
Cybersecurity continues to be a pending issue for many companies. Today, many organizations have protocols in place to resist attacks from unethical hackers. However, as technology advances, the ways to perpetrate a cyber attack are also more sophisticated.
LEADERS MUST ENSURE THE CYBERSECURITY OF COMPANIES
Business leaders have the objective, therefore, of striving to achieve a cybersecurity of 10 for their organizations. To do this, they must invest in the right tools, in professionals, and in cybersecurity training and consulting for all teams.
In addition to this, the leader of a company must handle the terms that are used in the field of cybersecurity in organizations. For this reason, we are going to echo in this post a glossary that has been prepared by the National Institute of Cybersecurity, INCIBE.
10 BASIC CYBERSECURITY TERMS
1. SECURITY BREACH
Security breaches that cause the accidental or deliberate destruction, loss or alteration of personal data when it is being transmitted, stored or subject to other processing. Security breaches also affect unauthorized communication or access to such data.
2.BOTS
A Trojan-infected computer that communicates with a command and control (C&C) center to send it stolen information and receive updates. In addition, it can perform other functions such as sending spam, mining cryptocurrencies, infecting other computers in your network or environment.
3.BACKUP
Backup that is made on files or applications contained in a computer with the purpose of recovering the data in the event that the information system suffers damage or accidental loss of the stored data.
4. SECURITY AUDIT
It is the study that includes the analysis and management of systems carried out by professionals in information technology (IT) with the objective of identifying, enumerating and describing the various vulnerabilities that could arise in an exhaustive review of workstations, networks communications, servers or applications.
5. CAPTCHA
Acronym for Completely Automated Public Turing test to tell Computers and Humans Apart; in Spanish, completely automatic and public Turing test to differentiate computers from humans, is a type of security measure that consists of performing challenge-response tests controlled by machines that serve to determine when the user is a human or a bot according to the answer to that challenge.
6. END-TO-END ENCRYPTION
It is the property of some communication systems that makes the exchanged messages unreadable during communication in case of interception as they are encrypted. Being end-to-end, it implies that only the sender and receiver will be able to decipher and know the content of the message.
7. DNS POISONING
This is a malicious activity in which a cyber attacker tries to gain control of an Internet domain name server (the machines that direct traffic on the network). Sometimes it is limited only to the router. Once control of the server is obtained, the requests that arrive are directed to other non-legitimate sites placed by the cyber attacker. These sites are generally focused on installing malware or conducting illegal activities such as phishing (identity theft) of other sites for financial gain.
8.FINGER PRINTING
Method of collecting information from a device, person or organization in order to facilitate its identification. To achieve this, client-side scripting languages are used to collect information about the selected user or device, such as the type and version of the browser and operating system, screen resolution, plugins, microphone, camera, etc. In addition to collecting information about habits and tastes without users’ knowledge, it can also be used by cybercriminals to find out which software modules (specific browser version, plugins, etc.) installed on a specific device and be exploited by using of exploits.
9.HACKER
Person with great knowledge in the management of information technologies who investigates a computer system to report security failures and develop techniques that prevent unauthorized access.
10. HACKTIVISTA
Cybercriminal who, making use of his knowledge of computers and digital tools, uses them to promote his political ideology. Among the actions they carry out are modifications to websites (defacement), redirects, denial of service (DoS) attacks, theft of privileged information or parodies of websites, among others. These acts are carried out by these people under the premise of promoting other acts such as civil disobedience with the ultimate goal of achieving their political purposes.
This is only ten terms. On the INCIBE website you will find the complete glossary of cybersecurity terms created by INCIBE. It is arranged alphabetically and is very useful because it includes many cybersecurity concepts that are very useful for all companies. We hope it works for you!