geralt / Pixabay

There are a lot of confusing terms when it comes to cybersecurity. Here are some common terms related to network security and computers that we hope will help to clear up the confusion.

Authentication–This is a method that verifies the identity of a person, process or device trying to gain access to your network.

Baiting–This is some kind of offer that entices you to click on something–a free book, movie, music or other download.

Cybersecurity–This is the method or process that protects information and systems from damage, unauthorized use modification or exploitation.

Data breach–This happens when some person or entity gains access to information to which they are not authorized to have.

Encryption–This is the term used for the act of protecting data and other information from being easily read by an unauthorized party.

Firewall–The device that manages the traffic to and from your network.

Gateway–A network point that acts as an entrance to another network.

Hacker–The person who is not authorized, but tries anyway, to gain access to your systems and information.

Incident–An occurrence that threatens the security of information or systems and that may warrant action to correct and secure that information or systems.

Joe–A computer account where the user name and password are the same.

Keylogger–Software or hardware that monitors and tracks input on a keyboard or numerical pad (e.g., like that on a payment device).

Logic bomb–Code surreptitiously inserted into an application or operating system that performs some destructive activity whenever specified conditions are met.

Malvertising–Hackers will insert malicious code into a legitimate website. That code redirects the user to another malicious website.

Malware–A combination of the words “malicious” and “software.”

Network–A system in a business or university that typically includes a server and connected computers, terminals, printers, and/or other devices

Outside threat–Someone or a group of people who are not authorized to access information and data in an organization and who pose some type of threat to that organization.

Phishing–This is an email you receive that looks real–sometimes even going so far as to include logos and other branding elements–but they aren’t real.

Pretexting–This is when a hacker impersonates someone in your company–a coworker or even an officer–in an attempt to get your to release private data.

QAZ–A network worm.

Risk–The potential that a threat will exploit a vulnerability and result in an adverse outcome, including such outcomes as ransoms, denial of service, loss of critical business information, etc.

Spoofing–The act of faking the sending address of an email in order to gain unauthorized entry into a secure system.

Trojan horse–A computer program that appears real and credible but has a hidden and potentially malicious function that seeks to allow unauthorized access to a system.

Unauthorized access–Access by a person or other entity that is not allowed or authorized to have access.

Virus–A computer program that can infect a computer without permission or knowledge of the user and then spreads to another computer.

Worm— A program that propagates itself over a network, reproducing as it goes to spread itself around the network.

Zero-day attack–A threat that tries to exploit computer application vulnerabilities that are unknown to others or undisclosed to the software developer.

Entech can help you with your IT security needs. Feel free to use the checklist below to see how your company fares or contact us by clicking on the Contact Us here or at link at the top of the page and we’ll be happy to speak with you and learn about your needs.