Cybersecurity Glossary for Everyday Users

This glossary is designed to make cybersecurity concepts approachable and practical. Each entry includes a clear definition, a relatable example, and a quick pro tip for everyday security.

A

Adware

Definition: Unwanted software that bombards you with ads, often slowing down your device and tracking your browsing habits.

Example: You download a “free” weather app that constantly shows pop-up ads for dating sites and shopping deals, even when you are not using the app.

Pro Tip: Use trusted ad blockers and privacy-focused browsers to reduce exposure.

Advanced Persistent Threat (APT)

Definition: A long-term, sophisticated cyberattack where criminals infiltrate networks and remain hidden while stealing data.

Example: Hackers spend two years secretly accessing a government agency’s emails.

Pro Tip: Frequent updates and active monitoring are key defenses.

Antivirus Software

Definition: Security software that scans for, blocks, and removes malicious programs.

Example: Your antivirus detects and quarantines a virus hidden in an email attachment before you open it.

Pro Tip: Paid antivirus often includes extra features like secure browsing and identity monitoring.

Attack

Definition: Any deliberate attempt to break into, damage, or steal from digital systems.

Example: Criminals try thousands of password combinations to access your bank account.

Pro Tip: Use strong, unique passwords for each account.

Authentication

Definition: The process of verifying your identity when accessing an account or system.

Example: Entering your password and a one-time code sent to your phone to log into your bank account.

Pro Tip: Two-factor authentication adds a vital second layer of protection.

Availability

Definition: Ensuring digital services and information remain accessible to authorized users when needed.

Example: A hospital’s patient records system must stay online so doctors can access critical information during emergencies.

Pro Tip: Reliable internet connections and backup systems help maintain availability during outages or attacks.

B

Backdoor

Definition: A hidden method that lets attackers bypass normal security measures.

Example: A hacker installs hidden software that allows reentry even after you change passwords.

Pro Tip: Keep software updated and run regular scans.

Biohacking

Definition: Using technology to modify biology, which may introduce cybersecurity risks when devices are implanted or connected to networks.

Example: A person with a connected insulin pump faces risks if hackers gain control of the device’s dosing mechanisms.

Pro Tip: Discuss cybersecurity features with healthcare providers when considering connected devices.

Blockchain

Definition: A distributed ledger that creates tamper-resistant records by storing copies across multiple computers.

Example: Cryptocurrency transactions are recorded on blockchain networks, creating permanent records that cannot be altered after the fact.

Pro Tip: While blockchain technology is robust, the apps and exchanges that use it may have vulnerabilities.

Blocklist

Definition: A tool that automatically blocks access to known dangerous websites, email addresses, or IP addresses.

Example: Your email provider sends messages from known spam domains to your junk folder.

Pro Tip: Many routers and security tools let you create custom blocklists for additional protection.

Bluejacking

Definition: Sending unwanted messages to nearby Bluetooth-enabled devices without the owner’s permission.

Example: Someone in a cafe sends anonymous messages to random customers’ phones via Bluetooth.

Pro Tip: Keep Bluetooth set to non-discoverable when not actively pairing.

Bluesnarfing

Definition: Stealing information from Bluetooth-enabled devices by exploiting insecure connections.

Example: A criminal accesses contacts and photos from a phone left in discoverable mode.

Pro Tip: Turn off Bluetooth when not needed, and never accept pairing requests from unknown devices.

Bot

Definition: Automated software that performs repetitive tasks; bots can be helpful or malicious.

Example: Social media bots automatically post fake reviews or spread misinformation.

Pro Tip: Be skeptical of accounts that post frequently with generic messages.

Botnet

Definition: A network of infected computers secretly controlled by criminals to launch attacks or send spam.

Example: Thousands of home computers infected with malware simultaneously attack a company’s website, causing it to crash.

Pro Tip: Keep devices updated and use reputable security software to avoid becoming part of a botnet.

Brute-Force Attack

Definition: A method where attackers try many password combinations until one works.

Example: Software attempts every possible 4-digit PIN on a stolen phone.

Pro Tip: Long, complex passwords with mixed characters make brute-force attacks impractical.

Bug

Definition: An unintended error in software code that can cause unexpected behavior or create security vulnerabilities.

Example: A bug in a banking app accidentally allows users to see other customers’ account balances.

Pro Tip: Install software updates promptly; they often fix newly discovered bugs.