Defence Against the Dark Arts

Kyocera Cyber’s Glossary of Cyber terminology.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Advanced Persistent Threat (APT)
Advanced Persistent Threat (APT) What is it and how can we defend against them An Advanced Persistent...
Angler Phishing
Angler Phishing What is it and how can we defend against it Angler Phishing is a type of social media-based...
Attack Surfaces
Attack Surfaces What are they? An attack surface refers to the total sum of all possible points of entry...
Attack Vectors
Attack Vectors What are they? An attack vector refers to the path or method that a cybercriminal uses...
Black Swan Events
Black Swan Events What are they? A Black Swan event is a metaphor used to describe an event that is extremely...
Botnets
Botnets What are they and how can we defend against them. A botnet is a network of internet-connected...
Brute Force Attacks
Brute Force Attack What is it and how can we defend against them A brute force attack is a method used...
Clone Phishing
Clone Phishing What is it and how can we defend against it. Clone phishing is a type of phishing attack...
Cybersecurity
Cybersecurity What is it? Cybersecurity is the practice of protecting computer systems, networks, and...
Deepfakes
Deepfakes What are they? Deepfakes have emerged as one of the most fascinating – and controversial...
Distributed Denial-of-Service (DDoS)
Distributed Denial-of-Service (DDoS) What is it and how can we defend against it. A Distributed Denial-of-Service...
Drive-by Downloads
Drive-by Downloads What are they? A drive-by download is a type of cyberattack where malicious software...
EDR - Endpoint Detection and Response
EDR – Endpoint Detection and Response What is it? EDR, or Endpoint Detection and Response, is a cybersecurity...
Email Spam
Email Spam What is it and how can we defend against it. Email spam, also known as junk email, refers...
Endpoints
Endpoints What is an endpoint? In cybersecurity and IT, endpoints refer to any device that connects to...
Ethical Hackers
Ethical Hackers What are they? Cybersecurity threats are more prevalent than ever, from data breaches...
IoT - Internet of Things
IoT – the Internet of Things What is it? The Internet of Things (IoT) refers to a network of physical...
Keyloggers
Keyloggers What are they? A keylogger (short for keystroke logger) is a type of surveillance software...
Malvertising
Malvertising What is it and how can we defend against it. Malvertising, short for malicious advertising,...
Malware
Malware What is it and how can we defend against it. Malware (short for malicious software) is any software...
Man-in-the-Middle Attack (MitM)
Man-in-the-Middle Attack (MitM) What is it and how can we defend against them A Man-in-the-Middle (MitM)...
MFA - Multi Factor Authentication
MFA – Multi Factor Authentication What is it? MFA, or Multi-Factor Authentication, is a security...
Mobile Device Management - MDM
Mobile Device Management – MDM What Is Mobile Device Management (MDM) and why is it important?...
MSSP or Managed Security Service Provider
MSSP – Managed Security Service Provider What is an MSSP? An MSSP, or Managed Security Service...
NIS2- Network and Information Security Directive 2
NIS2 – Network and Information Security Directive 2 What is it? The NIS2 Directive – short...
Patching
Patching What is it and why is it so important? Patching plays a critical role in protecting systems...
Pentesting - Penetration Testing
Pentesting – Penetration Testing What is it? Penetration testing, commonly known as pentesting,...
Pharming
Pharming What is it and how can we defend against it. Pharming is a type of cyberattack that redirects...
Phishing
Phishing What is it and how can we defend against it. Phishing is a type of cyberattack where attackers...
Pretexting
Pretexting What is it and how can we defend against it? Pretexting is a form of social engineering attack...
PUPs
PUPs What are they? PUPs stands for Potentially Unwanted Programs. These are software applications that...
QR Phishing - Quishing
QR Phishing – Quishing What is it and how can we defend against it. QR phishing, also known as quishing,...
Ransomware
Ransomware What is it and how can we defend against it. Ransomware is a type of malware that encrypts...
Red Teaming
Red Teaming What is it? Red Teaming in cybersecurity is a full-scope, multi-layered attack simulation...
SaaS
Saas – Software as a Service What is it? Cloud-based solutions streamline operations and improve...
SIEM - Security Information and Event Management
SIEM – Security Information and Event Management What is it? A SIEM, or Security Information and Event...
Smishing (SMS Phishing)
Smishing (SMS Phishing) What is it and how can we defend against it. Smishing (short for SMS phishing)...
SOAR - Security Orchestration Automation and Response
SOAR – Security Orchestration, Automation and Response What is it? Security Orchestration, Automation...
Social Engineering
Social Engineering What is it and how can we defend against them In cybersecurity, social engineering refers...
Spear Phishing
Spear Phishing What is it and how can we defend against them Spear phishing is a targeted form of phishing...
Spoofing
Spoofing What is it and how can we defend against it. Spoofing is a deceptive tactic used in cybersecurity...
SQL injection
SQL Injection What is it? SQL Injection (SQLi) is one of the most dangerous and common web application...
Trojans
Trojans What are they? Trojans – also known as Trojan horses – are a type of malware that...
Vishing (Voice Phishing)
Vishing (Voice Phishing) What is it and how can we defend against it. Vishing (short for voice phishing)...
VPN
VPN What Is a VPN and Why Do You Need One Protecting your online privacy is more important than ever....
Whaling
Whaling What is it and how can we defend against it Whaling is a sophisticated form of phishing attack...
Zero-Day Exploit
Zero-Day Exploit What is it and how can we defend against them A Zero-Day Exploit is a type of cyberattack...