top of page

Cyber Terminologies and Fundamentals

Definitions 

Open Source Intelligence (OSINT)

Gathering publicly available data for cybersecurity, research, or investigations.

One-Time Password (OTP) Security

A temporary code used for secure authentication and preventing unauthorized access.

OAuth Security

Ensuring safe authorization using OAuth to prevent token theft and misuse.

Out-of-Band Attack

A cyberattack leveraging alternative communication channels to bypass security controls.

Online Social Engineering

Manipulating individuals via digital platforms to extract sensitive information.

Over-the-Air (OTA) Updates Security

Protecting remote software updates from tampering and cyber threats.

Open Redirect Vulnerability

A flaw allowing attackers to redirect users to malicious websites.

Obfuscation Techniques

Methods to disguise code or data to evade detection and analysis.

Offensive Security Testing

Ethical hacking techniques used to identify and exploit vulnerabilities.

Operating System Hardening

Strengthening an OS by reducing its attack surface and applying security controls.

Open Web Application Security Project (OWASP)

A nonprofit focused on improving web application security.

Onion Routing

Anonymizing internet traffic by encrypting and relaying it through multiple nodes.

Overlay Malware

A malicious layer that mimics legitimate apps to steal user credentials.

Out-of-Bounds Write Exploit

A memory corruption attack enabling unauthorized code execution.

Operational Security (OPSEC)

A strategy to protect sensitive information from adversaries.

OpenVPN Security

Measures to secure OpenVPN connections against attacks and misconfigurations.

Optical Data Exfiltration

Stealing data using light-based communication, such as LED signals.

Offline Brute Force Attack

Guessing passwords by testing hash values without an active network connection.

Outdated Software Exploits

Attacks targeting known vulnerabilities in unpatched or legacy software.

On-Device AI Security

Protecting AI models and data processing directly on user devices.

bottom of page