Internet security

Your Must-Have Cheat Sheet for Cybersecurity Terms

The internet has created some interesting and often baffling terms that are now part of our everyday lives. Not to mention all the abbreviations and acronyms that have popped up from texting and social media. It sometimes feels like we need to have a Ph.D. to decipher them.

But there are some terms you really should be aware of to help keep your online activity safe. Along with these new phrases, cybersecurity has joined the club of terms that can be confusing.

That’s why we gathered some of the most common cybersecurity phrases and their definitions to help you in case you experience an online threat. Take a moment to review the terms below so that you can understand and be aware of what to watch out for online.

  • Malware – Short for “malicious software,” it is software designed to infiltrate a computer system without the owner’s informed consent. Computer professionals use this as a general term referencing a variety of hostile, intrusive and annoying software or program code.
  • Spyware - Refers to programs that use your internet connection to send information from your personal computer to other computers, normally without your knowledge or permission. Most often, this information is a record of your ongoing browsing habits or downloads, or it could be more personal data like your name and address.
  • Adware - Software that automatically runs while the user is online, displaying or downloading advertisements, which are often unwanted. Adware is a close cousin of spyware as many adware programs collect information about the user, often without their knowledge, to send back to advertisers for purposes of profiling for targeted ad-serving.
  • Keylogger - A program that logs every keystroke you type and then sends that information, such as passwords, bank account numbers and credit card numbers, to a third party. Keyloggers can be used for illegitimate purposes to secretly spy on people for personal gain. However, they may also be used for legitimate purposes such as troubleshooting networks, analyzing employee productivity or assisting law enforcement.
  • Trojan Horse – Named after the giant wooden horse supposedly brought to Troy as a gift that instead contained Greek soldiers. The Trojan horse of computers might be disguised as a program intended to rid your computer of viruses but instead infects your system. It can damage, delete or destroy important files or install a backdoor through which your personal information could be sent to another computer. This type of malware is commonly used for perpetrating identity theft.
  • Worms - Programs that replicate themselves to spread harm to other computers. They may hijack your system and could be used to send out spam or accomplish a variety of other unsavory activities without your knowledge. Worms may cause severe damage by eating up essential system resources, which could lead to your computer freezing or crashing. Viruses and worms commonly use shared files and items like email address books to spread to other computers.
  • Phishing – A tactic that tricks people into revealing sensitive data, such as passwords, usernames, or financial account details to a fake source. The phisher will disguise themselves as a trustworthy entity to contact potential victims and get them to reveal personal information. This technique is often done via email by posing as a well-known bank and asking for sensitive data.
  • Ransomware – A form of malware that locks a user out of their system and prevents access to files. A message will pop up on a device stating that a specific payment must be sent to regain access. These attacks impact consumers as well as banks, medical offices and other businesses that store sensitive data.
  • Spoofing – The most common types of spoofing are via email and IP addresses. When done via email, the header will be altered to make it look reputable. For example, an email can be made to look like it’s coming from a financial institution or other trusted business. IP spoofing involves sending a tainted packet to a computer with an altered IP with the expectation it will be accepted, and then the sender will have access to that device.
  • Rootkit – One of the scariest aspects of a rootkit is that it can mostly go undetected. It is a type of malware that can be installed on a system via tactics such as emails, unauthenticated sites or infected hard drives. The danger is that it can allow cybercriminals to remotely control a device. It can function at the low system level and will erase its tracks, allowing it to go undetected for an extended period of time.

Protecting Yourself Against Cybercrime

With online threats and data breaches happening regularly, having comprehensive online protection is essential to safeguarding your valuable data.

One of the best ways to protect your online privacy is to have reputable anti-virus software installed on all your devices. AOL subscriptions offer products, such as Malwarebytes, to help defend against existing and emerging online threats. It also features smart technology that offers 24/7 protection to help prevent future infections. Other products, like Norton, help keep your sensitive data secure when online.

Now that you’re aware of the most common cybersecurity terms used today, you can better protect yourself against them and know what you’re up against.

Published on 06/06/2023

Related Articles

Top