Defence Against the Dark Arts
Kyocera Cyber’s Glossary of Cyber terminology.
Advanced Persistent Threat (APT) What is it and how can we defend against them An Advanced Persistent...
Angler Phishing What is it and how can we defend against it Angler Phishing is a type of social media-based...
Attack Surfaces What are they? An attack surface refers to the total sum of all possible points of entry...
Attack Vectors What are they? An attack vector refers to the path or method that a cybercriminal uses...
Black Swan Events What are they? A Black Swan event is a metaphor used to describe an event that is extremely...
Botnets What are they and how can we defend against them. A botnet is a network of internet-connected...
Brute Force Attack What is it and how can we defend against them A brute force attack is a method used...
Clone Phishing What is it and how can we defend against it. Clone phishing is a type of phishing attack...
Cybersecurity What is it? Cybersecurity is the practice of protecting computer systems, networks, and...
Deepfakes What are they? Deepfakes have emerged as one of the most fascinating – and controversial...
Distributed Denial-of-Service (DDoS) What is it and how can we defend against it. A Distributed Denial-of-Service...
Drive-by Downloads What are they? A drive-by download is a type of cyberattack where malicious software...
EDR – Endpoint Detection and Response What is it? EDR, or Endpoint Detection and Response, is a cybersecurity...
Email Spam What is it and how can we defend against it. Email spam, also known as junk email, refers...
Endpoints What is an endpoint? In cybersecurity and IT, endpoints refer to any device that connects to...
Ethical Hackers What are they? Cybersecurity threats are more prevalent than ever, from data breaches...
IoT – the Internet of Things What is it? The Internet of Things (IoT) refers to a network of physical...
Keyloggers What are they? A keylogger (short for keystroke logger) is a type of surveillance software...
Malvertising What is it and how can we defend against it. Malvertising, short for malicious advertising,...
Malware What is it and how can we defend against it. Malware (short for malicious software) is any software...
Man-in-the-Middle Attack (MitM) What is it and how can we defend against them A Man-in-the-Middle (MitM)...
MFA – Multi Factor Authentication What is it? MFA, or Multi-Factor Authentication, is a security...
Mobile Device Management – MDM What Is Mobile Device Management (MDM) and why is it important?...
MSSP – Managed Security Service Provider What is an MSSP? An MSSP, or Managed Security Service...
NIS2 – Network and Information Security Directive 2 What is it? The NIS2 Directive – short...
Patching What is it and why is it so important? Patching plays a critical role in protecting systems...
Pentesting – Penetration Testing What is it? Penetration testing, commonly known as pentesting,...
Pharming What is it and how can we defend against it. Pharming is a type of cyberattack that redirects...
Phishing What is it and how can we defend against it. Phishing is a type of cyberattack where attackers...
Pretexting What is it and how can we defend against it? Pretexting is a form of social engineering attack...
PUPs What are they? PUPs stands for Potentially Unwanted Programs. These are software applications that...
QR Phishing – Quishing What is it and how can we defend against it. QR phishing, also known as quishing,...
Ransomware What is it and how can we defend against it. Ransomware is a type of malware that encrypts...
Red Teaming What is it? Red Teaming in cybersecurity is a full-scope, multi-layered attack simulation...
Saas – Software as a Service What is it? Cloud-based solutions streamline operations and improve...
SIEM – Security Information and Event Management What is it? A SIEM, or Security Information and Event...
Smishing (SMS Phishing) What is it and how can we defend against it. Smishing (short for SMS phishing)...
SOAR – Security Orchestration, Automation and Response What is it? Security Orchestration, Automation...
Social Engineering What is it and how can we defend against them In cybersecurity, social engineering refers...
Spear Phishing What is it and how can we defend against them Spear phishing is a targeted form of phishing...
Spoofing What is it and how can we defend against it. Spoofing is a deceptive tactic used in cybersecurity...
SQL Injection What is it? SQL Injection (SQLi) is one of the most dangerous and common web application...
Trojans What are they? Trojans – also known as Trojan horses – are a type of malware that...
Vishing (Voice Phishing) What is it and how can we defend against it. Vishing (short for voice phishing)...
VPN What Is a VPN and Why Do You Need One Protecting your online privacy is more important than ever....
Whaling What is it and how can we defend against it Whaling is a sophisticated form of phishing attack...
Zero-Day Exploit What is it and how can we defend against them A Zero-Day Exploit is a type of cyberattack...