Cyber security Definitions & terminologies
An encrypted connection between a device and a network via the Internet is known as a virtual private network, or VPN. Secure transmission of sensitive data is aided by the encrypted connection. It makes it impossible for unauthorized parties to eavesdrop on the traffic and enables remote work for the user.
Virtual private network (VPN)
A computer virus is a type of malware that modifies and inserts its own code into other computer programmes in order to further spread itself.
Virus
TCP/IP
TCP/IP stands for Transmission Control Protocol/Internet Protocol it is a communication protocol used to interconnect network devices on the internet. It uses the client server model of communication. TCP/IP functionality is divided into four layers - application layer, transport layer, network layer & physical layer.
Antivirus
It is a software that is designed to detect and destroy computer viruses
Authentication
It is a process of recognizing & verifying users identity before granting them access to the computer system or network
Bug
It is an unexpected problem occurring in the software or hardware which causes it to not function correctly.
The process of finding the bug in a set of computer instructions is called debugging
Cryptography
The use of codes to secure information and communications in such a way that only the intended recipients can decipher and process them is known as cryptography. therefore limiting access to information by unauthorized parties
Cyber attacks
An effort on behalf of hackers to harm or take down a computer network or system.
Cyber attacks aim to disable, disrupt, destroy or control computer systems or to alter, block, delete, manipulate or steal the data held within these systems.
Dark web
A part of the World Wide Web known as the "dark web" or "darknet" is only accessible using specialized software or tools. Because they frequently share illicit and stolen information, including people's personally identifiable information, this keeps its users and visitors anonymous. Social Security numbers, contact details, and credit card numbers are examples of this data.
Encryption
Encoding data is the process of encryption in cryptography. This technique transforms the information's original plaintext representation into a different representation known as ciphertext. Only parties with the proper authorization should be able to convert ciphertext to plaintext and gain access to the original data.
Firewall
A firewall is a network security system that keeps track of incoming and outgoing network traffic and makes decisions about which traffic to allow or deny in accordance with a set of security rules.
Ethical hacking
When someone uses another person's name, identification number, or credit card number without that person's consent to commit fraud or other crimes, it is known as identity theft.
Identity theft
IP address
Every device that is connected to the internet is given a specific identification number called an Internet Protocol (IP) address.There are four different types of IP addresses public, private, static, and dynamic.
Get a Quote
This is a Paragraph. Click on "Edit Text" or double click on the text box to start editing the content.