top of page

Cyber Terminologies and Fundamentals

Definitions 

User and Entity Behavior Analytics (UEBA)

A cybersecurity technique that analyzes user and entity behavior to detect anomalies.

Uniform Resource Locator (URL) Spoofing

An attack where a website URL is disguised to mislead users into believing it is legitimate.

Unauthorized Access

Gaining access to a system or data without proper authorization.

Unpatched Vulnerabilities

Security weaknesses in software or hardware that remain unpatched and exploitable.

Unsecured APIs

Application Programming Interfaces (APIs) that lack proper security measures, making them vulnerable to attacks.

USB-Based Malware

Malicious software that spreads through infected USB devices.

User Awareness Training

Education programs designed to teach users how to recognize and prevent cybersecurity threats.

Untrusted Code Execution

Running software from unknown or unverified sources, increasing security risks.

Undetectable Malware

Malicious software designed to evade detection by security tools.

User Access Management

Processes to control and restrict user access to systems and data.

URL Redirection Attack

An attack where users are redirected to a malicious site without their knowledge.

Universal Second Factor (U2F)

A strong authentication method that adds an additional security factor using physical devices.

Unstructured Data Security

Protecting sensitive information that is not stored in structured databases.

Unauthenticated Encryption

Encryption that does not verify the authenticity of the data, making it vulnerable to attacks.

Ubuntu Security Hardening

Security configurations and best practices to enhance the security of Ubuntu-based systems.

User Enumeration Attacks

An attack that identifies valid usernames on a system to facilitate further exploitation.

URL Manipulation

A technique where attackers modify URLs to access unauthorized data or bypass security controls.

Unlinkability in Privacy

A privacy concept ensuring that multiple user actions cannot be linked together.

Upstream Supply Chain Security

Protecting the security of software and hardware components sourced from suppliers.

Unfiltered Input Vulnerabilities

Security flaws that arise when applications fail to properly validate user input.

bottom of page