Glossary

Cybersecurity

Cybersecurity is a catch-all term for the various approaches, technology, tools, frameworks, methods, and best practices designed to secure computer systems from unauthorized access and exploitation.

Terms related to Cybersecurity: Information security, malware, hackers, attack vectors, social engineering, phishing, penetration testing, exploits, antivirus, firewalls, security monitoring.

Cybersecurity seeks to prevent hackers, criminals, and other bad actions from accessing, using, damaging, exploiting, or breaching computer systems. These computer systems are typically connected to the internet, which is how the vast majority of attacks will take place.

Cybersecurity is made up of several different approaches and disciplines, including network security, disaster recovery and backups, application security, information security, end user training, and operational security. Cybersecurity is typically the responsibility of IT service delivery, and should ideally be carried out by computer security experts.

As attack methods and vectors evolve, cybersecurity needs to keep up with changes to how hackers try to exploit computer systems. As a result, many cybersecurity practitioners are moving to a proactive, adaptable approach that identifies all threats and risks and takes appropriate steps to control and eliminate each one.

There are several types of cybersecurity threat, including:

  • Malware which installs itself into a computer system and uses viruses, worms, trojans, ransomware, and other malicious software to exploit a system and steal data.
  • Social engineering which uses things like phishing attacks to steal logins and passwords from users which criminals then use to gain access.
  • Vulnerability exploitation through using known weaknesses in computer systems to gain access and steal data or damage systems.

There are many ways to protect a business using cybersecurity, including antivirus, firewalls, vulnerability assessments, security monitoring, penetration testing, multi-factor authentication, and more.

Cybersecurity Resources from Crossmatch