If you are new to cyber security and/or tech, you might be overwhelmed with the number of terms and acronyms that there are in the online world.
There are too many to remember! Whether you are going into the cyber world, or into a helpdesk role, or just want to improve your IT knowledge then these terms are useful to know and wrap your head around.
We have put together this handy guide of cyber security and tech related terms and acronyms that everyone needs to know below!
AWS - Amazon Web Services
Amazon Web Services - AWS is a cloud services platform. It offers database storage, content delivery, compute power, and much more.
ML - Machine Learning
Machine Learning - The ability of a machine to learn and integrate new information.
VPN - Virtual Private Networks
Virtual Private Networks – VPNs are used to represent a secure connection between a network and a user.
APT - Advanced Persistent Threat
Advanced Persistent Threat - A cyber-attack that continuously uses advanced techniques to conduct cyber crime.
CSP - Cloud Service Provider
Cloud Service Provider - The big three CSPs are Amazon Web Services (AWS), Google Cloud Platform (GCP), and Azure.
WAS - Web Application Security
Web Application Security - All the tooling needed to carry out security testing against web apps.
CEH - Certified Ethical Hacker
Certified Ethical Hacker – An individual certified in the specific discipline of ethical hacking.
CND - Computer Network Defence
Computer Network Defence – The actions taken through the use of computer networks to protect, monitor, analyse, detect, and respond to unauthorised activity of systems and networks.
AV - Antivirus
Antivirus - A computer program used to prevent, detect, and remove malware.
CTI - Cyber Threat Intelligence
Cyber Threat Intelligence – Information about threats and threat actors that helps mitigate harmful events in cyberspace. .
DDoS - Distributed Denial of Service
Distributed Denial of Service – A form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources (often botnets).
A decoy system or network that serves to attract potential attackers, protecting actual systems by detecting attacks or deflecting them. A good tool for learning about attack styles. Multiple honeypots form a honeynet.
Has this article convinced you that a career in cyber security is right for you? If so, click here to see our training!