Cybersecurity Glossary for Everyday Users
This glossary is designed to make cybersecurity concepts approachable and practical. Each entry includes a clear definition, a relatable example, and a quick pro tip for everyday security.
A
Adware
Definition: Unwanted software that bombards you with ads, often slowing down your device and tracking your browsing habits.
Example: You download a “free” weather app that constantly shows pop-up ads for dating sites and shopping deals, even when you are not using the app.
Pro Tip: Use trusted ad blockers and privacy-focused browsers to reduce exposure.
Advanced Persistent Threat (APT)
Definition: A long-term, sophisticated cyberattack where criminals infiltrate networks and remain hidden while stealing data.
Example: Hackers spend two years secretly accessing a government agency’s emails.
Pro Tip: Frequent updates and active monitoring are key defenses.
Antivirus Software
Definition: Security software that scans for, blocks, and removes malicious programs.
Example: Your antivirus detects and quarantines a virus hidden in an email attachment before you open it.
Pro Tip: Paid antivirus often includes extra features like secure browsing and identity monitoring.
Attack
Definition: Any deliberate attempt to break into, damage, or steal from digital systems.
Example: Criminals try thousands of password combinations to access your bank account.
Pro Tip: Use strong, unique passwords for each account.
Authentication
Definition: The process of verifying your identity when accessing an account or system.
Example: Entering your password and a one-time code sent to your phone to log into your bank account.
Pro Tip: Two-factor authentication adds a vital second layer of protection.
Availability
Definition: Ensuring digital services and information remain accessible to authorized users when needed.
Example: A hospital’s patient records system must stay online so doctors can access critical information during emergencies.
Pro Tip: Reliable internet connections and backup systems help maintain availability during outages or attacks.
B
Backdoor
Definition: A hidden method that lets attackers bypass normal security measures.
Example: A hacker installs hidden software that allows reentry even after you change passwords.
Pro Tip: Keep software updated and run regular scans.
Biohacking
Definition: Using technology to modify biology, which may introduce cybersecurity risks when devices are implanted or connected to networks.
Example: A person with a connected insulin pump faces risks if hackers gain control of the device’s dosing mechanisms.
Pro Tip: Discuss cybersecurity features with healthcare providers when considering connected devices.
Blockchain
Definition: A distributed ledger that creates tamper-resistant records by storing copies across multiple computers.
Example: Cryptocurrency transactions are recorded on blockchain networks, creating permanent records that cannot be altered after the fact.
Pro Tip: While blockchain technology is robust, the apps and exchanges that use it may have vulnerabilities.
Blocklist
Definition: A tool that automatically blocks access to known dangerous websites, email addresses, or IP addresses.
Example: Your email provider sends messages from known spam domains to your junk folder.
Pro Tip: Many routers and security tools let you create custom blocklists for additional protection.
Bluejacking
Definition: Sending unwanted messages to nearby Bluetooth-enabled devices without the owner’s permission.
Example: Someone in a cafe sends anonymous messages to random customers’ phones via Bluetooth.
Pro Tip: Keep Bluetooth set to non-discoverable when not actively pairing.
Bluesnarfing
Definition: Stealing information from Bluetooth-enabled devices by exploiting insecure connections.
Example: A criminal accesses contacts and photos from a phone left in discoverable mode.
Pro Tip: Turn off Bluetooth when not needed, and never accept pairing requests from unknown devices.
Bot
Definition: Automated software that performs repetitive tasks; bots can be helpful or malicious.
Example: Social media bots automatically post fake reviews or spread misinformation.
Pro Tip: Be skeptical of accounts that post frequently with generic messages.
Botnet
Definition: A network of infected computers secretly controlled by criminals to launch attacks or send spam.
Example: Thousands of home computers infected with malware simultaneously attack a company’s website, causing it to crash.
Pro Tip: Keep devices updated and use reputable security software to avoid becoming part of a botnet.
Brute-Force Attack
Definition: A method where attackers try many password combinations until one works.
Example: Software attempts every possible 4-digit PIN on a stolen phone.
Pro Tip: Long, complex passwords with mixed characters make brute-force attacks impractical.
Bug
Definition: An unintended error in software code that can cause unexpected behavior or create security vulnerabilities.
Example: A bug in a banking app accidentally allows users to see other customers’ account balances.
Pro Tip: Install software updates promptly; they often fix newly discovered bugs.