Cybersecurity Terms & Definitions for Small Businesses

Acceptable Use Policy (AUP)

A policy that defines the terms a user must agree to in order to use the organization's network/internet and the actions they are allowed to perform while using it.

Access Control

A system or technique for allowing or denying access. A door lock is a type of physical access control. Passwords and other types of identification and authorization are also access controls.

Advanced Persistent Threat (APT)

A prolonged, stealthy network attack that is generally difficult to detect by network security controls, thus allowing it to linger for a long period of time and steal data until it is discovered.

Adware

Software that automatically displays or downloads unwanted advertisements to collect marketing data without the user's knowledge or redirects search requests to certain advertising websites. Adware that does not notify the user and attain their consent is regarded as malicious.

Airplane Mode

A setting on mobile devices that prevents the device from sending or receiving calls and text messages. Airplane mode is also known as “offline mode,” “standalone mode” and “flight mode.”

Allowlisting Software

A technology created to keep computer systems safe from unwanted software, including malware. It works together with application blocklisting to keep malware and other unauthorized software from running on a system. Also known as “safelist” or “accept list.”

Antivirus Software

A program that monitors a computer or network to prevent, detect, contain, and remove all major types of malware incidents.

Attachment

A computer file sent along with an email message, widely used to transfer photos and documents to another person. Also known as an “email attachment.”

Attack Vector

Any way that a cybercriminal can gain access to a network, such as outdated software, badly written code that allows for buffer overflows, or social engineering using malicious attachments.

Authentication

A process that provides proof that the person who is trying to log in is, in fact, the correct person and authorized to access the network. A username and password combination is a simple form of authentication.

Backdoor

A method of bypassing standard authentication, giving an attacker unauthorized access to a computer so they can control it remotely while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or malware could modify existing software on the computer creating a backdoor that way.

Bad Actor

Refers to someone who attempts to infiltrate systems and data banks with malicious intent. Criminal hackers, cybercriminals, social engineers, and internet scam artists fall under this category.

Best Practice

A method or technique that consistently shows results superior to those achieved with other means.

Bitcoin

A digital currency (also called “cryptocurrency”) that is not sponsored by any country’s central bank or government but can be traded for goods or services with vendors and other individuals who accept them as payment.

Blocklisting

A technology that prevents items specifically appearing on a related blocklist from being executed or delivered. For example, an application control program can prevent a blocklisted program from executing or a spam blocklist can prevent email from a blocklisted domain from being delivered.

Bluetooth

A short-range radio technology (or wireless technology) that simplifies communications between devices and a computer or another device.

Botnet

A botnet (short for robot network) is a number of internet-connected devices, each of which is running one or more bots autonomously. Also called a “bot army,” botnets can be used to bring down a network, send spam, or access a device and its connections to steal confidential data, which is then sent back to the botnet command-and-control (C&C) servers. They are managed by a “Bot Herder” or “Bot Master,” who targets other systems with the botnets they control.

Bring Your Own Device (BYOD)

The policy of allowing employees to use their personal devices, such as laptops, tablets, and smartphones, for work.

Business Email Compromise (BEC)

A spear phishing attack that utilizes a compromised or mimicked email address of an executive to request a wire transfer of funds or other sensitive info. One common type of BEC is CEO Fraud.

Call-to-Action

Words that urge the viewer or listener of a sales promotion message to take an immediate action, such as “Write Now,” “Call Now,” or (on the internet) “Click Here.”

CEO Fraud

A spear phishing attack that targets people in the accounting department, in which the hacker claims to be the CEO (or another executive) and urges an employee to transfer large amounts of money.

Certificate

An electronic “password” that allows a person or organization to exchange data securely over the internet using the public key infrastructure.

Chief Executive Officer (CEO)

The highest-ranking person in an organization or other institution who is ultimately responsible for making managerial decisions.

Chief Financial Officer (CFO)/Chief Financial and Operating Officer (CFOO)

A corporate officer primarily responsible for managing the organization’s financial risks, financial planning and recordkeeping, and financial reporting to higher management.

CIA Triad

An Information Security model designed to guide policies for information security within an organization; equal parts confidentiality, availability, and integrity. “Confidentiality” is a set of rules that limits access to information. “Integrity” is the assurance that the information is relevant, accurate, and trustworthy. “Availability” is a guarantee of ready access to the information by only authorized people.

Classified Information

Sensitive information to which access is restricted by law or regulation to particular groups of people.

Clickbait

An eyecatching link or controversial story on a website which encourages people to read on. Can also be used to get users to click on links to malware.

Clickjacking

Clickjacking is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the top level page. Thus, the attacker is “hijacking” clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both.

Client (Computing)

Any device on a network that can obtain information from a server. For example, a web browser accessing the internet.

Cloud

The computer resources where an individual or organization can store and access files and run computer programs remotely over the internet.

Compliance

The goal that organizations aim to achieve by adhering to relevant laws, policies, and regulations specific to their industry. In the context of internet security, compliance means having an Information Technology (IT) environment that meets the regulations of the industry in which an organization operates. An example of compliance standards would be Payment Card Industry Data Security Standard (PCI DSS).

Controlled Unclassified Information (CUI)

Information the U.S. federal government owns or has created that needs to be safeguarded and disseminated using only controls consistent with government laws, regulations, and policies.

Credential Hygiene

Credential hygiene is the anticipation, recognition, evaluation, control, and prevention of hazards that might occur if credentials are compromised.

Credential Stuffing

A cyberattack method in which attackers use stolen username and password combinations to gain unauthorized access to multiple user accounts across various online services or platforms. This is possible because many people reuse the same login credentials across multiple websites or applications.

Credentials

A user’s authentication information like username and password.

Crimeware

Malware intended to steal money from an individual or financial institution.

Crimeware-as-a-Service (CaaS)

The process of paying for a crimeware service (such as ransomware or phishing campaigns) instead of developing one’s own.

Cryptographic

Of, relating to, or using cryptography, which is the process of converting ordinary information (called plaintext) into unintelligible text (called ciphertext). A cipher (or cypher) is a pair of algorithms used to create the encrypted ciphertext and the reversing decryption.

Cybercrime

Crimes that target computer networks or devices and their users directly. Examples include malware, denial-of-service attacks via botnets, and spear phishing.

Cybercriminal

An attacker who uses technology to steal data, money, or other sensitive information.

Cyberheist

An incident in which organized crime penetrates the network of an organization and empties its bank accounts through the internet.

Cyberterrorist

An attacker motivated by some ideology who tries to destroy computers, networks, physical infrastructure like water plants and energy plants, and commercial infrastructures like stock markets for the purpose of causing terror to further their cause.

Dark Web

The part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.

Data Breach

The intentional or unintentional release of secure information to an untrusted environment. Other terms used include “unintentional information disclosure,” “data leak,” and “data spill.”

Data Controller

The party who decides the purpose and manner to be followed when processing data.

Data Processor

Processes data on behalf of a data controller. Data processors hold and process data but do not have any responsibility or control over that data.

Data Protection Directive

A directive adopted by the European Union (EU) in 1995 that protected the personal information of EU residents and was superseded by the General Data Protection Regulation (GDPR) in May of 2018.

Data Protection Officer

A data protection law expert, such as a lawyer or auditor, that acts as the single point of contact for all data processing notifications and reports to the highest level of management.

Data Subject

An individual who is the subject of personal data.

Decryption

The process of changing encrypted information into its original format.

Deepfake

A digital file manipulated by cybercriminals to make it seem like someone else is saying or doing something. Often used as a disinformation tactic.

Disinformation

False information intentionally created to deceive and mislead. Disinformation is often forwarded to friends and family, which is then commonly referred to as misinformation.

Disk Image (DMG) File

The file format used by the Mac OS X operating system for distributing software.

Distributed Denial-of-Service (DDoS)

An attempt to make a computer server unavailable to its intended users, by overwhelming it with requests for information. This can cause the server to crash, preventing it from functioning efficiently or at all. Using many systems for a DDoS attack allows more disruptive traffic to be sent, often making it easier to disrupt the legitimate service completely and harder for a victim to recover from the attack. Also called a denial-of-service attack (DoS attack).

Domain

A name used to identify one or more Internet Protocol (IP) addresses formed by the rules and procedures of the Domain Name System (DNS).

Domain Name

The part of a web address that tells you who the owner of that webpage is; for example, “securitymoments” is the owner of www.securitymoments.com.

Domain Name Registration

The act of reserving a name on the internet for a certain period, usually one year. It is important to know that this domain will remain yours for as long as you renew it, and there is no way to purchase a domain name forever.

Domain Name System (DNS)

The internet's system for converting alphabetic web addresses into numeric IP addresses. When a web address is typed into a browser, DNS servers return the IP address of the web server associated with that name. For example, the DNS converts the URL “www.company.com” into the IP address 204.0.8.51. Without DNS, you would have to type the series of four numbers and dots into your browser to open the website.

Domains Triad

A security triad covering the three domains — cyber, physical, and people — and how they all overlap in the battle against cybercrime.

Drive-by Download

The unintentional download of malicious software to your computer or mobile device, which leaves you open to a cyber attack. This happens without a user clicking on a link, pressing a download button, or opening an attachment. It occurs in the background, with no notification, just by visiting a particular webpage.

Email Account Compromise (EAC)

A close relative of Business Email Compromise (BEC). The primary difference is with EAC, criminals target individuals rather than businesses to initiate fraudulent wire transfers.

Email Domain

The web address that comes after the @ symbol in an email address.

Email Spoofing

A form of social engineering in which an email message is forged to look like it’s coming from someone else, such as your CEO.

Embedded Hyperlink

A link that is shown visually as text rather than an actual URL. For example, the words “Security Moments homepage” could be set as an embedded hyperlink leading to www.securitymoments.com.

Enable Content/Enable Macros

A button in a document/file that the user needs to click on to activate certain functions designed to automate tasks. Cybercriminals can use them for nefarious purposes.

Encrypt

The process of making data unreadable to unauthorized viewers. Before anyone can read encrypted text, it must first be decrypted. By encrypting sensitive data, you can reduce opportunities for criminals to steal sensitive information.

End-to-End Encryption

A system of communication where the only people who can read the messages are the people communicating.

Endpoint (Endpoint Device)

Any device that is connected to a data network. Desktop computers, laptop computers, printers, tablets, and smartphones are all endpoints.

Exploit

An attack on a computer system that takes advantage of a bug, glitch, or vulnerability in other code in order to cause unanticipated behavior, aiming to acquire access to the system.

External Media

Storage devices that store information outside a computer.

Fake Profile

The representation of an entity on social media that does not truly exist. The person creates a profile with real or fake connections that look very convincing, all designed to trick you into ultimately taking some action that is not in your best interest.

Family Educational Rights and Privacy Act (FERPA)

A United States federal law intended to protect certain education records of students such as family information and disciplinary records.

Federal Energy Regulatory Commission (FERC)

A United States federal agency that regulates the transmission and wholesale sale of electricity, natural gas, and oil.

Federal Financial Institutions Examination Council (FFIEC)

A United States council consisting of five banking regulators for the purpose of supervising financial institutions.

File Types

Different types of computer files that have different extensions (the letters after the dot), for example, “.doc,” “.txt,” or “.pdf.”

Format

To prepare the chosen partition (part) on the drive (flash drive, hard drive, or USB drive) by clearing all of the data and setting up a blank file system.

General Data Protection Regulation (GDPR)

A regulation that went into effect in May of 2018 and officially replaced the Data Protection Directive. It is a legal framework that applies to all organizations worldwide and sets guidelines for the collection and processing of personal information of individuals within the European Union (EU).

Gramm–Leach–Bliley Act (GLBA)

A United States regulation that sets the standards for how financial institutions handle the private information of individuals. Pronounced “glibba.” Also known as the Financial Modernization Act of 1999.

Hack

To use a computer to gain unauthorized access to files and information on another computer or a system of networked computers.

Hacker

A technically skilled computer expert who uses their technical knowledge to overcome problems. A criminal hacker is anyone who uses their hacking skills for illegal purposes.

Hash

A hash is a string or number generated from a string of text. The resulting string or number is a fixed length and will vary widely with small variations in input. The best hashing algorithms are designed so that it's impossible to turn a hash back into its original string.

Health Insurance Portability and Accountability Act (HIPAA)

Enacted by the United States Congress and signed by President Bill Clinton in 1996, it is a standardization that regulates the protection of individuals’ private health information.

Hijacked

The process where an attacker takes control of an established connection while in progress. The attacker intercepts transmissions and responds to them with false information.

Human Firewall

A protective cybersecurity layer which is formed when all users recognize their role in keeping their organization secure and are trained to a point where they do not fall for any social engineering tricks. Security awareness training provides a crucial benefit by training users to prevent malicious activity and what to do in the event of such activity.

Hyperlink

Text or objects in webpages, documents, and emails that you can click on to display another webpage, document, or place in a document.

Hypertext Markup Language (HTML)

A programming language that tells your browser how to display the webpage and how it should behave when you view it. It is now used to create most websites, with each containing many HTML files (webpages) that link to each other and also other pages on the internet.

Hypertext Transfer Protocol (HTTP)

The communication protocol used to connect to web servers on a network; the agreed-upon way information is formatted and transmitted over the World Wide Web. HTTP's most important task is to define how web browsers should request and display data from websites, ensuring all communication and exchange of information can occur on the Web.

Hypertext Transfer Protocol Secure (HTTPS)

A set of rules for speedy retrieval and transmission of electronic documents over a secure connection. In the beginning, HTTP was adopted as the way information was exchanged over the Web, but once everyone knew how to exchange information, intercepting the exchanged information was easily figured out. The problem of keeping that information private was solved using HTTPS.

Identification Number

A number used by the governments of many countries as a means of tracking their citizens, permanent residents, and temporary residents for the purposes of work, taxation, government benefits, health care, and other government-related functions. Examples include “national identification number,” “national identity number,” or “national insurance number.”

Identity Theft

Taking someone else’s identification number, date of birth, address, and other important personal information to establish false credentials and commit fraud. An example would be a cybercriminal creating fraudulent credit card accounts and then racking up charges which are then left unpaid, leaving the victim with the credit card debt and a ruined credit rating.

Incident Reporting

The process by which security events of any type are reported — often a part of an organization’s policy.

Incident Response

The method in which an organization responds to a security event, such as a breach involving a hacker who has penetrated the organization’s network defenses. An incident response plan details how to handle every type of compromise and establishes a set of protocols — a step-by-step policy — to mitigate further damage and increase the success of a timely recovery.

Information Security

The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, inspection, recording, or destruction.

Information Technology (IT) Security Policy

The rules that a user must follow to keep themselves and their organization safe from threats.

Information Workforce

The total pool of information workers; people who use information to assist in making decisions or taking actions, or people who create information that informs the decisions or actions of others.

Insider Threat

A threat to an organization that comes from a person (or people) inside the organization itself. This could be a current or former employee, contractor or vendor, or a close business associate who possesses sensitive organizational information that could be used maliciously to harm the organization.

Internet

A global computer network of billions of interconnected devices.

Internet Protocol (IP) Address

Similar to the street address for your home, IP addresses identify network computers. Similar to the street address for your home but for identifying network computers, it helps traffic flow between computers because each has its unique address. An IP address is formatted as a series of four values separated by periods: 172.16.254.1

Internet Security

The branch of computer security (which also includes mobile devices) that deals with internet-based threats.

iOS

An operating system used for mobile devices manufactured by Apple Inc. Both iPads and iPhones are iOS devices.

Jailbreaking

A device hack that provides users with unrestricted access to the entire file system of their mobile devices. While jailbreaking makes your device more open and gives you complete control over it, it may be more vulnerable to attacks.

Java Exploit

A malicious application that allows hackers to remotely access your computer, letting them change files, steal personal information, and install more unwanted software. Called a “Trojan horse,” this kind of threat must be sent to you by someone or carried by another program.

Keylogger

A small bit of malware that logs what someone types on their keyboard and records the keystrokes in a special file called a keystroke log. Also known as a “keystroke logger.”

Link

A connection from a website, file, or document that points to another location and is activated when you click on it.

Macros

A list of usually text-based commands or instructions that are grouped and can be run as a single command, which would allow you to create shortcuts to tasks you repeatedly do in programs like Microsoft Word, Excel, and PowerPoint. Hackers exploit macros by convincing you to enable them in order to access your computer and run malware.

Malware

Short for “malicious software.” An umbrella term used to refer to a wide range of viruses, worms, Trojans, and other programs that a hacker can use to damage, steal from, or take control of endpoints and servers. Most malware is installed without the infected person ever realizing it.

Many Lives Triad

A concept that covers how information security exists in three areas of our lives (personal, professional, mobile) and how those lives continuously overlap.

Material Risk

Material Risk means a capital-related adverse risk that significantly impacts an organization’s overall risk profile and may affect its capital adequacy.

Media Drop

A technique used by hackers in which malware is loaded on a USB drive, CD/DVD, or another readable form of media, which is then left where it can easily be found or, in some cases, given away at public venues or trade shows. Once the victim loads the drive or disk, the malware does its work and will allow the hacker to commit attacks.

Misinformation

False or inaccurate information, especially that which is deliberately intended to deceive. Often forwarded to friends and family, not knowing it is false.

Network

A set of computers connected for the purpose of sharing resources. The most common resource shared today is connection to the internet.

Network Drive

Data storage on a network that is not on the computer itself. Windows computers usually have drive C: as the local hard disk, but drive F: can be a network drive where files are stored.

Network Sniffer

A device and/or software tool that monitors, or sniffs out, the data flowing over computer network links in real-time.

North American Electric Reliability Corporation (NERC)

A regulation whose mission is to ensure the reliability of the North American bulk power system.

OAuth

Short for “Open Authentication.” An authentication standard that allows you to approve one application interacting with another on your behalf without giving away your password.

Open Web Application Security Project (OWASP)

A worldwide, not-for-profit charitable organization focused on improving the security of software.

Passcode

A string of characters that are entered to gain access to such things as a computer or smartphone.

Password Manager

Software that generates and stores all logins and passwords using one master password, thereby eliminating the need for the user to remember multiple logins and passwords. It can be synced across multiple devices, and most come with autofill and auto-login capabilities on websites.

Patch

A set of changes to a computer program designed to update, fix, or improve it (i.e., fixing security vulnerabilities discovered after a product was released for general use). A computer is “patched” when it has had the latest patches installed.

Payment Card Industry Data Security Standard (PCI DSS)

A standard created to increase controls around cardholder data to reduce credit card fraud.

Personal data

Any information relating to an identifiable person such as a name, an identification number, location data, an online identifier, or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural, or social identity.

Personal Health Information (PHI)

All recorded information about an individual that relates to that person’s health, health care history, provision of health care to the individual, or payment for health care.

Personally Identifiable Information (PII)

Any information such as an individual’s name, identification number, date and place of birth, mother’s maiden name, and biometric records that can be used on its own or with other information to identify, contact, or locate a single person.

Phishing

The process in which cybercriminals try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment. They do this using emails disguised as contacts or organizations you trust so that you react without thinking first. It’s a form of criminally fraudulent social engineering.

Policy

A set of rules that specify what requirements must be met.

Pop-up

A (usually small) window that suddenly appears on a user’s computer screen.

Pretexting

A form of social engineering in which an individual creates an invented scenario to persuade a targeted victim to release information or perform some action. Pretexting can also be used to impersonate people in certain jobs and roles such as technical support or law enforcement to obtain information.

Privilege

The right of an account, such as a user or group account, to perform various system-related operations on the local computer, such as shutting down the system, loading device drivers, or changing the system time.

Privileged Access

When an account, such as a user or group account, is granted permission to perform various system-related operations, such as shutting down the system, loading device drivers, or changing the system time.

Privileged User

A user who, by virtue of function, and/or seniority, has been given powers within the computer system, which are significantly greater than those available to the majority of users.

Processing

In the context of data protection laws and regulations, processing means any operation performed on personal data, whether or not by automated means, including collection, use, recording, etc.

Proven Practice

Different from a best practice in that a best practice is context-dependent and might not be “best” in all cases, whereas a proven practice is tried and proven to be effective in most cases.

Public Wireless Network

A wireless network in a public area that anyone can use.

QR (Quick Response) Code

A type of barcode made up of small black and white squares arranged into a larger square. They can store long strings of data, such as web addresses, and can be scanned by the camera on a mobile device.

Quarantine

A function of antivirus software that isolates infected files on a computer's hard disk so they are no longer capable of infecting their hosting system. The infected files can then either be deleted or restored in the event they were not malicious.

Radio-Frequency Identification (RFID)

A way to store electronic information on a badge, tag, card, or document that an RFID reader can read.

Ransomware

A type of malware that holds a computer hostage by blocking access, encrypting files, or threatening to reveal sensitive data until a ransom is paid.

Red Flag

A warning of danger or a problem.

Remote Access Trojan (RAT)

A piece of malware that hides in a computer and gives remote access to a cybercriminal who then controls (and really “owns”) your computer.

Root

The name for the administrator or superuser role on a Linux/Unix-based system, including macOS.

Rootkit

A collection of files that is installed on a computer system to alter the standard functionality of the system in a malicious and stealthy way.

SarbOx

A United States regulation intended to protect investors from the possibility of fraudulent accounting activities by corporations. Short for the “Sarbanes-Oxley Act of 2002.”

Security Awareness Training

Training that raises a user's awareness of potential security threats and how to avoid them. General security awareness training topics include best security practices, what to do if they encounter a security problem, and who to contact for security threats.

Sensitive Information

Privileged or proprietary information which, if compromised through alteration, corruption, loss, misuse, or unauthorized disclosure could cause serious harm to the organization owning it. NOTE: For our purposes, the words “sensitive,” “confidential,” and “private” all mean essentially the same thing.

Server

A computer that delivers data and services to other computers on a network. Servers can run software and store information. For example, webpages are stored on servers.

Short Message Service (SMS)

A type of messaging common to most cell phones that allows users to send a message of up to 160 characters to another device. Commonly referred to as a “text message.”

Shoulder Surfing

The practice of physically spying on a user, usually watching over their shoulder, while they log in to an ATM, computer, or another electronic device to obtain their personal access information, usually done by looking over their shoulder.

Smishing

Phishing that occurs through text messaging. Short for “Short Message Service (SMS) phishing.”

SMS Spoofing

Tricking or deceiving phone messaging systems or users by sending messages from a fake phone number or faking another user's phone number. Since people are much more likely to read a message from a number they know, hackers will often spoof numbers to trick recipients into taking an action they would not usually take.

Social Engineering

The act of manipulating people into performing actions or divulging confidential information. Someone who attempts to do this is referred to as a “Social Engineer.”

Spam

Unsolicited, unwanted email. About 70–90 percent of email is spam.

Spear Phishing

A small, focused, targeted attack via email on a particular person or organization with the goal to penetrate their defenses. The spear phishing attack is done after research on the target and has a specific personalized component designed to make the target do something against their own interest.

Spoofing

Tricking or deceiving computer systems or other computer users. This is typically done by hiding one’s identity or faking the identity of another user on the internet. Email spoofing involves sending messages from a fake email address or faking the email address of another user. Since people are much more likely to read a message from an address they know, hackers will often spoof addresses to trick the recipient into taking an action they would not normally take.

Spyware

An umbrella term for many “families” of malicious software that send a computer user’s confidential data back to cybercriminals. Some examples of spyware are Trojans, adware, and malicious toolbars.

Tailgating

A method used by social engineers to gain access to a building or other protected area. A tailgater commonly will attempt to wait for an authorized user to open and pass through a secure entry point so they can follow behind them.

Technical Vulnerabilities

A weakness in software or hardware that leaves a system open to attack.

Threat Landscape

The methods used by cybercriminals to break into your device and your organization's network.

Torrent Sites

Technology used to distribute files over the internet. Torrent sites are used to share pirated movies, music, and other copyrighted files. A “torrent” is short for “BitTorrent.”

Tradecraft

A set of techniques hackers and social engineers use to get illegal access to hardware or software or to deceive humans.

Trigger

A condition that causes a virus payload to be executed, usually occurring through user interaction (e.g., opening a file, running a program, or clicking on an email file attachment).

Trojan Horse

Deriving its name from the Trojan Horse of Greek mythology, a program that masquerades as safe, hiding its true malicious intent, tricking an unsuspecting user into running or executing it. Once executed, it can allow cybercriminals to run their software on your computer. Common types of trojans are ransomware programs, credential theft, and keyloggers.

Trojan Listener

A piece of malware that sits on the command-and-control server of a hacker and waits for an infected computer to “call home” to it. It listens for the Trojan to call in.

Uniform Resource Locator (URL)

The address of a resource on the internet. When you type a web address (such as www.securitymoments.com) into your browser’s address bar, your browser translates that URL into an Internet Protocol (IP) address like 209.80.210.10 and takes you to the appropriate webpage.

Universal Serial Bus (USB) Drive

A storage device often used for penetration tests that can have malware on it that may expose a network to an attacker. It can also be called a “thumb drive” or “flash drive.”

Vendor Email Compromise (VEC)

A variety of business email compromise (BEC) attack in which attackers gain access to email accounts at a company in the supply chain, and then use the accounts to target that company’s customers.

Virtual Private Network (VPN)

A technology that creates a safe connection over a less secure network, such as the internet. VPN technology was developed to allow remote users and branch offices to access corporate applications, email, and other resources securely.

Virus

A computer virus copies itself to another computer and infects files on that computer. Sometimes also referred to as a “File Infector” or “File Virus.”

Vishing

Phone-based social engineering, also sometimes referred to as “voice phishing.” Like phishing, vishing is when the hacker calls or leaves you voice messages and tries to con you into surrendering confidential information.

Web Browser

A software program that requests and retrieves information from websites. Also known simply as a “browser.” To keep it simple, when you type a web address like www.securitymoments.com (also called a “URL” or “Uniform Resource Locator”) into your browser’s address bar, your browser translates that URL into an Internet Protocol (IP) address (the address of a server on the internet somewhere). The server that hosts that webpage sends it to your browser. Examples include Google Chrome, Mozilla Firefox, Microsoft Edge, or Safari.

Web Portal

The website of an organization that allows you to perform certain functions like paying bills or other tasks.

Whaling

Phishing attacks that target high-ranking executives at major organizations or other highly visible public figures. Also known as whale phishing.

Wi-Fi

A facility allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly within a particular area.

Wi-Fi Hotspots

A physical location that offers wireless internet access.

Wi-Fi Pineapple

A hacking device that advertises a false access point name like AT&T Wi-Fi. The Wi-Fi Pineapple has two radios: one for you to connect to, thinking it is AT&T Wi-Fi, and one that connects to the real AT&T Wi-Fi, so the device sits in the middle between you and the real AT&T Wi-Fi access point and sees and records everything you do while you are online.

Wireless Access Point

A device that allows wireless devices to connect to a wired network using Wi-Fi.

World Wide Web (WWW)

A collection of websites filled with information. These websites are searchable and connected to each other by links. Called “The Web” for short.

Worm

A standalone malware software program that replicates itself quickly so it can spread to other computers.

Zero-day Attack

A computer threat that tries to exploit vulnerabilities that are unknown to others, undisclosed to the software vendor, or for which no security fix is available. Also known as a “Zero-day Threat.”

Zero-day Exploits

Actual code that can use a security hole to carry out an attack. Used or shared by attackers before the software vendor knows about the vulnerability.

Zombie

A computer that has been compromised by a hacker via a computer virus, computer worm, or trojan horse program and can be used to perform malicious tasks under the remote direction of the hacker.