• Support
  • Login
  • Contact
  • Blog
  • Support
  • Login
  • Contact
  • Blog
SecurityScorecard SecurityScorecard
  • Products
    PRODUCTS
    • Security Ratings
      Identify security strengths across ten risk factors.
    • Security Data
      Get actionable, data-based insights.
    • Security Assessments
      Automate security questionnaire exchange.
    • Attack Surface Intelligence
      NEW
      On-demand contextualized global threat intelligence.
    • Automatic Vendor Detection
      Uncover your third and fourth party vendors.
    • Cyber Risk Quantification
      Translate cyber risk into financial impact.
    • Reporting Center
      Streamline cyber risk reporting.
    • SecurityScorecard Marketplace
      Discover and deploy pre-built integrations.
    SERVICES
    • Active Security Services
      Test your security controls.
    • Cyber Risk Intelligence
      Partner to obtain meaningful threat intelligence.
    • Digital Forensics & Incident Response
      Prepare to respond to any threat.
    • Third-Party Risk Management
      Reduce risk across your vendor ecosystem.
    BUY NOW
    • Compare All Plans
      Choose a plan that's right for your business.
    • Try Free Account
      Make informed decisions with confidence.
    • Buy Pro Now
      Add automated event responses.
    • Buy Business Now
      Expand on Pro with vendor management and integrations.
    • Request Enterprise Demo
      See the capabilities of an enterprise plan in action.
    icon__SSClogoMark icon__SSClogoMark

    Understand and reduce risk with SecurityScorecard.

    Free account sign up
  • Solutions
    BY USE CASE
    • Compliance
    • Cyber Insurance
    • Digital Forensics
    • Due Diligence
    • Enterprise Cyber Risk
    • Executive-Level Reporting
    • Incident Response
    • Regulatory Oversight
    • Third-Party Risk
    BY INDUSTRY
    • Critical Infrastructure
    • Enterprise
    • Financial Services
    • Government
    • Healthcare
    • Insurance
    • Retail & Consumer
    • Technology
    Help your organization calculate its risk
    View All Solutions
  • Customers
    OUR CUSTOMERS
    • Customer Overview
      Trusted by companies of all industries and sizes.
    • Peer Reviews
      Find out what our customers are saying.
    SUCCESS AND SUPPORT
    • Customer Success
      Receive award-winning customer service.
    • Support
      Get your questions answered by our experts.
    COMMUNITY
    • SecurityScorecard Connect
      Engage in fun, educational, and rewarding activities.
    • Connect Login
      Join our exclusive online customer community.
    icon__SSClogoMark icon__SSClogoMark
    Understand and reduce risk with SecurityScorecard.
    Free account sign up
  • Partners

    Partner Program Overview

    Partner with SecurityScorecard and leverage our global cybersecurity ratings leadership to expand your solution, deliver more value, and win new business.

    Learn more
    • Locate a Partner
      Access our industry-leading partner network.
    • Value-Added Resellers
      Enter new markets, deliver more value, and get rewarded.
    • Managed Service Providers
      Meet customer needs with cybersecurity ratings.
    • ISAC Partner Program
      Learn more about the industries we support and ISAC member benefits.
    • Technology Alliances
      Access innovative solutions from leading providers.
    • SCORE Portal Login
      Use the SCORE Partner Program to grow your business.
    • SecurityScorecard Marketplace
      Find a trusted solution that extends your SecurityScorecard experience.

    Understand and reduce risk with SecurityScorecard.

    Free account sign up
  • Resources
    RESOURCES
    • Resource Center
      Explore our cybersecurity ebooks, data sheets, webinars, and more.
    • SecurityScorecard Blog
      Read the latest blog posts published weekly.
    • Research & Insights Center
      Access our research on the latest industry trends and sector developments.
    • SecurityScorecard Academy
      NEW
      Complete certification courses and earn industry-recognized badges.
    TOOLS AND DOCUMENTATION
    • Free Security Rating
      Get your free ratings report with customized security score.
    • Product Release Notes
      Visit our support portal for the latest release notes.
    • Free Account Signup
      Start monitoring your cybersecurity posture today.
    • Chrome Extension
      NEW
      Show the security rating of websites you visit.
    • Assessments ROI Calculator
      Calculate the ROI of automating questionnaires.
    Trust begins with transparency. Take a look at the data that drives our ratings.
    Learn more
  • Company

    Working at SecurityScorecard

    Committed to promoting diversity, inclusion, and collaboration–and having fun while doing it.

    Join our team
    • About Us
      SecurityScorecard is the global leader in cybersecurity ratings.
    • Leadership
      Meet the team that is making the world a safer place.
    • Press
      Explore our most recent press releases and coverage.
    • Events
      Join us at any of these upcoming industry events.
    • Policy Insights
      Raising the bar on cybersecurity with security ratings.
    • Careers
      APPLY TODAY
      Come join the SecurityScorecard team!
    • Contact Us
      Contact us with any questions, concerns, or thoughts.
    • Trust Portal
      Take an inside look at the data that drives our technology.
    • Help Center
      We are here to help with any questions or difficulties.
Request a demo
SecurityScorecard SecurityScorecard
  • Support
  • Login
  • Contact
  • Blog
  • Support
  • Login
  • Contact
  • Blog
SecurityScorecard SecurityScorecard
  • Products
    PRODUCTS
    • Security Ratings
      Identify security strengths across ten risk factors.
    • Security Data
      Get actionable, data-based insights.
    • Security Assessments
      Automate security questionnaire exchange.
    • Attack Surface Intelligence
      NEW
      On-demand contextualized global threat intelligence.
    • Automatic Vendor Detection
      Uncover your third and fourth party vendors.
    • Cyber Risk Quantification
      Translate cyber risk into financial impact.
    • Reporting Center
      Streamline cyber risk reporting.
    • SecurityScorecard Marketplace
      Discover and deploy pre-built integrations.
    SERVICES
    • Active Security Services
      Test your security controls.
    • Cyber Risk Intelligence
      Partner to obtain meaningful threat intelligence.
    • Digital Forensics & Incident Response
      Prepare to respond to any threat.
    • Third-Party Risk Management
      Reduce risk across your vendor ecosystem.
    BUY NOW
    • Compare All Plans
      Choose a plan that's right for your business.
    • Try Free Account
      Make informed decisions with confidence.
    • Buy Pro Now
      Add automated event responses.
    • Buy Business Now
      Expand on Pro with vendor management and integrations.
    • Request Enterprise Demo
      See the capabilities of an enterprise plan in action.
    icon__SSClogoMark icon__SSClogoMark

    Understand and reduce risk with SecurityScorecard.

    Free account sign up
  • Solutions
    BY USE CASE
    • Compliance
    • Cyber Insurance
    • Digital Forensics
    • Due Diligence
    • Enterprise Cyber Risk
    • Executive-Level Reporting
    • Incident Response
    • Regulatory Oversight
    • Third-Party Risk
    BY INDUSTRY
    • Critical Infrastructure
    • Enterprise
    • Financial Services
    • Government
    • Healthcare
    • Insurance
    • Retail & Consumer
    • Technology
    Help your organization calculate its risk
    View All Solutions
  • Customers
    OUR CUSTOMERS
    • Customer Overview
      Trusted by companies of all industries and sizes.
    • Peer Reviews
      Find out what our customers are saying.
    SUCCESS AND SUPPORT
    • Customer Success
      Receive award-winning customer service.
    • Support
      Get your questions answered by our experts.
    COMMUNITY
    • SecurityScorecard Connect
      Engage in fun, educational, and rewarding activities.
    • Connect Login
      Join our exclusive online customer community.
    icon__SSClogoMark icon__SSClogoMark
    Understand and reduce risk with SecurityScorecard.
    Free account sign up
  • Partners

    Partner Program Overview

    Partner with SecurityScorecard and leverage our global cybersecurity ratings leadership to expand your solution, deliver more value, and win new business.

    Learn more
    • Locate a Partner
      Access our industry-leading partner network.
    • Value-Added Resellers
      Enter new markets, deliver more value, and get rewarded.
    • Managed Service Providers
      Meet customer needs with cybersecurity ratings.
    • ISAC Partner Program
      Learn more about the industries we support and ISAC member benefits.
    • Technology Alliances
      Access innovative solutions from leading providers.
    • SCORE Portal Login
      Use the SCORE Partner Program to grow your business.
    • SecurityScorecard Marketplace
      Find a trusted solution that extends your SecurityScorecard experience.

    Understand and reduce risk with SecurityScorecard.

    Free account sign up
  • Resources
    RESOURCES
    • Resource Center
      Explore our cybersecurity ebooks, data sheets, webinars, and more.
    • SecurityScorecard Blog
      Read the latest blog posts published weekly.
    • Research & Insights Center
      Access our research on the latest industry trends and sector developments.
    • SecurityScorecard Academy
      NEW
      Complete certification courses and earn industry-recognized badges.
    TOOLS AND DOCUMENTATION
    • Free Security Rating
      Get your free ratings report with customized security score.
    • Product Release Notes
      Visit our support portal for the latest release notes.
    • Free Account Signup
      Start monitoring your cybersecurity posture today.
    • Chrome Extension
      NEW
      Show the security rating of websites you visit.
    • Assessments ROI Calculator
      Calculate the ROI of automating questionnaires.
    Trust begins with transparency. Take a look at the data that drives our ratings.
    Learn more
  • Company

    Working at SecurityScorecard

    Committed to promoting diversity, inclusion, and collaboration–and having fun while doing it.

    Join our team
    • About Us
      SecurityScorecard is the global leader in cybersecurity ratings.
    • Leadership
      Meet the team that is making the world a safer place.
    • Press
      Explore our most recent press releases and coverage.
    • Events
      Join us at any of these upcoming industry events.
    • Policy Insights
      Raising the bar on cybersecurity with security ratings.
    • Careers
      APPLY TODAY
      Come join the SecurityScorecard team!
    • Contact Us
      Contact us with any questions, concerns, or thoughts.
    • Trust Portal
      Take an inside look at the data that drives our technology.
    • Help Center
      We are here to help with any questions or difficulties.
Request a demo
SecurityScorecard SecurityScorecard
BLOG

57 Cybersecurity Terms You Should Know in 2021

06/09/2021

Cybersecurity can seem intimidating, especially when you’re not already familiar with security and IT. There are so many threats and a lot of terms you need to know in order to understand the countermeasures that can help keep your data safe from attackers. What is an attack surface, after all? And what’s a rootkit? Non-technical employees and decision-makers might find their eyes glazing over when cybersecurity terms start getting thrown around.

That said, it’s critical that even employees who don’t work directly with security understand cybersecurity and cybersecurity terms. Security is everyone’s job. According to Ponemon, the average cost of a data breach is $3.86 million. Your organization can also suffer reputational loss and damage to your brand as a result of a breach.

Security does not need to be so confusing. To help you and your non-technical team members better understand security, below is a list of 57 cybersecurity terms you should know in 2021.

  1. Account hijacking – A form of identity theft. When a user’s account is stolen by a bad actor and used to perform malicious actions, that account has been hijacked.
  2. Adware – Software that downloads on a device and automatically displays or downloads advertising when a user is offline.
  3. Advanced Persistent Threats (APTs) – A network intrusion during which a cybercriminal remains quietly in a system, undetected, as they steal data.
  4. Antivirus – Antivirus software refers to any computer program used to prevent, detect, and remove malware. You might think it’s meant to prevent viruses, but malware is more prevalent than viruses these days. Back when antivirus software was developed, however, viruses were a major threat, which is why it’s called “antivirus” and not always “anti-malware.”
  5. Attack surface – Your attack surface is the sum of every possible point where an attacker can enter your work or systems. You can also think of it as the total number of all your cyber vulnerabilities. In cybersecurity, the goal is to make the attack surface as small as possible.
  6. Attack vector – A specific method used by a cybercriminal to infiltrate a system.
  7. Authenticator – Any method of proving who you are to a computer system or software. The most commonly used authenticator is a password, but it can also be a face scan, a fingerprint, or another method of proof.
  8. Backdoor- A vulnerability that allows an unauthorized individual to access a protected part of your network, bypassing your cybersecurity measures. You may not realize you have backdoors.
  9. Backup – A copy of data that allows a user to easily recover lost or locked files.
  10. Blacklist – A list of email addresses known to send spam or other risky messages. A blacklist can help your organization filter out bad messages and phishing emails before employees even see them.
  11. Bot – A program that automatically performs a simple repetitive task. Not all bots are bad, but some are used maliciously.
  12. Brute force attack – An attack method that occurs when a bad actor uses software that runs through all possible combinations to crack a password.
  13. Catfishing – A social engineering attack that occurs when a bad actor uses a social network to create an account with a fake identity to deceive a target.
  14. Cracker – A person who attacks a specific computer system with the intent to do harm.
  15. Cryptojacking – When a criminal uses a user’s computing power without authorization to mine cryptocurrency.
  16. Closed source – Proprietary technology; its source code is hidden. You cannot distribute or modify its code without violating copyright law. Most commercial software is closed source.
  17. Cloud – The cloud, or cloud computing, refers to the on-demand availability of computer system resources, like data storage or computing power, which happens off-site. The cloud allows users to access files from any place and on any device and is usually hosted by a vendor, such as Amazon or Google.
  18. Credential harvesting – The act of virtually attacking an organization to illegally obtain employees’ login information.
  19. Critical infrastructure – Your critical cyberinfrastructure is the computing assets that are essential for your organization to function.
  20. Data Loss Prevention (DLP) – Any security measures related to detecting and preventing data loss.
  21. Data encryption – The act of encoding data so no that no one can read or access it without a decryption key.
  22. Data protection – A set of practices and processes intended to protect private information from getting into the wrong hands.
  23. DDoS (denial-of-service attack) – An attack method that overwhelms a site or server with malicious traffic, rendering it unusable.
  24. DevSecOps — A combination of the words “development,” “security,” and “operations,” DevSecOps is an approach to software development that takes security into account from the beginning of the development process and to the end of a product’s life cycle.
  25. Exploit – The act of taking advantage of a vulnerability in a network.
  26. Extended enterprise – If your enterprise is your organization, the extended enterprise is the organization and all your third parties, such as vendors and suppliers, as well as customers. Anyone outside your organization who has access to your data and networks is a member of your extended enterprise.
  27. Firewall – A network security control that keeps unauthorized traffic out of restricted areas of your network.
  28. Group authenticator – An authentication method used to allow access to specific data or functions that may be shared by all members of a particular group.
  29. Hacker – Anyone who breaks into a computer system using attacks or by exploiting vulnerabilities. Not all hackers are bad; some work for companies to test defenses and discover vulnerabilities. Others breach systems for malicious purposes.
  30. Honeypot – A technique used to distract hackers by offering up a false target, such as a computer or data.
  31. IP Address – An address identifying the connection between a computer and its network provider.
  32. Identity check – A set of actions using one or more authenticators designed to verify a user’s identity.
  33. Incident response plan – a set of steps to be taken to reduce damage from a breach or cyberattack.
  34. Insider threat – A threat to the company’s data that originates inside the organization, such as an employee.
  35. Keylogger – Software that monitors and captures a user’s keystrokes on a keyboard. This sort of software can be used maliciously to steal credentials and sensitive data.
  36. Malware – Short for “malicious software,” that’s exactly what malware is: code designed to harm computers and systems. Malware comes in several destructive flavors: some steal information, some delete it, some spy, and some can destroy a system.
  37. Open Source – Free technology with public source code, which can be shared and modified. Mozilla Firefox and WordPress, for example, are examples of open-source software.
  38. Patch – A regular system update released by developers to fix bugs and other software vulnerabilities.
  39. Password sniffing – A method of stealing usernames and passwords by using software to observe and record network traffic.
  40. Phishing – A social engineering attack in which a bad actor impersonates a trustworthy entity in order to obtain information. Phishing often happens via email, but can also happen through other messaging services.
  41. Personally identifiable information (PII) — PII or personal information is any data that can identify a specific individual, such as name, date of birth, social security number, or financial information. Criminals often seek to steal this sort of sensitive information.
  42. Ransomware – Malware that encrypts data so the victim can’t access it. To obtain a decryption key, the victim must pay a ransom.
  43. Ransomcloud – Ransomware designed to encrypt cloud emails and attachments.
  44. ReCAPTCHA – A system used by Google, which uses a form of Turing test to establish if a user is a human or a robot.
  45. Rootkit – A group of malware designed to gain access to a computer or network, and which usually masks its existence.
  46. Security score — A security or rating rates an organization on their security controls and cybersecurity posture, taking into account risks and vulnerabilities. SecurityScorecard’s ratings, for example, use publicly available data to rate a company’s cybersecurity posture.
  47. Segmentation – The process of separating a network into different protected segments, so that if a criminal gains access to one area of the network, they cannot access the entire network.
  48. Shadow IT— Any IT systems, software, or devices being used in an organization without the authorization of the IT department.
  49. Social engineering – An attack on the people of an organization rather than on the technology. Social engineering attacks are scams intended to trick people into giving out sensitive information.
  50. Spyware – Malware inserted into a system to collect information about a product, an organization, or a person.
  51. Third-party – An individual or organization that is not part of your enterprise but who provides vital services. Third parties include contractors, vendors, partners, and suppliers. Third parties often have access to some part of your cyberinfrastructure.
  52. Threat – A malicious attack intended to cause harm to a computer, software, or network.
  53. Trojan – Malicious code that looks like a legitimate file, program, or application.
  54. Virtual Private Network (VPN) – Any technology that can encapsulate and transmit network data, typically Internet Protocol data, over another network. VPNs let users access network resources that might not be available on the public internet.
  55. Virus – A program that can infect and harm a file, a system, or a network, often attached to a harmlessly looking file or app. Some viruses can replicate themselves.
  56. Vulnerability: A vulnerability is a weakness in an information technology infrastructure that makes it susceptible to cyber attacks.
  57. Worm – Self-replicating malware that spreads from an infected device through a network.
Return to Blog
Join us in making the world a safer place.
FREE ACCOUNT SIGN UP
Products
Solutions
Customers
Marketplace
Partners
Resources
Company
Trust Portal
Security Ratings
Login
Blog
Contact
Careers

SecurityScorecard
Tower 49
12 E 49th St
Suite 15-100
New York, NY 10017

[email protected]

United States: (800) 682-1701
International: +1(646) 809-2166
Social-linkedin Social-facebook Twitter Instagram Youtube