top of page

Cyber Terminologies and Fundamentals

Definitions 

Firewall

A network security device that monitors and filters incoming and outgoing traffic based on security rules.

Forensic Analysis

The investigation and analysis of digital data to uncover cybercrimes and security incidents.

Fuzzing

A security testing technique that inputs random or malformed data to find vulnerabilities in software.

Fileless Malware

Malicious code that operates in memory without writing files to disk, making it harder to detect.

Fraud Detection

Identifying and preventing fraudulent activities using data analysis and machine learning techniques.

Firmware Security

The protection of firmware from tampering and exploitation by cybercriminals.

Federated Identity Management

A system that enables users to access multiple applications with a single authentication credential.

Framework Exploits

Attacks that target vulnerabilities in widely used security frameworks and protocols.

Full Disk Encryption

A security measure that encrypts all data stored on a disk to protect against unauthorized access.

Function Hooking

A technique used by attackers and security professionals to intercept and modify system functions.

Fault Injection

A security testing technique where faults are intentionally introduced to analyze system behavior.

Fingerprinting Techniques

Methods used to identify and track devices or users based on unique characteristics.

Fake WAP Attack

A cyberattack where a fake wireless access point is set up to intercept user traffic.

Fast Flux DNS

A technique used by cybercriminals to rapidly change IP addresses to evade detection.

Flash Exploits

Attacks that target vulnerabilities in Adobe Flash Player to execute malicious code.

Forward Secrecy

A cryptographic property that ensures past communications remain secure even if encryption keys are compromised.

Frequency Analysis

A cryptanalysis technique used to break encryption by analyzing the frequency of characters.

Format String Vulnerabilities

A security flaw that allows attackers to manipulate program output by injecting format specifiers.

Fragmentation Attack

An attack that sends fragmented network packets to bypass security filters.

FIDO Authentication

A passwordless authentication standard that uses biometrics or hardware keys for secure access.

bottom of page