Cybersecurity, Definition: The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
Confidentiality, Definition: A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
Data breach, Definition: The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.
Data theft, Definition: The deliberate or intentional act of stealing of information.
Denial of service,Definition: An attack that prevents or impairs the authorized use of information system resources or services.
Distributed denial of service, Definition: A denial of service technique that uses numerous systems to perform the attack simultaneously.
Digital forensics/ computer forensics/forensics, Definition: The processes and specialized techniques for gathering, retaining, and analyzing system-related data (digital evidence) for investigative purposes.
Encryption, Definition: The process of transforming plaintext into ciphertext.
Firewall, Definition: A capability to limit network traffic between networks and/or information systems.
Hacker, Definition: An unauthorized user who attempts to or gains access to an information system.
Incident, Definition: An occurrence that actually or potentially results in adverse consequences to (adverse effects on) (poses a threat to) an information system or the information that the system processes, stores, or transmits and that may require a response action to mitigate the consequences.
Information and communication(s) technology, Definition: Any information technology, equipment, or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information.
Malicious code, Definition: Program code intended to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or availability of an information system.
Malware, Definition: Software that compromises the operation of a system by performing an unauthorized function or process.
Password, Definition: A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
Phishing, Definition: A digital form of social engineering to deceive individuals into providing sensitive information.
Privacy, Definition: The assurance that the confidentiality of, and access to, certain information about an entity is protected.
Recovery, Definition: The activities after an incident or event to restore essential services and operations in the short and medium term and fully restore all capabilities in the longer term.
Ransomware, Definition: is a malware designed to deny a user or organization access to files on their computer. By encrypting these files and demanding a ransom payment for the decryption key, hackers place organizations in a position where paying the ransom is the easiest and cheapest way to regain access to their files.
Spam, Definition: The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
Spoofing, Definition: The deliberate inducement of a user or resource to take incorrect action. Note: Impersonating, masquerading (masking) and mimicking are forms of spoofing.
Spyware, Definition: Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
Threat, Definition: A circumstance or event that has or indicates the potential to exploit vulnerabilities and to adversely impact (create adverse consequences for) organizational operations, organizational assets (including information and information systems), individuals, other organizations, or society.
Virus, Full form: Vital Information Resources Under Siege
Virus, Definition: A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.
Vulnerability, Definition: A characteristic or specific weakness that renders an organization, a person or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.
Blue Team, Definition: A group that defends an enterprise's information systems when mock attackers (i.e., the Red Team) attack, typically as part of an operational exercise conducted according to rules established and monitored by a neutral group (i.e., the White Team).
Red team, Definition: A group authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s cybersecurity posture.
White team, Definition: A group responsible for refereeing an engagement between a Red Team of mock attackers and a Blue Team of actual defenders of information systems.