Defence Against the Dark Arts
Kyocera Cyber’s Glossary of Cyber terminology.
Advanced Persistent Threat (APT)
What is it and how can we defend against them
An Advanced Persistent...
Angler Phishing
What is it and how can we defend against it
Angler Phishing is a type of social media-based...
Attack Surfaces
What are they?
An attack surface refers to the total sum of all possible points of entry...
Attack Vectors
What are they?
An attack vector refers to the path or method that a cybercriminal uses...
Black Swan Events
What are they?
A Black Swan event is a metaphor used to describe an event that is extremely...
Botnets
What are they and how can we defend against them.
A botnet is a network of internet-connected...
Brute Force Attack
What is it and how can we defend against them
A brute force attack is a method used...
Clone Phishing
What is it and how can we defend against it.
Clone phishing is a type of phishing attack...
Cybersecurity
What is it?
Cybersecurity is the practice of protecting computer systems, networks, and...
Deepfakes
What are they?
Deepfakes have emerged as one of the most fascinating – and controversial...
Distributed Denial-of-Service (DDoS)
What is it and how can we defend against it.
A Distributed Denial-of-Service...
Drive-by Downloads
What are they?
A drive-by download is a type of cyberattack where malicious software...
EDR – Endpoint Detection and Response
What is it?
EDR, or Endpoint Detection and Response, is a cybersecurity...
Email Spam
What is it and how can we defend against it.
Email spam, also known as junk email, refers...
Endpoints
What is an endpoint?
In cybersecurity and IT, endpoints refer to any device that connects to...
Ethical Hackers
What are they?
Cybersecurity threats are more prevalent than ever, from data breaches...
IoT – the Internet of Things
What is it?
The Internet of Things (IoT) refers to a network of physical...
Keyloggers
What are they?
A keylogger (short for keystroke logger) is a type of surveillance software...
Malvertising
What is it and how can we defend against it.
Malvertising, short for malicious advertising,...
Malware
What is it and how can we defend against it.
Malware (short for malicious software) is any software...
Man-in-the-Middle Attack (MitM)
What is it and how can we defend against them
A Man-in-the-Middle (MitM)...
MFA – Multi Factor Authentication
What is it?
MFA, or Multi-Factor Authentication, is a security...
Mobile Device Management – MDM
What Is Mobile Device Management (MDM) and why is it important?
In...
MSSP – Managed Security Service Provider
What is an MSSP?
An MSSP, or Managed Security Service...
NIS2 – Network and Information Security Directive 2
What is it?
The NIS2 Directive – short...
Patching
What is it and why is it so important?
Patching plays a critical role in protecting systems...
Pentesting – Penetration Testing
What is it?
Penetration testing, commonly known as pentesting,...
Pharming
What is it and how can we defend against it.
Pharming is a type of cyberattack that redirects...
Phishing
What is it and how can we defend against it.
Phishing is a type of cyberattack where attackers...
Pretexting
What is it and how can we defend against it?
Pretexting is a form of social engineering attack...
PUPs
What are they?
PUPs stands for Potentially Unwanted Programs. These are software applications that...
QR Phishing – Quishing
What is it and how can we defend against it.
QR phishing, also known as quishing,...
Ransomware
What is it and how can we defend against it.
Ransomware is a type of malware that encrypts...
Red Teaming
What is it?
Red Teaming in cybersecurity is a full-scope, multi-layered attack simulation...
Saas – Software as a Service
What is it?
Cloud-based solutions streamline operations and improve...
Security Operations Centre – SOC
What is it?
A SOC is a dedicated team and facility responsible...
SIEM – Security Information and Event Management
What is it?
A SIEM, or Security Information and Event...
Smishing (SMS Phishing)
What is it and how can we defend against it.
Smishing (short for SMS phishing)...
SOAR – Security Orchestration, Automation and Response
What is it?
Security Orchestration, Automation...
Social Engineering
What is it and how can we defend against them
In cybersecurity, social engineering refers...
Spear Phishing
What is it and how can we defend against them
Spear phishing is a targeted form of phishing...
Spoofing
What is it and how can we defend against it.
Spoofing is a deceptive tactic used in cybersecurity...
SQL Injection
What is it?
SQL Injection (SQLi) is one of the most dangerous and common web application...
Trojans
What are they?
Trojans – also known as Trojan horses – are a type of malware that...
Vishing (Voice Phishing)
What is it and how can we defend against it.
Vishing (short for voice phishing)...
VPN
What Is a VPN and Why Do You Need One
Protecting your online privacy is more important than ever....
Whaling
What is it and how can we defend against it
Whaling is a sophisticated form of phishing attack...
Zero-Day Exploit
What is it and how can we defend against them
A Zero-Day Exploit is a type of cyberattack...