Cyber Security Terms – A Helpful Glossary

The world of cyber security is constantly changing, with new phrases and terminology being introduced on a regular basis. Some of these terms can be confusing if you’re not in the know, so we’ve put together a handy glossary that explains what they mean and how they could have an impact on your day-to-day operations.

What is a QBot?

QBot refers to a type of computer malware or botnet that is designed to infect and control compromised systems. It is also known as Qakbot or Pinkslipbot. QBot typically spreads through phishing emails or malicious downloads, and once installed on a system, it can perform various malicious activities such as stealing sensitive information, logging keystrokes, distributing spam emails, and participating in distributed denial-of-service (DDoS) attacks.

What is Digital Maturity?

Digital maturity refers to the level of an organisation’s ability to effectively and strategically leverage digital technologies and data to achieve its goals and objectives. It includes technology adoption, digital skills and capabilities, organisational culture, digital strategy, and the integration of digital processes into the core operations of the business. A digitally mature organisation is one that has a clear digital vision, utilises advanced technologies, embraces innovation, and adapts to digital disruptions effectively.

What is a virtual CISO?

A virtual Chief Information Security Officer (CISO) is an outsourced or remote professional who provides cybersecurity leadership and guidance to an organization on a part-time or project basis. A virtual CISO typically offers the same expertise and responsibilities as a full-time CISO but without being physically present within the organisation. They help businesses assess and manage their security risks, develop security strategies, implement security controls, oversee incident response, and ensure compliance with relevant regulations and standards.

What is a hack?

In the context of cybersecurity, a hack refers to the unauthorised access, manipulation, or exploitation of computer systems or networks. Hacking involves gaining access to digital resources, such as databases, websites, or computer systems, by exploiting vulnerabilities or weaknesses in security defences. Hacks can be performed with malicious intent, such as stealing sensitive data or causing disruption, or they can be carried out for ethical purposes to identify and fix vulnerabilities (known as ethical hacking or penetration testing).

What are the different ways a business can be hacked?

  • Phishing: Sending deceptive emails or messages to trick employees into divulging sensitive information or clicking on malicious links.
  • Social Engineering: Manipulating individuals through psychological tactics to convince them to provide access credentials or sensitive information.
  • Exploiting Software Vulnerabilities: Identifying and exploiting security flaws or weaknesses in software applications or systems to gain unauthorized access.
  • Brute Force Attacks: Repeatedly guessing passwords or using automated tools to systematically try different combinations until the correct one is found.
  • Password Attacks: Attempting to crack passwords using techniques like dictionary attacks, rainbow table attacks, or password sniffing.
  • Malware: Infecting systems with malicious software, such as viruses, worms, or Trojans, which can provide unauthorized access or control.
  • Insider Threats: Exploiting internal vulnerabilities through malicious actions or negligence by employees or contractors with authorized access.
  • Supply Chain Attacks: Targeting vulnerabilities in a third-party vendor or supplier to gain access to the targeted business’s systems or data.
  • Physical Intrusion: Physically breaching the business premises to gain access to computers or network infrastructure.

It’s important for businesses to implement strong cybersecurity measures and educate their employees to mitigate these risks and protect against possible attacks.

get Clevr360

Speak to our team

Fill out the form below and we will be in touch with the next steps.