backdoor
an alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.

breach

The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.

bug

An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction

data breach

When sensitive, protected, or confidential information is intentionally released to an untrusted environment

data encryption

Transforming data in such a way that only approved parties can decrypt and access it.

ethical hacking 

The practice of locating vulnerabilities and weaknesses in information systems and computers by duplicating the actions and intent of malicious hackers who seek to bypass security and search for gaps in systems that can be exploited.

firewall

A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.

hacker

A cyber attacker who uses software and social engineering methods to steal data and information.

insider threat

A malicious threat to a group or organization that comes from someone within, like an employee, contractor, or business associate, who has insider information regarding the organization’s data, computer systems, or security measures

malware

Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.

phishing

The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.

ransomware

A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.

skynet

A fictional distributed artificial intelligence system that is aware of the physical world and can act through robots and computer control systems.

spyware

A type of malware that functions by spying on user activity without their knowledge. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.