top of page

Cyber Terminologies and Fundamentals

Definitions 

Cryptography

The practice of securing communication and data using encryption and decryption techniques.

Cyber Threat Intelligence (CTI)

Information about cyber threats used to prevent or mitigate cyberattacks.

Command and Control (C2)

A technique used by cybercriminals to remotely control compromised systems.

Cloud Security

Measures to protect cloud computing environments from cyber threats and data breaches.

Cyber Kill Chain

A framework outlining the stages of a cyberattack, from reconnaissance to data exfiltration.

Cross-Site Scripting (XSS)

A web security vulnerability where attackers inject malicious scripts into web applications.

Cybersecurity Framework

A structured approach to managing cybersecurity risks and improving security posture.

Certificate Authority (CA)

An entity that issues digital certificates to authenticate users and websites.

Common Vulnerabilities and Exposures (CVE)

A publicly known list of security vulnerabilities and exposures.

Container Security

Techniques to secure containerized applications from threats and vulnerabilities.

Credential Stuffing

An attack where attackers use leaked credentials to gain unauthorized access to accounts.

Clickjacking

An attack where users are tricked into clicking on malicious elements hidden on a webpage.

Compliance Monitoring

Ensuring an organization adheres to security policies, regulations, and standards.

Cold Boot Attack

An attack that extracts sensitive data from a system's RAM after a reboot.

Cyber Deception

Techniques that use deceptive methods to mislead attackers and protect systems.

Cobalt Strike

A commercial penetration testing tool often misused by cybercriminals for post-exploitation activities.

Credential Harvesting

The collection of usernames, passwords, and other credentials through phishing or malware.

Critical Infrastructure Security

Protecting essential systems like power grids and water supply from cyber threats.

Covert Channel

A communication channel used by attackers to bypass security controls and transmit data.

Code Injection

An attack where malicious code is inserted into a vulnerable application for execution.

bottom of page