top of page

Cyber Terminologies and Fundamentals

Definitions 

Penetration Testing

Simulating cyberattacks to identify and exploit vulnerabilities in systems.

Public Key Infrastructure (PKI)

A framework using encryption keys for secure communications and digital signatures.

Patch Management

The process of updating software and systems to fix vulnerabilities and enhance security.

Password Cracking

Using techniques like brute force to guess or recover a password from hashes.

Phishing Attacks

Deceptive attempts to acquire sensitive information through fake communications.

PowerShell Security

Protecting PowerShell scripts and commands from abuse in cyberattacks.

Physical Security Attacks

Attacks that target physical devices or premises to gain unauthorized access.

Privilege Escalation

Gaining higher-level access or control than initially authorized.

Packet Sniffing

Intercepting and analyzing network packets to capture sensitive data.

Payload Encryption

Encrypting malicious payloads to evade detection by security tools.

Process Injection

Inserting malicious code into the memory space of a running process to control it.

Proxy Bypass Techniques

Methods used to evade security filters by bypassing proxies.

Polymorphic Malware

Malware that changes its code or appearance to avoid detection.

Passive Reconnaissance

Gathering information about a target without interacting directly with it.

PGP Encryption

A data encryption standard using asymmetric key pairs for secure communication.

Password Spraying

A brute-force attack targeting a few common passwords across many accounts.

Persistence Mechanisms

Techniques used by attackers to maintain access to a compromised system.

Printer Exploits

Attacks targeting network printers or exploiting printer vulnerabilities.

Protocol Spoofing

Impersonating a legitimate communication protocol to carry out malicious actions.

Port Knocking

A security method where a specific sequence of port access attempts grants access.

bottom of page