9 Cyber-security Terms You Should Know | Free Antivirus

Everyone is responsible for cybersecurity. You don't have to be an IT professional to know how to protect yourself from a cyber attack. To get you started, here are some helpful terms that you should know so that you are not left in the dark, whether you're teaching yourself how to update your anti-malware, bring your systems up to date, or your technical Consult support.



Cyber-security Terms


 

MALWARE

The term “computer virus” has long been misused to define any type of attack designed to damage or compromise your computers and networks. A virus is actually a specific type of attack or malware. While a virus is designed to replicate itself, any software designed to break into networks or steal data should be classified as malware.

 

RANSOMWARE - RANSOM NOTE

Don't be confused by all of the other words that end in “goods”; they are all just sub-categories of malware. Currently, one of the most popular of This is “ransom,” which is malware that encrypts valuable data until a ransom is paid for its return.

 

BURGLARY PROTECTION SYSTEM - INTRUSION PROTECTION SYSTEM (IPS)

There are several ways to protect your network from malware, but IPS is fast becoming one of the required ways. IPS reside inside your company's firewall looking for suspicious and malicious activity that can be stopped before it can exploit a known vulnerability.

 

SOCIAL ENGINEERING

Not all types of malware are based solely on fancy computer programming. Experts agree that most attacks require some form of so-called "social engineering" to be successful. Social engineering is the process of getting people, not computers, to reveal confidential or proprietary information. Complicated software is completely unnecessary if all you can do is convince potential victims that you are a security professional who needs their password to keep their account secure.

 

PHISHING

Although social engineering often relies on personal interactions, more technical methods are occasionally used. Phishing is the creation of an application or website that poses as a trustworthy and often well-known company to obtain confidential information. Just because you received an email saying it came from your house bank doesn't mean it should be taken at face value - always check the source requesting your confidential information.

 

ANTIVIRUS

Antivirus software is often misunderstood as a way to fully secure your servers and workstations. These applications are only part of the cybersecurity puzzle and can only check the drives they are installed on for signs of known malware variants.

 

ZERO-DAY ATTACKS

Malware is most dangerous when it has been published but not yet discovered by cybersecurity experts. If a vulnerability is found in software, the manufacturers will release an update to close the security gap. However, when cyberattackers release a piece of malware that has never been seen before, and when that malware exploits one of those loopholes before the vulnerability is fixed, it is called a zero-day attack.

 

PATCHES

When software developers discover a vulnerability in their programming, they usually publish a small file to update and "patch" that vulnerability. Patches are essential to protect your network from the hackers lurking on the Internet. By checking for and installing patches as often as possible, you will protect your software from the latest malware.

 

REDUNDANT DATA

If free antivirus, patches, and intrusion detection fail to protect your information, there is only one option: Quarantine offsite storage. Duplicating your data offline and storing it somewhere other than your company's workspace ensures that you have backups in the event of a malware infection.

 

We don't just create a glossary of cybersecurity terms. Every day we write a new chapter in the history of this continually evolving industry. We are available to impart this knowledge to anyone who inquires.

Comments