0

15 Cybersecurity Terms You Must Know to Protect Your Enterprise IT Systems

cyber crime

Usually cybersecurity terms are neglected by any employee or IT Staff in an organization and does not not mean much to them. But this terms value only when an enterprise organization is faced with a potential data breach. Cybersecurity terms helps to understand  the scenario when any breach occur.

The following are the 15 cybersecurity terms that you should know to secure your enterprise systems

Detection deficit – Time it takes to discover a breach from the time of compromise.

Malware – Categorical term for various forms of malicious software designed to damage or access computers without knowledge of the owner.

Crimeware – A specific classification of malware designed for the sole purpose of conducting illegal activity.

RAM-scraping malware – Memory-scraping malware that helps attackers find sensitive data that isn’t available through other processes.

Exploit kits – Think of it as a pre-packaged cyberattack for dummies. Varying in complexity and targeted vulnerability the key characteristic is the easy-to-use nature of the kit. Unsophisticated attackers who lack expertise in IT or cybersecurity will typically find a user-friendly interface to initiate and manage the attack.

CVECommon Vulnerabilities and Exposures is a dictionary of publicly known information about security vulnerabilities and exposures.

CVSSCommon Vulnerability Scoring System is designed to provide an open and standardized method for rating IT vulnerabilities.

JBOH – Java-Script-Binding-Over-HTTP, which enables an attacker to execute code remotely on Android devices that have affected apps.

IDS or IPS – Intrusion Detection Systems or Intrusion Prevention Systems may come in the form of a software application or device used to monitor a specific system or network for signs of malicious activities.

POS intrusions –Point-of-sale intrusions are attacks that occur on the device transacting a sale. The device may be various forms of digital cash registers used across many industries.

Payment Card Skimmers – Malicious card readers that cybercriminals place on payment terminals, ATM’s or anywhere a credit card swipe occurs to copy the data from the magnetic strip on the card.

DDoS Attack – A distributed denial-of-service attack is an attempt to make an online resource unavailable to users by overwhelming the resource with maliciously generated traffic.

Cyberespionage – The act of stealing confidential information digitally stored on computers or networks within a government or organization.

Botnet – Malware infected computers grouped together to form a network and controlled remotely. These networks can be recruited by the controller in a DDoS attack or to send spam emails.

Ransomware – Malware specifically designed to block access to systems or information until a ransom is paid.

 

Bijay Limbu Senihang

Chief Technology Officer of Rigo Technology

Leave a Reply

Your email address will not be published. Required fields are marked *