPII): It is a specific PII that falls under stricter handling guidelines, including social security numbers and credit card numbers

SIEM

Security Information and Event Management: A SIEM tool is an application that collects and analyzes log data to monitor critical activities in an organization.

IEEE

Institute of Electrical and Electronics Engineers

governance risk compliance

Laws

They are rules that govern a community

security audit

A security audit is a review of an organization's security controls, policies, and procedures against a set of expectations.

control assessment

A controls assessment involves closely reviewing an organization’s existing assets, then evaluating potential risks to those assets in order to ensure internal controls and processes are effective.

splunk enterprise

A self-hosted tool used to retain, analyze, and search an organization's log data to provide security information and alerts in real-time

splunk cloud

A cloud-hosted tool used to collect, search, and monitor log data

Security orchestration, automation, and response (SOAR)

A collection of applications, tools, and workflows that use automation to respond to security events

Security information and event management (SIEM)

An application that collects and analyzes log data to monitor critical activities in an organization

playbook

A manual that provides details about any operational action

Forensic

Order of volatility

A sequence outlining the order of data that must be preserved from first to last

Protecting and preserving evidence

The process of properly working with fragile and volatile digital evidence

cyb ndy
© 2023 Designed & Developed by Cybandy