There are too many to remember! Whether you are going into the cyber world,
or into a helpdesk role, or just want to improve your IT knowledge then
these terms are useful to know and wrap your head around.
We have put together this handy guide of cyber security and tech related terms
and acronyms that everyone needs to know below!
AWS - Amazon Web Services
Amazon Web Services - AWS is a cloud services platform. It offers database
storage, content delivery, compute power, and much more.
ML - Machine Learning
Machine Learning - The ability of a machine to learn and integrate new
information.
VPN - Virtual Private Networks
Virtual Private Networks – VPNs are used to represent a secure connection
between a network and a user.
APT - Advanced Persistent Threat
Advanced Persistent Threat - A cyber-attack that continuously uses advanced
techniques to conduct cyber crime.
CSP - Cloud Service Provider
Cloud Service Provider - The big three CSPs are Amazon Web Services (AWS),
Google Cloud Platform (GCP), and Azure.
WAS - Web Application Security
Web Application Security - All the tooling needed to carry out security testing
against web apps.
CEH - Certified Ethical Hacker
Certified Ethical Hacker – An individual certified in the specific discipline of
ethical hacking.
CND - Computer Network Defence
Computer Network Defence – The actions taken through the use of computer
networks to protect, monitor, analyse, detect, and respond to unauthorised
activity of systems and networks.
AV - Antivirus
Antivirus - A computer program used to prevent, detect, and remove malware.
CTI - Cyber Threat Intelligence
Cyber Threat Intelligence – Information about threats and threat actors that
helps mitigate harmful events in cyberspace.
DDoS - Distributed Denial of Service
Distributed Denial of Service – A form of cyber attack. This attack aims to make
a service such as a website unusable by “flooding” it with malicious traffic or
data from multiple sources (often botnets).
Honeypot (honeynet)
A decoy system or network that serves to attract potential attackers, protecting
actual systems by detecting attacks or deflecting them. A good tool for learning
about attack styles. Multiple honeypots form a honeynet.
Has this article convinced you that
a
career in cyber
security is right for you? If so, click here to see our
training!