This section is designed to demystify the complex terminology used in the world of cyber security. Whether you’re just starting out or already diving into the subject, our curated collection of key terms and clear definitions will help you grasp fundamental concepts and communicate effectively in the realm of cyber security.
|The process of converting plain text or data into an unreadable format (ciphertext) to prevent unauthorized access. Encryption ensures data confidentiality and integrity, especially during transmission or when stored on devices.
|A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between internal and external networks, helping to protect against unauthorized access.
|Malicious software designed to harm or exploit computer systems. It includes viruses, worms, Trojans, ransomware, and spyware.
|A type of cyber attack where attackers impersonate legitimate entities to deceive individuals into sharing sensitive information, such as passwords or credit card details, often through deceptive emails or websites.
|Two-Factor Authentication (2FA)
|An additional layer of security that requires users to provide two different types of identification before accessing a system or account. Typically, this involves a combination of a password and a unique verification code sent to a registered device.