top of page

Cyber Terminologies and Fundamentals

Definitions 

Security Information and Event Management (SIEM)

A security solution that aggregates and analyzes security data to detect and respond to threats.

Secure Sockets Layer (SSL)

A cryptographic protocol used to establish secure communications over a network.

Session Hijacking

An attack where an attacker takes control of a user's session to gain unauthorized access.

Supply Chain Attack

A cyberattack targeting vulnerabilities in a supplier’s system to compromise its clients.

Social Engineering

Manipulating individuals to disclose confidential information through deception or coercion.

Security Operations Center (SOC)

A centralized team responsible for monitoring, detecting, and responding to cybersecurity incidents.

Secure Shell (SSH) Tunneling

A method to create encrypted connections between computers using the SSH protocol.

Steganography

The practice of hiding information within files or images to evade detection.

Sandbox Evasion

Techniques used by malware to detect and bypass security sandboxes.

SQL Injection (SQLi)

An attack that injects malicious SQL queries to manipulate a database.

Secure Boot

A security standard ensuring that only trusted software loads during system startup.

Spyware

Malicious software designed to secretly collect user information.

Security by Design

An approach where security measures are integrated into software development from the beginning.

Shadow IT

Unauthorized IT systems or applications used within an organization without approval.

Security Token

A physical or digital device used for authentication to secure access to systems.

Smishing (SMS Phishing)

A phishing attack conducted through SMS messages to steal personal information.

Side-Channel Attack

An attack that exploits information gained from the physical implementation of a system.

Secure Coding Practices

Development practices that minimize security vulnerabilities in software.

Stack Smashing

A buffer overflow attack that overwrites memory to execute arbitrary code.

Software Bill of Materials (SBOM)

A comprehensive list of components in a software product for security assessment.

bottom of page