• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About
    • Secure360
    • UMSA
    • Get Involved
  • Events
    • Secure360 2021
    • Student360
    • Past Events
      • 2020 Secure360 Twin Cities
      • 2020 Student360
      • 2019 Secure360 Twin Cities
      • 2019 Student360
      • 2018 Secure360 Twin Cities
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Secure360 Twin Cities
    • Student360 Sponsors
  • For Speakers
    • Secure360 Speaker Details
    • Student360 Speaker Details
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Defining cybersecurity jargon: N-Z (Part II)

October 15, 2018 by Secure360 and UMSA

Picture of the dictionary definition of the word "vocabulary"

Copyright: aga7ta / 123RF Stock Photo

 

Sometimes, a thorough knowledge of industry-specific jargon can really make a difference in how your peers and potential employers perceive you and your experience. While this fact likely comforts the cybersecurity veterans who are currently reading this, it also probably terrifies those of you who may just be starting out in the industry or have decided to embark on a new career path. Thankfully, getting the low-down on some of the most-used terms is easier than you might think. So easy, in fact, that we’re going to spell them out for you, right now. Read on, readers, for the top cybersecurity terms you need to know (and make sure to check out Part 1 of this blog series, which defines terms A-M.

NIST

The National Institute of Standards and Technology is the division within the United States Department of Commerce that is charged with the duty of setting standards that the federal government must follow in respect to information security and modern cybersecurity threats.

OpSec

Short for “operational security,” is simply the process or processes of identifying “what information needs to be kept secret, and whom you’re trying to keep it a secret from.” These processes include high-tech and low-tech tactics (ex: encryption… and hand-written notes.)

Password manager

Password managers are those wonderful things that keep track of all your usernames, passwords and other login credentials and keep them safe from prying eyes, real or virtual. You need only remember one, master password that gets you into the manager, and the rest is done for you. These can be particularly handy as they can often create difficult, randomized passwords for you that would be extremely difficult for hackers to obtain.

Penetration testing

Also called “pen testing,” penetration testing seeks out and identifies vulnerabilities that a hacker could use to invade a network. Essentially, pen testers try to hack you before the bad guys do, so you can better protect yourself and your organization.

Phishing

Imagine the act of fishing. You put the worm on the hook, you cast it out into open water and you wait for a bite, and then you reel it in to collect your prize. Now, place that into the realm of cybersecurity. Phishing scams involve hackers and malignant actors attempting to trick you via email into giving our your personal information that will thereby allow them to steal your identity. One of the simplest ways of protecting yourself from phishing attempts is to change your passwords regularly and use diligent, safe online practices.

Plaintext

Text that has not been encrypted, of course.

Ransomware

Just like in the movies when the villain kidnaps the queen and refuses to return her without an ominous black bag filled with millions of dollars, so does ransomware. In this type of cyberextortion, a certain malware locks your computer and won’t let you gain access to your files without giving up a huge chunk of cash. Blackmail is often involved, as well, if the wrong people have the right information.

Root

“The root of the problem,” the root of a tree, etc. This is merely the term used to describe the deepest, most fundamental foundation of a system, access to which a hacker could manipulate in order to completely takeover said system, were he to obtain it.

Spyware

Literally, malware that spies on you and your data.

Threat hunting

Threat hunting is the process during which security professionals look for threats that already exist within their organization’s IT infrastructure. This differs from penetration testing, although these are often done together to get a comprehensive look at the security of an organization or network.

VPN

A VPN, or Virtual Private Network, is a service that keeps your internet activity secure and private, away from public Wi-Fi and the dangers it poses . Many individuals and corporations will only engage in internet activity through the use of VPNs, and for good reason.

Virus

Just like the flu virus can be passed to you from your colleague at the water cooler, so can a computer virus be passed to your network through the email sent to you by a hacker. Viruses can crash computers, steal data, encrypt and decrypt it, and more. And you thought the flu was bad enough.

Vuln

Another cute little abbreviation in the cybersecurity industry, “vuln” is short for “vulnerability,” and is used to describe vulnerabilities in networks and systems that could be exploited by the wrong people with the right skills.

White hat

Contrary to black hat hackers (yes, who use their powers for the forces of evil), these people are the “good guys” of the hacking world. They are the ones who protect computer networks and often perform penetration testing. Fun fact: black hat hackers often can (and do, often) convert to white hat hackers with the motivation of a good, steady paycheck.  

Well, now that you’re an expert on all the most relevant cybersecurity jargon, you’ll have no problem networking with the many security professionals at Secure360 Twin Cities. Oh, and if you happen to think of one we missed, leave it in the comments section, below!

Filed Under: Cybersecurity, Professional Development

About Secure360 and UMSA

The Secure360 and UMSA team is made up of professionals in the security and risk management industries. Topics of expertise range from physical security, IT, risk management, cybersecurity, cloud, information security and records management.

Reader Interactions

Comments

  1. Baldwin says

    October 16, 2018 at 2:38 am

    A valuable read, I’ve started researching cybersecurity after the Facebook data-leak about three weeks ago. I found out a great article on medium that recommended Surfshark and provided “columbusday” coupon, which gave a 75% discount amounting to just 30e/year, so I bought it. I was a bit disappointed because it had to be set up manually on macOS, but apart from that, it was easy to use, most importantly it hides my information from any spying agencies and provides good speed while on it. I’m guessing more people will start using something like that in the future, having all our information online poses new threats…

    Reply

Leave a Reply to Baldwin Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Categories

  • Uncategorized
  • Guest Posts
  • Business Continuity Management
  • News and Events
  • Physical Security
  • Cybersecurity
  • Professional Development
  • Risk and Compliance

latest tweets

  1. Secure360 Conference
    Secure360 Conference: As much as many of us enjoy it, there are risks to working from home, specifically as we rely more and more on the… https://t.co/S2nuIyWgjk
    about 1 week ago

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2021 Secure360. All rights reserved.