Image
DICTIONARY
Cyber Security Dictionary

Terms

Definitons

Antivirus

APT

Attack Surface

Antivirus software are computer programs used to block, detect and disable malware.
Advanced Persistent Threat is a computer network attack in which an individual or group gains unauthorized access to a network and remains undetected for an extended period of time.
These are the points used by people who pose a threat to the system to access the system.
Botnet
Bug
It is a network of multiple compromised computers controlled by a single hacker.
A bug is an error, defect, or malfunction that causes a computer program or software system to produce an incorrect or unexpected result and to behave in undesirable ways.
CIA Triangle
Cryptography
It is the name given to all the methods used to transform the information contained in readable data into a form that cannot be understood by unwanted parties.
It is the name given to all the methods used to transform the information contained in readable data into a form that cannot be understood by unwanted parties.

DDoS

DHCP

DNS

Distributed Denial of Service is the prevention of users from entering the system or site as a result of attacks by exposing a system to data above certain capacity limits.
Dynamic Host Configuration Protocol provides automatic assignment of network connection settings such as IP address, subnet mask, default gateway, and DNS servers to each computer on the network.
DNS is a hierarchical distributed naming system for computers, services, internet or any resource connected to a private network, which serves to partition the internet space, name the partitions and organize communication between partitions.
Exploit
Exploit is a computer program or script, it is used for weaknesses or errors found in computer programs.
Firewall
Firewall is a hardware-based network security system that controls packet traffic to and from the network based on a set of rules.
IDS
IPS
Intrusion Detection System is a device or software used to monitor malicious activities or policy violations against networks or systems.
Intrusion Prevent System is a security system used to detect, prevent and stop malicious connections and harmful movements in network traffic.
Malware
Malware, harmful software or evilware is software used to disrupt the functions of computers and mobile devices, collect critical information, gain access to private computer systems or display unwanted advertisements.

Phishing

It is the name given to attacks where hackers try to steal passwords, identity information or similar data by sending gifts, discounts or similar fake messages to the target person.

Ransomware

Reconnaissance

Ransomware, blackmail software or ransom virus is a general name given to viruses created to demand ransom.
It is the discovery and information gathering phase before an attack occurs or an exploit is created.

SIEM

Spyware

Spyware that collects data without the computer user's consent and/or knowledge.

Security Information and Event Management is a solution in the field of computer security where software products and services combine security information management and security event management.

The CVE

Threat

Trojan

Common Vulnerabilities and Exposures system provides a reference method for publicly known information security vulnerabilities and exposures.

It refers to dangers that have the potential to harm a system consciously or unconsciously.

These are malicious software that use various methods to hide their true purpose.

Vulnerability

Security hole, security gap.