Cyber Dictionary

Active AttackAn actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources, its data, or its operations.
Advanced Persistent ThreatAn adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception).
AdwareSoftware or code that shows unwanted ads such as pop-ups on a device
AdversaryAn individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
AlertA notification that a specific attack has been detected or directed at an organization’s information systems.
AllowlistA list of entities that are considered trustworthy and are granted access or privileges.
AttackAn attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
Attack MethodThe manner or technique and means an adversary may use in an assault on information or an information system.
AttackerAn individual, group, organization, or government that executes an attack.
AuthenticationThe process of verifying the identity or other attributes of an entity (user, process, or device).
Blocklist  A list of entities that are blocked or denied privileges or access.
Business Email Compromise / CEO FraudA form of phishing in which the attacker obtains access to the business email account of a person in authority and sends emails to employees or students that appears to be from the person in authority, but instead are malicious attacks with the goal of financial gain 
CIOChief Information Officer 
Ciphertext Data or information in its encrypted form. 
CISO Chief Information Security Officer
Confidentiality A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
Cookie(s)A small packet of software that lets a website or browser track users by storing some of their information, such as what clothing online shoppers like
Critical InfrastructureThe systems and assets, whether physical or virtual, so vital to society that the incapacity or destruction of such may have a debilitating impact on the security, economy, public health or safety, environment, or any combination of these matters. 
CyberattackA malicious and deliberate attempt to breach the information system
CybercrimeAny illegal activity done on the internet
CybersecurityThe activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation. 
CyberthreatRefers to anything that has the potential to cause serious harm to a computer system 
Data BreachThe unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.
Data Loss The result of unintentionally or accidentally deleting data, forgetting where it is stored, or exposure to an unauthorized party. 
Data Loss Prevention (DLP) A set of procedures and mechanisms to stop sensitive data from leaving a security boundary. 
Data Mining The process or techniques used to analyze large sets of existing information to discover previously unrevealed patterns or correlations.
Data Theft The deliberate or intentional act of stealing of information. 
DeepfakeSynthetic media that have been digitally manipulated to replace one person's likeness convincingly with that of another
Digital Forensics The processes and specialized techniques for gathering, retaining, and analyzing system-related data (digital evidence) for investigative purposes. 
eCrimeCriminal activity that involves the use of computers or networks such as the internet  
Encryption The process of transforming plaintext into ciphertext. 
Enterprise Risk Management A comprehensive approach to risk management that engages people, processes, and systems across an organization to improve the quality of decision making for managing risks that may hinder an organization’s ability to achieve its objectives.
End of Life (EOL) End of Life. The app has reached the end of its useful life. It may mean that a new version is available that supersedes the existing product or that the product is no longer supported.
Firewall A capability to limit network traffic between networks and/or information systems. 
GeofencingTo set up triggers so that when a device such as an internet-connected smartphone enters a defined geographical boundary, the user gets an alert
HackerAn unauthorized user who attempts to or gains access to an information system.
HoneypotA computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information 
Identity and Access Management (IAM) The methods and processes used to manage subjects and their authentication and authorizations to access specific objects. 
Intrusion Detection and Prevention System (IDPS)Software that automates the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents and attempting to stop detected possible incidents
Internet of Things (IOT)The collection of sensors, instruments and autonomous devices connected through the internet to applications 
ImpersonizationAn attack type targeted phishing attack where a malicious actor pretends to be someone else or other entities to steal sensitive data
Incident Response Plan (IRP)A set of predetermined and documented procedures to detect and respond to a cyber incident.
Information Security (InfoSec) The processes and tools designed and deployed to protect sensitive business information from modification, disruption, destruction, and inspection 
Insider ThreatA person or group of persons within an organization who pose a potential risk through violating security policies.
IntrusionAn unauthorized act of bypassing the security mechanisms of a network or information system.
Intrusion DetectionThe process and methods for analyzing information from networks and information systems to determine if a security breach or security violation has occurred.
Malvertising A malicious attack that involves injecting harmful code into legitimate online advertising networks 
Malware Malicious software or code used to steal information and damage devices
Mitigation  The application of one or more measures to reduce the likelihood of an unwanted occurrence and/or lessen its consequences.
Open Authorization Standard (OAuth) An open-standard authorization protocol or framework that provides applications the ability for secure designated access 
Outsider Threat A person or group of persons external to an organization who are not authorized to access its assets and pose a potential risk to the organization and its assets. 
PasswordA string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization. 
Passwordless An authentication method in which a user can log in to a computer system without the entering a password or any other knowledge-based secret
Personal Identifying Information (PII)The information that permits the identity of an individual to be directly or indirectly inferred.
PharmingA phishing attack that uses fake websites to trick users into entering their personal information
PhishingA type of cyberattack in which someone pretends to be a trustworthy person, website or organization to get victims to share their username, password or other personal information 
RansomwareMalware designed to deny a user or organization access to files on their computer
Risk Analysis The systematic examination of the components and characteristics of risk. 
Risk Assessment The product or process which collects information and assigns values to risks for the purpose of informing priorities, developing or comparing courses of action, and informing decision making. 
Risk Management The process of identifying, analyzing, assessing, and communicating risk and accepting, avoiding, transferring or controlling it to an acceptable level considering associated costs and benefits of any actions taken. 
SecOpsA combination of the terms security and operations, is a methodology that IT managers implement to enhance the connection, collaboration and communication between IT security and IT operations teams 
Smishing/SMS PhishingUses text messages rather than email to carry out a phishing attack.  The texts appear to be from legitimate sources, but they contain malicious links.
Search Engine PhishingInvolves hackers creating websites and getting them indexed on legitimate search engines.  The websites often feature cheap products and incredible deals to lure unsuspecting online shoppers to their site, where the victim is prompted to register an account or enter their bank account information to complete a purchase.
Security Operations Center (SOC)An intelligence hub for the company, gathering data from across the organization's networks, servers, endpoints and other digital assets and using intelligent automation to identify, prioritize and respond to potential cybersecurity threats
Social EngineeringThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes 
Social Media PhishingWhen attackers use social networking sites like Facebook, Twitter and Instagram to obtain victims' sensitive data or lure them into clicking on malicious links.  Hackers may create fake accounts impersonating someone the victim knows
SpamAny unwelcome and unwanted e-mail or junk mail, including repeated comments on another's post
Spear PhishingInvolves sending malicious emails to specific individuals within an organization, rather than sending out mass emails to thousands of recipients 
Spidering The process where hackers familiarize themselves with their targets in order to obtain credentials based on their activity 
Spoofing Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system. 
SpywareSoftware put on a computer to spy and collect and send information to cybercriminals
ThreatA circumstance or event that has or indicates the potential to exploit vulnerabilities and to adversely impact (create adverse consequences for) organizational operations, organizational assets (including information and information systems), individuals, other organizations, or society. 
Threat Actor / Agent An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities. 
Threat Assessment The product or process of identifying or evaluating entities, actions, or occurrences, whether natural or man-made, that have or indicate the potential to harm life, information, operations, and/or property. 
Threatware A general term encompassing all types of malicious software on computers and electronic devices 
VirusA computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer. 
Vishing (Voice Phishing)A type of cyberattack where fraudsters use phone calls to deceive individuals into providing sensitive information or performing certain actions. 
WhalingA type of cyberattack that targets high-profile individuals or executives.  These types of attacks are highly targeted and personalized.

Definitions from: NCDITNICCS, Panda Security