About Us
Careers
Blogs
Home
>
Blogs
>
Understanding the Basics Common Terminologies in Cyber Security

Understanding the Basics Common Terminologies in Cyber Security

Technology
By Aresh Mishra
This clear guide will help you master essential cyber security terms, understand key concepts, and protect your digital life effectively
A man working on a computer with holographic lock and security icons, representing cyber security concepts

In the modern era, people experience a lifestyle where their coffee orders and bank transactions are predominantly digital. Amidst this digital shift, cybersecurity has taken centre stage. Every 39 seconds, someone, somewhere, faces a cyber attack. These are not minor glitches anymore. They range from personal data theft to severe malware attacks that can destroy the entire system.

Cybersecurity is becoming an essential part of everyday life. Embracing the fundamentals of cybersecurity empowers everyone by enhancing digital resilience and safeguarding personal information. It's an intelligent step forward into a secure and confident future.

This blog delivers a simple exploration of cyber security terms and terminologies and explains their meanings and types.

1. Malware

Malware is a cyber security term that stands short for malicious software. It encompasses any program designed to harm or exploit any programmable device, service, or network. Cybercriminals use malware to extract personal data, disrupt operations, and sometimes spread chaos.

Types of Malware

  • Viruses: These are harmful programs that act like viruses. Once executed, they duplicate themselves by modifying other computer programs and inserting their code. When these infected segments run, the virus gets activated. It leads to devastating effects ranging from wiping data to corrupting files.

  • Worms: Worms spread across networks by exploiting vulnerabilities. They require no user interaction (such as clicking on a malicious link) to operate, and their ability to replicate extensively makes them exceptionally dangerous.

  • Trojans: These are named after the ancient Greek wooden horse. Trojans present themselves as harmless or beneficial software to trick users into installing them. Once inside your system, they drop their guise and perform malicious activities, like stealing sensitive data or opening the door for further infiltrations.

  • Spyware: This monitors user activity and collects personal data without consent. This information might include internet habits, user logins, and bank details.

  • Ransomware: This is one of the most aggressive types of malware. Ransomware locks away your data, encrypting it so that one cannot access files, photos, or other essential documents without paying a ransom. It's become infamous for targeting individuals and large corporations, leading to significant operational disruptions.

What is Jailbreaking in Cybersecurity?

Often, users jailbreak their devices to bypass manufacturer restrictions and install unauthorised software.

So, what is jailbreaking in cyber security? It refers to removing software restrictions on iOS devices to install unauthorised apps. It can expose devices to additional security risks, such as malware infections.

The weakened security posture resulting from jailbreaking makes devices particularly vulnerable to the types of malware previously discussed, including spyware and Trojans.

How To Shield Yourself From Malware

Protecting against malware requires more than antivirus software. It demands ongoing vigilance and proactive measures:

  • Stay informed: Understand the latest cybersecurity threats and the common signs of an attack. Being aware can prevent many potential breaches.

  • Keep everything updated: Regular updates to your operating systems and applications patch security vulnerabilities and keep cyber intruders at bay.

  • Choose strong security tools: Invest in comprehensive antivirus or anti-malware software. It will actively scan and neutralise threats.

  • Backup data: Ensure regular backups of data. If the data gets compromised or held hostage, one can restore it without ransom.

  • Practice safe browsing and email habits: Be cautious about the links you click and the emails you open. Often, malware infections start with a seemingly innocuous click.

2. Phishing

Our next cyber security term is phishing. It is a cyber attack that uses disguised email as a weapon. The aim is to trick the email recipient into believing the message is important. Common approaches include a request from their bank or a note from someone in their company. The message may contain a link to click on or an attachment intended for downloading.

How It Works

  • Emails: These messages are crafted to appear as if they are from trusted entities, such as your bank or a popular online retailer. They typically convey a sense of urgency, prompting the reader to act quickly by entering personal details that the attackers can steal.

  • **Websites:**Fake websites that look nearly identical to their legitimate counterparts are created. It is done to fool people into entering their info.

  • Messages: Phishing isn't limited to emails. SMS and instant messaging are also used to lure individuals to fraudulent websites or to download malware directly onto their devices.

  • Spear Phishing: This more targeted form targets specific individuals or companies. By using personal information already known about the targets, these emails can be compelling.

  • Whaling: These attacks go after big fish—high-profile targets like company executives. Whaling scams are highly specialised and use tactics tailored to trick professionals. It usually mimics the tone and style of communication that they expect to receive.

What is Enumeration in Cyber Security?

Attackers use enumeration techniques to gather detailed information about their targets.

One might ask, what is enumeration in cyber security? Enumeration gathers user names, machine names, and network resources. This helps them craft compelling spear phishing emails. Conversely, system administrators use enumeration defensively to spot and address security gaps. This way, enumeration serves a role in both offence and defence in cyber security.

An Example To Illustrate

Imagine getting an email that seems like it's from your bank. It is asking you to confirm your account number or password. Clicking on the link might lead you to a fake website that collects your information to steal your identity or drain your account.

An infamous example of phishing is the attack on the 2016 U.S. Presidential election. Phishing emails were sent to political figures. It led to leaks of sensitive information regarding the election.

Safety Tips

To avoid phishing, it is advised to:

  • Verify the authenticity of the communication source before clicking on links or downloading attachments.

  • Use multi-factor authentication to reduce the risk of a successful attack.

  • Use sophisticated email filters to help block phishing emails from reaching you.

3. Ransomware

Ransomware is type of malware that locks and encrypts a victim's data and then demands a ransom to restore access. If the ransom is not paid, the data might be permanently lost or used for further criminal purposes.

Notable Incidents

  1. WannaCry: This attack struck organisations worldwide, including hospitals and banks. It exploited vulnerabilities in Microsoft Windows OS. For us, this highlights the necessity for timely system updates.

  2. NotPetya: Initially thought to be ransomware, this was later identified as a cyber weapon. It was aimed at Ukraine, which had widespread collateral impacts worldwide.

Safety Tips

Backups are a critical defensive strategy against ransomware. One must use traffic filtering and scanning to detect and respond to ransomware before it can inflict significant damage.

4. Encryption

Encryption is a fundamental aspect of Internet security. It scrambles data so that only authorised parties can understand it. This cyber security term has many types of encryption algorithms. Each has its strengths and weaknesses, and they are used across various applications, from securing databases to verifying users' identities.

Types of Encryption

  1. Symmetric Encryption: Uses a single key to encrypt and decrypt information. It's fast and suitable for large volumes of data but requires secure key sharing.

  2. Asymmetric Encryption: Uses a pair of public and private keys. While the public key is shared openly, the private key is kept secret, ensuring only the intended recipient can decrypt the message.

Encryption Examples in Daily Use

  • HTTPS: Secure websites use HTTPS, indicating they have SSL/TLS certificates that encrypt data sent between you and the site.

  • VPN: Virtual Private Networks encrypt your internet connection, hiding your browsing activity and personal information from hackers.

Wrapping Up

By 2025, cybercrime will cost the world a staggering $10.5 trillion. Every penny lost represents businesses disrupted, personal savings stolen, and trust eroded. It becomes more critical for everyone to familiarise themselves with cyber security terms and terminologies.

Partnering with GrowthJockey offers a potent approach to enhancing cybersecurity awareness and readiness. The first step is building a solid understanding of cyber security terms. With a dedicated team of experts, GrowthJockey supports you in staying updated with the latest cybersecurity terms, strengthening your knowledge base, and monitoring emerging threats.

Also read: What is Cyber Security? | Definition, Types, and User Protection

FAQs

1. What steps should I take if I suspect a malware infection on my device?

Understanding the immediate steps to take if you suspect a malware infection can mitigate damage:

  • Disconnect from the Internet: Disconnect your device to prevent the spread of malware or leakage of sensitive data.

  • Run antivirus software: Perform a full system scan using updated antivirus software to detect and remove any threats.

  • Change your passwords: After removing the malware, change the passwords for your sensitive accounts, as they may have been compromised.

  • Update your software: Ensure all your system software is up to date to patch any vulnerabilities that malware may have exploited.

  • Consult a professional: If unsure about the infection or how to remove it, consult a cybersecurity expert.

2. How can I recognise a phishing email?

Recognising phishing emails can protect you from one of the most common cyber threats:

  • Check the sender’s email address: Phishing emails often come from addresses that mimic legitimate ones but have slight discrepancies.

  • Look for urgency or threats: Phishing attempts often create a sense of urgency or threaten negative consequences to provoke a quick response.

  • Scrutinise links: Hover over any links in the email (without clicking) to see if the URL address looks legitimate or mimics a known website with minor changes.

  • Poor grammar and spelling: Professional organisations typically proofread their communications, so sloppy writing can be a red flag.

  • Unsolicited attachments: Be wary of unexpected email attachments containing malware.

3. What is the difference between a virus and a worm?

Understanding the difference can help in identifying the threat and choosing the correct response strategy:

  • Virus: A virus attaches to clean files and infects others. It can spread uncontrollably, damaging the core functionality of systems and corrupting files. Viruses require a host file to be executed.

  • Worm: Worms stand-alone, replicate, and spread to other networks. They do not need human help or even a host program to replicate. Worms often exploit vulnerabilities in operating systems.

    10th Floor, Tower A, Signature Towers, Opposite Hotel Crowne Plaza, South City I, Sector 30, Gurugram, Haryana 122001
    Ward No. 06, Prevejabad, Sonpur Nitar Chand Wari, Sonpur, Saran, Bihar, 841101
    Shreeji Tower, 3rd Floor, Guwahati, Assam, 781005
    25/23, Karpaga Vinayagar Kovil St, Kandhanchanvadi Perungudi, Kancheepuram, Chennai, Tamil Nadu, 600096
    19 Graham Street, Irvine, CA - 92617, US
    10th Floor, Tower A, Signature Towers, Opposite Hotel Crowne Plaza, South City I, Sector 30, Gurugram, Haryana 122001
    Ward No. 06, Prevejabad, Sonpur Nitar Chand Wari, Sonpur, Saran, Bihar, 841101
    Shreeji Tower, 3rd Floor, Guwahati, Assam, 781005
    25/23, Karpaga Vinayagar Kovil St, Kandhanchanvadi Perungudi, Kancheepuram, Chennai, Tamil Nadu, 600096
    19 Graham Street, Irvine, CA - 92617, US