Cyber security glossary of terms pt.1

July 15, 2022

Cyber security glossary of terms pt.1

One way to keep your network secure and protect your digital assets is to familiarise yourself with some of the basic terminologies used in cybersecurity.

This article will address some basic words and phrases you should be aware of in order to reduce your chances of falling prey to cybercrime.

A virus is a piece of malicious code that can infect and harm a file, system or network. They are typically capable of replicating themselves and find their way onto your system, usually under the guise of harmless-looking files or apps.

Spyware is software surreptitiously inserted into a system to collect private information about that host and transmit it directly to the cybercriminal with which it originates

Adware downloads covertly onto your device and then displays unauthorised advertising, even when offline.

A backup is a regularly updated copy of your data that makes it easy to recover lost files or restore your system to a previous state.

Cryptojacking is an illegal activity that allows hackers to utilise a user’s computing power to mine cryptocurrency without their knowledge or consent.

A VirtualPrivate Network (VPN) is a tool that ensures your internet privacy. It does so by encrypting your connection and keeping your online activity, such as browsing, shopping and banking, hidden.

The cloud refers to a network of servers which host data and software which can be accessed from anyplace and on any device. It’s prudent to not have ‘all your eggs in one basket,’ and uploading backups of your data to the cloud accomplishes just that.

Antivirus software is designed to protect your computer or laptop from malicious programs such as viruses and malware.  

Ransomware is a type of malware that encrypts a user’s data, so the victim is unable to access it without a decryption key. The decryption key is sold to the victim to regain access to their data.

A Trojan is malicious code or software that appears harmless or even useful but is designed to disrupt, destroy or damage the network it is deployed to infiltrate.  

Malware is malicious software designed to disrupt, damage, or gain unauthorised access to a network or device.

A keylogger monitors and captures everything a user types on their keyboard. It is usually used to steal credentials and other sensitive data.

A worm is malware that replicates itself and spreads across a network once a node has been infected.

Personally identifiable information (PII) is data that can identify a specific individual. Data such as name,DOB, identity number or financial information is highly sought after by cybercriminals.

If this all seems a bit overwhelming, don’t worry! We are cyber security experts who know precisely how to deal with malicious software and the destructive criminals they originate with. If we are on your team, you needn’t lose any sleep about your data's safety and your network's integrity.

Your cyber security is key. We'll ensure you're safe from threats.

CyberSecurity Consulting Services Include:

When ChecksumNetwork Security Services consults on your cyber security needs, we take a measured and detailed approach to your network’s touch points. We know where the gremlins like to get in and where things are bottlenecking. We ensure no backdoors are open and that there is always a digital watchman on guard. We guarantee you won't get a more thorough service elsewhere.

When ChecksumNetwork Security Services handles your network management, we put the right processes in place. You'll see an immediate difference in how you make important decisions on your network. It's the administrative heartbeat of your network. Our vast experience with some of the most extensive networks in the country means we know how to create management processes that scale to your needs when you need them to.

CNSS covers all your bases–comprehensive cyber security consulting, network consulting, and network management process solutions. We’re here to protect you. Let’s make it safe together.

Most companies take nearly six months to detect a data breach, even a major one. CNSS focuses on early detection and prevention.

Contact our leading network security experts and book your cyber security consultation with us today.




Back to Blogs
Book your cyber security consultation.
 Let's make it safe together.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.