Terms of the Cyber World

The world of cyber security is changing every day. Just when you think you have your personal information protected, technology changes and makes you re-evaluate. In addition to technology changes, new terms are introduced into the cyber world.
March 2, 2021 |
By: Michael V.
Michael has nearly 30 years of insurance industry experience that spans both commercial and personal lines. As Senior Correspondent for Acuity, he is responsible for creating a wide range of communications designed to inform and educate Acuity's customers and agents. Michael holds the Chartered Property Casualty Underwriter (CPCU) designation.

Author of Infocus

The world of cyber security is changing every day. Just when you think you have your personal information protected, technology changes and makes you re-evaluate. In addition to technology changes, new terms are introduced into the cyber world.

 

In a recent article, Devon Milkovich provides a list of the 25 most important cyber security terms everyone should know. Some of them have been around for quite a long time. How many of these do you know?

 

  • Cloud: Technology that allows access to files/services through the Internet from anywhere in the world.
  • Domain: A group of interconnected computers, printers, and devices governed as a whole.
  • IP Address: An Internet version of a home address for a computer.
  • Malware: All forms of malicious software designed to wreak havoc on a computer. Includes viruses, worms, and ransomware.
  • Virtual Private Network (VPN): A tool that provides an encrypted connection and allows people to connect their devices to a secure network over the Internet.
  • Social Engineering: A security threat in which the criminal exploits human psychology instead of using technical hacking or programming tricks to gain access to information, passwords, or access credentials.

 

New technology has given birth to additional terms. If you know these, you have a lot of cybersecurity knowledge.

 

  • Deepfake: An audio or video clip that has been edited and manipulated to seem real or believable.
  • Pen-Testing: Short for penetration testing. A means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
  • White Hat: An intentional network breach coordinated by the owner to gain sensitive information. Usually employed to test infrastructure vulnerabilities.
  • Black Hat: An illegal network breach done by hackers to steal information that will be used to harm the owner or users without consent.
  • Bring Your Own Device (BYOD): A company security policy that allows for employees’ personal devices to be used in business. The policy sets limitations and restrictions or prohibits a personal phone or laptop from being connected over the corporate network.

 

Knowing the terminology is a great first step in understanding the basics of cybersecurity and staying ahead of this ever-changing environment.

By: Michael V.
Michael has nearly 30 years of insurance industry experience that spans both commercial and personal lines. As Senior Correspondent for Acuity, he is responsible for creating a wide range of communications designed to inform and educate Acuity's customers and agents. Michael holds the Chartered Property Casualty Underwriter (CPCU) designation.

Author of Infocus

An insurance company that cares about you and insuring the things you wish to be insured.

Get a Quote> Find an Agent>