đ Cybersecurity Vocabulary
Understand all the technical terms used in the game. Each term is explained in simple language to help you learn.
đĻ Malware
Threat
Simple: Bad software designed to harm your computer.
Technical: Malicious software that includes viruses, trojans, spyware, and ransomware. It can steal data, damage files, or take control of systems.
đŖ Phishing
Threat
Simple: Fake emails or messages trying to trick you into giving passwords or personal info.
Technical: Social engineering attack using fraudulent communications (email, SMS, calls) to deceive victims into revealing sensitive information or installing malware.
đ Ransomware
Threat
Simple: Malware that locks your files and demands payment to unlock them.
Technical: Type of malware that encrypts victim's data and demands ransom payment (usually cryptocurrency) for the decryption key. Can spread through networks.
đĒ Backdoor
Threat
Simple: A secret way for hackers to get into a system without being detected.
Technical: Hidden method of bypassing normal authentication to gain unauthorized access to a system. Can be intentionally created by attackers or accidentally left by developers.
đ SQL Injection
Threat
Simple: Inserting malicious code into website forms to access or steal database information.
Technical: Code injection technique that exploits security vulnerabilities in database-driven applications by inserting malicious SQL statements into entry fields.
đĻ Virus
Threat
Simple: Harmful program that copies itself and spreads to other computers.
Technical: Self-replicating malware that attaches to files or programs and spreads when executed. Can corrupt data, consume resources, or enable other attacks.
đģ DDoS Attack
Threat
Simple: Overwhelming a website with fake traffic to make it crash or slow down.
Technical: Distributed Denial of Service - coordinated attack from multiple computers flooding a target with requests, making it unavailable to legitimate users. Often uses botnet networks.
đ Network Sniffing
Threat
Simple: Secretly capturing and reading data traveling over a network.
Technical: Packet sniffing intercepts network traffic to steal passwords, emails, or sensitive data. Common on unsecured WiFi. HTTPS and VPN protect against sniffing.
đ¤ Botnet
Threat
Simple: A network of infected computers controlled by hackers to launch attacks.
Technical: Collection of compromised computers (bots/zombies) remotely controlled to perform coordinated attacks like DDoS, spam distribution, or cryptocurrency mining without owners' knowledge.
đą SIM Swapping
Threat
Simple: Stealing your phone number by convincing your carrier to transfer it to a new SIM card.
Technical: Social engineering attack targeting mobile carriers to port victim's number to attacker's SIM. Bypasses SMS-based 2FA and allows account takeovers. Use authenticator apps instead of SMS.
đĄī¸ Firewall
Defense
Simple: A security barrier that blocks unwanted connections to your computer or network.
Technical: Network security system that monitors and controls incoming/outgoing traffic based on predetermined security rules. Acts as barrier between trusted and untrusted networks.
đ Encryption
Defense
Simple: Scrambling data so only people with the right key can read it.
Technical: Process of encoding information using algorithms so only authorized parties with the decryption key can access it. Protects data confidentiality.
đ Password
Defense
Simple: Secret word or phrase that proves who you are to access accounts.
Technical: Authentication credential consisting of a string of characters used to verify user identity. Strong passwords use combinations of letters, numbers, and symbols.
đ Two-Factor Authentication (2FA)
Defense
Simple: Using two different ways to prove it's really you (password + phone code).
Technical: Security process requiring two different authentication factors: something you know (password), something you have (phone), or something you are (fingerprint).
đ Multi-Factor Authentication (MFA)
Defense
Simple: Using multiple ways to prove your identity (2 or more methods).
Technical: Enhanced authentication requiring multiple verification methods. Can include password, SMS code, authenticator app, biometrics, or hardware tokens. Stronger than 2FA because it can use 3+ factors.
đ VPN
Defense
Simple: Creates a secure, private tunnel for your internet connection.
Technical: Virtual Private Network - encrypts internet traffic and routes it through remote servers, hiding your IP address and protecting data from interception.
đ HTTPS
Protocol
Simple: Secure version of website connections (look for the padlock đ).
Technical: HyperText Transfer Protocol Secure - HTTP with SSL/TLS encryption. Ensures data sent between browser and website is encrypted and authenticated.
đĄ WiFi Security (WPA/WEP)
Protocol
Simple: Methods to protect wireless networks with passwords.
Technical: WiFi Protected Access (WPA/WPA2/WPA3) - modern, secure. Wired Equivalent Privacy (WEP) - outdated, easily cracked. WPA3 is currently the most secure.
đ§ Email Security (SPF/DKIM)
Protocol
Simple: Ways to verify that emails really come from who they say they're from.
Technical: SPF (Sender Policy Framework) validates sender IP addresses. DKIM (DomainKeys Identified Mail) uses digital signatures. Both prevent email spoofing.
đĄ FTP (File Transfer Protocol)
Protocol
Simple: Old method for transferring files over internet (not secure).
Technical: File Transfer Protocol - sends files unencrypted. Passwords and data are visible to attackers. Use SFTP (secure FTP) or FTPS instead for encrypted transfers.
đ ARP (Address Resolution Protocol)
Protocol
Simple: Network protocol that connects IP addresses to physical device addresses.
Technical: Maps IP addresses to MAC addresses on local networks. Vulnerable to ARP spoofing attacks where attacker tricks devices to send traffic through them for man-in-the-middle attacks.
đĸ WEP (Wired Equivalent Privacy)
Protocol
Simple: Old, outdated WiFi security that's easily hackable (never use this).
Technical: Obsolete WiFi encryption from 1999. Can be cracked in minutes with freely available tools. Replaced by WPA, WPA2, and WPA3. If your router only has WEP, replace it immediately.
đ Email Attachments
Concept
Simple: Files sent with emails that can contain viruses or malware.
Technical: Files attached to emails can contain malicious payloads. Dangerous extensions: .exe, .zip, .scr, .js. Double extensions like "invoice.pdf.exe" are classic phishing tactics.
đ§ Email Sender Verification
Concept
Simple: Checking if an email really comes from who it claims to be from.
Technical: Verify sender email address matches the domain. Check for typos (paypa1.com vs paypal.com). Display name can be faked, only the actual email address matters.
đ Domain Name
Concept
Simple: The main address of a website (like google.com).
Technical: The root domain comes AFTER the last dot before the first slash. Subdomains come before. "microsoft.security-check.info" - real domain is "security-check.info", NOT microsoft.
đ Man-in-the-Middle Attack
Concept
Simple: Someone secretly intercepting your communication with a website.
Technical: Attacker positions themselves between user and legitimate service, intercepting or modifying data. Common on public WiFi. HTTPS prevents this by encrypting communication.
đą Captive Portal
Concept
Simple: A login page that appears when you connect to public WiFi.
Technical: Web page requiring authentication before allowing network access. Legitimate on public WiFi (hotels, airports) but can be faked by attackers in "Evil Twin" attacks.
đ SSL Certificate
Concept
Simple: Digital document that proves a website uses encryption (the padlock icon).
Technical: SSL/TLS certificate enables HTTPS encryption. Important: Valid certificate = encryption only, NOT trustworthiness. Phishing sites can have valid certificates too (Let's Encrypt).
đģ RDP (Remote Desktop Protocol)
Concept
Simple: Technology to control a computer remotely from another location.
Technical: Windows protocol for remote computer access. NEVER expose RDP directly to the internet - subject to massive brute-force attacks. Use VPN + IP filtering instead.
đ Evil Twin Attack
Concept
Simple: Fake WiFi network that looks exactly like a real one.
Technical: Attacker creates rogue access point with identical name (SSID) as legitimate network. When victims connect, attacker can intercept all traffic and steal credentials.
đ¨ Brute Force Attack
Concept
Simple: Trying thousands of password combinations automatically until finding the right one.
Technical: Automated attack testing all possible password combinations. Longer passwords exponentially harder to crack. "password123" = seconds, "MyDog!sC00l#2024" = years.
đ Passphrase
Concept
Simple: A long password made of multiple words instead of random characters.
Technical: Multi-word password that's easier to remember but harder to crack. Length beats complexity: "correct horse battery staple" > "Tr0ub4&0r!". Recommended 4+ random words.
đ OSINT (Open Source Intelligence)
OSINT
Simple: Finding information about someone or something using publicly available sources.
Technical: Intelligence gathering from public sources: social media, websites, public records, images, metadata. Used by security professionals, journalists, and investigators. Can reveal sensitive information people didn't realize was public.
đĩī¸ OSINT Techniques
OSINT
Simple: Methods to find hidden information in photos, documents, and online profiles.
Technical: Common techniques include: Reverse image search (find where photo appeared online), metadata extraction (EXIF data from images), geolocation (identifying location from visual clues), username correlation (finding same username across platforms), and WHOIS lookups (domain registration info).
đ¸ EXIF Data
OSINT
Simple: Hidden information stored in photos (date, time, camera model, GPS location).
Technical: Exchangeable Image File Format - metadata embedded in photos by cameras and smartphones. Includes GPS coordinates, device model, camera settings, timestamps. Remove before sharing sensitive photos using tools or apps.
đ Geolocation
OSINT
Simple: Figuring out where a photo was taken by looking at visible landmarks or clues.
Technical: OSINT technique to identify location from images without GPS data. Analyze: building architecture, street signs, language on signs, vegetation, shadows/sun angle, vehicle types, business names. Cross-reference with Google Street View.
đ Reverse Image Search
OSINT
Simple: Upload a photo to find where else it appears online.
Technical: OSINT tool (Google Images, TinEye, Yandex) that finds similar or identical images online. Reveals if photo was stolen, edited, or previously posted. Can identify people, places, or objects. Useful for verifying authenticity.
đ Digital Footprint
OSINT
Simple: All the information about you that exists online.
Technical: Trail of data left by online activity: social media posts, comments, photos, account registrations, search history, IP addresses. Can be collected via OSINT. Permanent and searchable. Minimize by privacy settings and thinking before posting.
đ Metadata
Concept
Simple: Hidden information about files (when created, by who, where taken).
Technical: Data about data. For photos: GPS location, camera model, timestamp. For documents: author, edit history. Can reveal sensitive information if not removed.
đ¤ Social Engineering
Concept
Simple: Manipulating people into giving away confidential information.
Technical: Psychological manipulation exploiting human behavior rather than technical vulnerabilities. Includes phishing, pretexting, baiting, and tailgating.
đ URL/Link Safety
Concept
Simple: Checking if website addresses are real or fake before clicking.
Technical: Verifying URLs for legitimacy: check domain spelling, look for HTTPS, hover to preview actual destination, avoid shortened links from unknown sources.
đą Mobile Security
Concept
Simple: Protecting your smartphone from theft, malware, and data loss.
Technical: Includes device encryption, screen locks, app permissions management, remote wipe capabilities, avoiding unofficial app stores, and keeping OS updated.
âī¸ Cloud Security
Concept
Simple: Protecting data stored online (like Google Drive, iCloud).
Technical: Securing data stored in cloud services through encryption, access controls, multi-factor authentication, and understanding shared security responsibility model.
đ´ââ ī¸ Hacker
Concept
Simple: Someone who breaks into computer systems. Can be good (ethical) or bad (criminal).
Technical: White hat (ethical hackers help fix security), Black hat (criminals), Grey hat (between both). Use skills to find and exploit vulnerabilities.
đ Data Breach
Concept
Simple: When hackers steal private information from a company's database.
Technical: Security incident where sensitive, protected, or confidential data is accessed, stolen, or used by unauthorized individuals. Can affect millions of users.
đ Phone Number Privacy
Concept
Simple: Being careful about where you share your phone number.
Technical: Protecting phone numbers to prevent SIM swapping attacks, SMS phishing, spam calls, and identity theft. Use temporary numbers for untrusted services.
No terms found matching your search.