Cybersecurity Glossary for Beginners
This glossary explains common cybersecurity terms in simple language. Use it as a quick reference while reading the guide.
Access Control
Rules that decide who is allowed to open, use, or change something, like a file, account, or system.
Adware
Software that shows unwanted ads. Sometimes it also tracks what you do online.
Antivirus
A program that helps find, block, and remove harmful software from your device.
Authentication
The process of proving you are really you, usually with a password, code, fingerprint, or app approval.
Authority Bias
When people trust someone because they seem important, like a boss, teacher, police officer, or IT worker.
Backup
A saved copy of important files. Backups help you recover if your device breaks or gets attacked.
Baiting
A trick where attackers tempt you with something interesting, like a free download or mysterious USB drive.
Botnet
A group of infected devices secretly controlled by an attacker, often used to send spam or attack websites.
Brute Force Attack
When an attacker keeps guessing passwords until they find the right one.
Business Email Compromise
A scam where attackers pretend to be a boss, vendor, or coworker to steal money or information.
Clickjacking
A trick that makes you click something different from what you think you are clicking.
Credential Theft
When someone steals login information, such as usernames, passwords, or verification codes.
Credential Stuffing
When stolen passwords from one website are used to try logging into other websites.
Cyber Hygiene
Good everyday habits that keep you safer online, like updating apps and using strong passwords.
Data Breach
When private information is exposed, stolen, or accessed by someone who should not have it.
Deepfake
Fake audio, video, or images made with AI to look or sound like a real person.
Encryption
A way of scrambling information so only the right person or system can read it.
Endpoint
Any device connected to a network, such as a phone, laptop, tablet, or desktop computer.
Firewall
A security tool that helps block unsafe traffic from entering or leaving a network.
Human Firewall
A person who helps stop cyberattacks by noticing suspicious messages and making safe choices.
Impersonation
When an attacker pretends to be someone trusted, like a friend, coworker, company, or school.
Incident Response
The steps taken after a cyber problem happens, such as reporting it, stopping damage, and recovering safely.
Insider Threat
A risk caused by someone inside an organization, either by mistake or on purpose.
Keylogger
Malware that records what you type, often to steal passwords or private messages.
Least Privilege
A rule that people should only have the access they truly need, and nothing extra.
Malware
Harmful software that can steal information, damage devices, spy on users, or give attackers access.
Man-in-the-Middle Attack
When an attacker secretly watches or changes messages between two people or systems.
Multi-Factor Authentication
A login method that asks for more than one proof, like a password and phone approval.
Patch
An update that fixes a problem or security weakness in software.
Password Manager
A tool that creates and stores strong passwords so you do not have to remember them all.
Phishing
A fake message designed to trick you into clicking a link, opening a file, or sharing information.
Pretexting
When an attacker creates a fake story to make their request seem believable.
Quishing
Phishing that uses QR codes to send people to fake or harmful websites.
Ransomware
Malware that locks your files and demands payment to unlock them.
Risk
The chance that something bad could happen because of a weakness or threat.
Scareware
Fake warnings that try to scare you into downloading something, calling a scammer, or paying money.
Security Awareness
Learning how to recognize cyber threats and make safer choices online.
Shoulder Surfing
When someone watches you type private information, like a password or PIN.
Smishing
Phishing through text messages, often pretending to be a bank, delivery service, or company.
Social Engineering
Tricking people into doing something unsafe by using psychology instead of technical hacking.
Spear Phishing
A phishing attack made for a specific person, job, school, or company.
Spoofing
Making something look like it came from a trusted source, such as an email address or phone number.
Spyware
Software that secretly watches what you do and collects information from your device.
Threat Actor
A person or group that tries to cause harm, steal data, scam people, or break into systems.
Trojan
Malware that hides inside something that looks safe, like a fake app or file.
Two-Factor Authentication
A type of MFA that uses exactly two steps, like a password plus a text code.
URL
The web address of a page. Attackers often use fake URLs that look almost real.
Vishing
Phishing by phone call, where scammers talk you into giving information or taking action.
Vulnerability
A weakness that attackers can use, like outdated software, weak passwords, or careless habits.
Zero Trust
A security idea that says no user or device should be trusted automatically. Everything must be verified.