Willis News

Cybersecurity Technical Glossary

October 18, 2024

To help you navigate the terminology used in the industry, we’ve created a glossary of key cybersecurity terms.

AI (Artificial Intelligence)

A branch of computer science focused on creating smart machines capable of performing tasks that typically require human intelligence.

Cloud Computing

The delivery of computing services, including storage, servers, databases, and software, over the internet (“the cloud”)

Quantum Computing

An advanced field of computing that leverages quantum mechanics to perform calculations far faster than traditional computers. While quantum computing holds great potential, it also threatens current encryption methods, as quantum algorithms could easily break many encryption standards used today.

Firewall

A network security tool that monitors and controls incoming and outgoing network traffic. It creates a barrier between a trusted internal network and untrusted external networks, using pre-defined security rules to block unauthorized access while allowing safe communication

Social Engineering

A tactic attackers use to manipulate individuals into divulging confidential information or taking actions that compromise security. 

Zero Trust Architecture

A security framework that assumes no user, device, or system can be trusted by default—even those within the network perimeter. It enforces continuous verification for every access request, minimizing the potential for breaches by limiting unnecessary trust.

Autonomous Security Systems

AI-driven system that can detect, respond to, and mitigate cybersecurity threats with minimal human intervention.

Penetration Testing

A simulated cyberattack conducted to evaluate the security of a system or network by identifying vulnerabilities.

AI-Driven Threats

Cyberattacks that leverage artificial intelligence (AI) and machine learning to improve their precision, adapt to defenses, and automate malicious activities. These threats can include AI-enhanced phishing, malware, and automated intrusion detection evasion.

Vulnerability Assessment

The process of identifying, analyzing, and prioritizing potential vulnerabilities in systems, networks, or software. The goal is to uncover security gaps so organizations can take proactive measures to mitigate risks before attackers exploit them.

Next-Generation Firewall (NGFW)

A Next-Generation Firewall (NGFW) extends beyond traditional firewalls by offering advanced features such as intrusion prevention systems (IPS), deep packet inspection (DPI), and application control. NGFWs are essential in modern networks to detect and block more sophisticated attacks.

CompTIA Security+

A globally recognized, vendor-neutral entry-level cybersecurity certification. It validates a candidate’s ability to handle core security tasks such as network security, threat management, and incident response, making it a popular choice for early-career cybersecurity professionals.

Fortinet NSE Certification

A certification program that validates an individual’s expertise in network security and firewall management. It includes multiple levels, ranging from foundational knowledge to advanced security skills.

Ethical Hacking

The practice of of legally penetrating systems or networks to identify security vulnerabilities before malicious hackers can exploit them. Ethical hackers, also known as white-hat hackers, help organizations strengthen their defenses by simulating real-world attacks.

Cloud Security

The policies, technologies, and practices designed to protect data, applications, and infrastructure in cloud environments. It includes identity management, encryption, and compliance monitoring to ensure that cloud-based resources remain secure across multiple providers and locations.

Machine Learning (ML)

A subset of AI that allows computers to learn from data and improve performance over time without being explicitly programmed. ML powers many automated threat detection systems in cybersecurity.

Governance, Risk, and Compliance (GRC)

A framework used to align an organization’s IT policies with business goals while managing risks and ensuring compliance with legal regulations like GDPR and CCPA.

Multi-Cloud Environment

The use of multiple cloud providers (such as AWS, Azure, and Google Cloud) to store data and run applications. Securing multi-cloud environments requires specialized knowledge and tools.

Quantum-Resistant Algorithms

Encryption methods designed to withstand attacks from quantum computers. These algorithms are being developed to replace current encryption standards once quantum computing becomes mainstream.

Autonomous Security Systems

Automated systems designed to monitor, analyze, and respond to cybersecurity threats without requiring human intervention. These systems can take actions like isolating compromised networks, applying patches, or neutralizing threats in real-time to minimize damage.

Phishing

A type of cyberattack where attackers send deceptive messages, often posing as trusted sources, to trick individuals into revealing personal or sensitive information. These attacks commonly occur through email, social media, or text messages and can lead to identity theft or unauthorized access to accounts.

Ransomware

A form of malicious software that encrypts or locks a user’s files and data, effectively making them inaccessible. The attacker demands payment, or a ransom, from the victim to restore access to the data. Failure to pay may result in permanent data loss or exposure.

Threat Detection

The process of identifying possible cyber threats by analyzing data, monitoring network activity, and scanning for anomalies that could indicate malicious activity. Threat detection is essential for preventing or mitigating cybersecurity breaches.

Incident Response

A well-structured approach taken by an organization to address and manage the aftermath of a cybersecurity incident or breach. This involves identifying the threat, containing the damage, investigating the cause, and taking corrective measures to prevent future incidents.

Threat Intelligence

The process of collecting, analyzing, and using data about current and potential cyber threats to inform an organization’s security measures. This proactive approach helps identify vulnerabilities and prepares teams to defend against upcoming or potential attacks.

Data Bias

Inaccuracies or imbalances within data sets can influence the learning and decisions of AI models, leading to skewed or flawed outcomes. For example, if an AI system is trained with biased data, it may fail to detect threats accurately or make proper security decisions.

Malware Detection

The process of identifying malicious software (malware) on a system, network, or application. This involves analyzing files, programs, or network activity to detect suspicious behavior, signatures, or patterns associated with malware.

What Our Graduates Are Saying

The Admissions process was actually something that went really smoothly. The staff answered my questions exactly how I wanted. The next day, I told them I’m joining the program.
Moses Rubuye
Cybersecurity Analyst Program