{"id":77784,"date":"2018-03-15T17:00:50","date_gmt":"2018-03-15T11:30:50","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=77784"},"modified":"2018-03-16T13:35:15","modified_gmt":"2018-03-16T08:05:15","slug":"the-a-z-dictionary-of-cybersecurity-terms","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/the-a-z-dictionary-of-cybersecurity-terms\/","title":{"rendered":"The A-Z dictionary of cybersecurity terms"},"content":{"rendered":"<p>Whether you are a normal user or a tech-guru, being aware of the computer security threats will help fortify your defense against them. So, here&#8217;s a handy A-Z dictionary of cybersecurity terms.<\/p>\n<div id=\"top\" style=\"font-weight: bold; font-size: 1.25em; color: #808080; border-bottom: 1px solid #808080; border-top: 1px solid #808080; text-align: center; padding: 3px;\">Index<\/div>\n<p style=\"text-align: center; font-size: 20px;\"><strong><a href=\"#list-a\">A<\/a><\/strong> | <strong><a href=\"#list-b\">B<\/a><\/strong> | <strong><a href=\"#list-c\">C<\/a><\/strong> | <strong><a href=\"#list-d\">D<\/a><\/strong> | <strong><a href=\"#list-e\">E<\/a><\/strong> | <strong><a href=\"#list-f\">F<\/a><\/strong> | <strong><a href=\"#list-i\">I<\/a> <\/strong>| <strong><a href=\"#list-k\">K<\/a> <\/strong>| <strong><a href=\"#list-l\">L<\/a><\/strong> | <strong><a href=\"#list-m\">M<\/a><\/strong> | <strong><a href=\"#list-p\">P<\/a><\/strong> | <strong><a href=\"#list-r\">R<\/a><\/strong> | <strong><a href=\"#list-s\">S<\/a><\/strong> | <strong><a href=\"#list-t\">T<\/a><\/strong> | <strong><a href=\"#list-u\">U<\/a><\/strong> | <strong><a href=\"#list-v\">V<\/a><\/strong> | <strong><a href=\"#list-w\">W<\/a><\/strong> | <strong><a href=\"#list-z\">Z<\/a> <\/strong><\/p>\n<div id=\"list-a\" style=\"font-weight: bold; font-size: 17px; text-align: center; border-bottom: 2px solid #808080;\">A<\/div>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Adware<\/span><br \/>\nHave you ever come across annoying pop-ups with shady or unwanted advertisements on your computer? Such pop-ups are displayed by software called adware.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Autorun Worms<\/span><br \/>\nThese are malicious programs that run via external storage devices. These programs take advantage of the autorun feature of Windows, hence they are known as autorun worms.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Advanced Persistent Threats<\/span><br \/>\nAbbreviated as APTs, these threats are slow and persistent in their attacks. They infiltrate a targeted network and stay dormant, waiting for the right time to create havoc.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Attack Vector<\/span><br \/>\nAn attack vector is the carrier or means via which a hacker attacks their targeted systems. It could be an infected email attachment, malicious link, pop-ups, etc.<\/p>\n<div style=\"text-align: right; margin: 5px 0;\">[<strong><a href=\"#top\">Top<\/a><\/strong>]<\/div>\n<div id=\"list-b\" style=\"font-weight: bold; font-size: 17px; text-align: center; border-bottom: 2px solid #808080;\">B<\/div>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Backdoor<\/span><br \/>\nAlso known as a trapdoor, a backdoor is used by an attacker to gain illegal access to a victim\u2019s computer.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Blended Attack<\/span><br \/>\nA cyber attack that comprises multiple attack vectors and malware is known as a blended attack. Such attacks usually cause severe damage to targeted systems.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Botnet<\/span><br \/>\nBotnet refers to a network of compromised computers that are remotely controlled by a hacker. A botnet is used by a hacker to launch attacks against other targeted victims. Each computer in a botnet is known as a bot or zombie.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Browser Hijacker<\/span><br \/>\nIf you find that your Internet browser\u2019s settings have changed on its own, including your selected search engine and default homepage, then you have got a browser hijacker in your system.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Brute Force Attack<\/span><br \/>\nIn a brute force attack hackers try to crack encrypted data (passwords) by trying all possible combinations of words or letters.<\/p>\n<div style=\"text-align: right; margin: 5px 0;\">[<strong><a href=\"#top\">Top<\/a><\/strong>]<\/div>\n<div id=\"list-c\" style=\"font-weight: bold; font-size: 17px; text-align: center; border-bottom: 2px solid #808080;\">C<\/div>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Clickjacking<\/span><br \/>\nClickjacking is a technique used by an attacker to inject malicious code in clickable content in websites. Clickjacking is usually done to record the victim\u2019s clicks on the Internet or drop a malware infection on the system.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Command and Control Servers<\/span><br \/>\nAlso called C&amp;C servers, these are machines that an attacker use to communicate with a botnet and control the compromised computers in the network.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Content Spoofing<\/span><br \/>\nContent spoofing is carried out by an attacker to trick their victims into visiting a fraudulent site that looks like the real one.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Cross Site Scripting (XSS)<\/span><br \/>\nAlso known as XSS attacks, cross site scripting is a technique used by hackers to plant a malicious code into a genuine website. This allows hackers to gather user\u2019s information and use it for nefarious purpose.<\/p>\n<div style=\"text-align: right; margin: 5px 0;\">[<strong><a href=\"#top\">Top<\/a><\/strong>]<\/div>\n<div id=\"list-d\" style=\"font-weight: bold; font-size: 17px; text-align: center; border-bottom: 2px solid #808080;\">D<\/div>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Data Theft<\/span><br \/>\nIllegal or unauthorized access to or acquisition of classified information or otherwise is termed as data theft.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Denial of Service Attack (DoS)<\/span><br \/>\nDoS attacks are targeted attacks against a service to make it inaccessible or unusable by its intended users. Web servers and websites are the common targets of DoS.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Dictionary Attack<\/span><br \/>\nIn this kind of attack, the hacker tries to break into a password-protected system by trying every combination of word in a dictionary.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Drive-by Download<\/span><br \/>\nIf visiting a website or viewing an HTML email automatically downloads a malicious file on your computer, it is known as drive-by download.<\/p>\n<div style=\"text-align: right; margin: 5px 0;\">[<strong><a href=\"#top\">Top<\/a><\/strong>]<\/div>\n<div id=\"list-e\" style=\"font-weight: bold; font-size: 17px; text-align: center; border-bottom: 2px solid #808080;\">E<\/div>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Email Spoofing<\/span><br \/>\nEmail spoofing is how an attacker crafts the header of a malicious email so that user is tricked into viewing it. This technique is typically used in phishing attacks.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Email Virus<\/span><br \/>\nA computer virus that is delivered to the victim via email is known as an email virus.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Exploit<\/span><br \/>\nIn most cases, an exploit is defined as an attack where the hacker takes advantage of a security vulnerability in the victim\u2019s machine.<\/p>\n<div style=\"text-align: right; margin: 5px 0;\">[<strong><a href=\"#top\">Top<\/a><\/strong>]<\/div>\n<div id=\"list-f\" style=\"font-weight: bold; font-size: 17px; text-align: center; border-bottom: 2px solid #808080;\">F<\/div>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Form Grabber<\/span><br \/>\nMalware designed to record sensitive information that the targeted user provides in forms on the Internet. These malware particularly target the victim&#8217;s financial information.<\/p>\n<div style=\"text-align: right; margin: 5px 0;\">[<strong><a href=\"#top\">Top<\/a><\/strong>]<\/div>\n<div id=\"list-i\" style=\"font-weight: bold; font-size: 17px; text-align: center; border-bottom: 2px solid #808080;\">I<\/div>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Identity Theft<\/span><br \/>\nA menace in the IT security world, identity theft occurs when an attacker gathers personal information and use it to impersonate their victim. This way, the attacker can open illegal bank accounts, obtain credit cards, carry out transactions, etc., using the victim\u2019s name.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Instant Messaging (IM) Worm<\/span><br \/>\nWorm are malware that are capable of self-replicating and spreading across the Internet or the compromised network. Worms that spread via instant messaging networks are called IM worms.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Insider Attack<\/span><br \/>\nWhen someone with an authorized system access carries out malicious activities on a network or a computer, it is known as an insider attack or insider threat. The attacker might be an employee of the targeted business, or an outsider posing as an employee.<\/p>\n<div style=\"text-align: right; margin: 5px 0;\">[<strong><a href=\"#top\">Top<\/a><\/strong>]<\/div>\n<div id=\"list-k\" style=\"font-weight: bold; font-size: 17px; text-align: center; border-bottom: 2px solid #808080;\">K<\/div>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Keyloggers<\/span><br \/>\nOften a part of spyware, keyloggers are used by an attacker to steal sensitive information entered by the user on their keyboard. Keyloggers come in the form of hardware and software.<\/p>\n<div style=\"text-align: right; margin: 5px 0;\">[<strong><a href=\"#top\">Top<\/a><\/strong>]<\/div>\n<div id=\"list-l\" style=\"font-weight: bold; font-size: 17px; text-align: center; border-bottom: 2px solid #808080;\">L<\/div>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Likejakcing<\/span><br \/>\nLikejacking is a part of the clickjacking technique. It usually targets users of the social network community such as Facebook. Scammers share unusual or compelling posts or videos to trick users into liking or sharing them thus, spreading the scam to other users.<\/p>\n<div style=\"text-align: right; margin: 5px 0;\">[<strong><a href=\"#top\">Top<\/a><\/strong>]<\/div>\n<div id=\"list-m\" style=\"font-weight: bold; font-size: 17px; text-align: center; border-bottom: 2px solid #808080;\">M<\/div>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Malware<\/span><br \/>\nMalware is used as an umbrella term for malicious programs such as viruses, Trojans, worms, spyware, adware, rootkits, ransomware, keyloggers, and rogue security software to name a few. In some cases, the terms \u2018malware\u2019 and \u2018virus\u2019 are used interchangeably.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Man-in-the-Middle Attack<\/span><br \/>\nAbbreviated as MITM, this attack is launched by a hacker to intercept, record, and control the communication between two users.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Mobile Phone Virus<\/span><br \/>\nThis kind of virus is specifically crafted to run on mobile devices. These viruses can also spread from one infected mobile device to another.<\/p>\n<div style=\"text-align: right; margin: 5px 0;\">[<strong><a href=\"#top\">Top<\/a><\/strong>]<\/div>\n<div id=\"list-p\" style=\"font-weight: bold; font-size: 17px; text-align: center; border-bottom: 2px solid #808080;\">P<\/div>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Pharming<\/span><br \/>\nPharming is when a user is redirected to a fake website without their consent or knowledge. In most cases, the fake website looks exactly similar to the actual website that the user intended to visit.<br \/>\n<strong>See also<\/strong>: <a href=\"https:\/\/blogs.quickheal.com\/pharming-what-is-it-and-how-can-you-dodge-it\/\" target=\"_blank\" rel=\"noopener\">Pharming \u2013 What is it and How Can you Dodge it? <\/a><\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Phishing<\/span><br \/>\nPhishing is one of the oldest tricks in the book of hackers. It is a technique used by an attacker to acquire personal information from a victim, by posing as a legitimate organization. Phishing can be executed via spoofed emails, fake phone calls, and even SMSs.<br \/>\n<strong>See also<\/strong>: <a href=\"https:\/\/blogs.quickheal.com\/what-is-phishing-and-how-to-avoid-it\/\" target=\"_blank\" rel=\"noopener\">What is Phishing and How to Avoid it? <\/a><\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Polymorphic Virus<\/span><br \/>\nA polymorphic virus is a malicious program that modifies itself when it replicates. This technique enables it to evade detection by security software.<\/p>\n<div style=\"text-align: right; margin: 5px 0;\">[<strong><a href=\"#top\">Top<\/a><\/strong>]<\/div>\n<div id=\"list-r\" style=\"font-weight: bold; font-size: 17px; text-align: center; border-bottom: 2px solid #808080;\">R<\/div>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">RAT (Remote Access Trojans)<\/span><br \/>\nA RAT is a malicious program that can allow a hacker to take over a system from another physical location. Using this malware, the attacker can access and steal confidential and personal data from the infected machine.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Ransomware<\/span><br \/>\nRansomware is a malicious program that performs the following malicious activities after infecting a computer:<br \/>\n&#8211; Makes the system non-functional unless the victim agrees to pay a ransom.<br \/>\n&#8211; Encrypts the computer\u2019s data and demands a ransom to release it to the victim.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Rogue Antivirus<\/span><br \/>\nA rogue antivirus, also known as scareware, is a fake program that disguises itself as a genuine software but performs malicious activities in user\u2019s machine. The program may install malware on the system, steal user data, or trick the user to perform fraudulent transactions.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Reverse Social Engineering Attack<\/span><br \/>\nIn this kind of cyberattack, the attacker convinces a user that they have a problem and that the attacker has a solution to the problem. For instance, an attacker creates a problem for the target. Then the attacker advertises themself as the solution provider, with an intention of luring the victim to divulge sensitive information.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Rootkit<br \/>\n<\/span>A rootkit is a program (or a collection of programs) that in itself is not harmful, but helps viruses and malware hide from antivirus software.<\/p>\n<div style=\"text-align: right; margin: 5px 0;\">[<strong><a href=\"#top\">Top<\/a><\/strong>]<\/div>\n<div id=\"list-s\" style=\"font-weight: bold; font-size: 17px; text-align: center; border-bottom: 2px solid #808080;\">S<\/div>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Session Hijacking<\/span><br \/>\nSession hijacking is an attack wherein a hacker takes control of a computer session to perform illegal activities such as taking over the victim\u2019s online accounts.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Shoulder Surfing<\/span><br \/>\nShoulder surfing refers to spying on a user to obtain personal or private information such as PINs, passwords, security codes, etc. Here, the criminal usually looks over a person\u2019s shoulder while the latter might be using an ATM, phone or other electronic device.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">SMiShing<\/span><br \/>\nSMiShing is a type of a phishing attack where targets are sent fake or malicious SMSs. These SMSs are designed to steal personal information from the target, or trick them into visiting a phishing website.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Spam<\/span><br \/>\nSpam is defined as unwanted or unexpected emails sent in bulk. Mostly, spam is used to distribute malware.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Spear Phishing<\/span><br \/>\nSpear phishing is a phishing attack where hackers target specific individuals. In a general phishing campaign, phishing emails appear to come from large, well-known organizations. In spear phishing, however, the email seems to be from a trusted individual or a business that the victim knows about. Today, about 91% of attacks on the Internet consist of spear phishing.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Spyware<\/span><br \/>\nA common computer security threat, spyware is a class of malicious program that secretly steals your personal information and sends it to advertisers or hackers. Most spyware come with free online software downloads. Sometimes, a spyware can also come attached with an <a href=\"https:\/\/blogs.quickheal.com\/a-laymans-glossary-of-computer-security-threats-part-1\/#list-a\" target=\"_blank\" rel=\"noopener\">adware<\/a>.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">SQL Injection<\/span><br \/>\nAn SQL injection is performed by an attacker to exploit a poorly-designed application to produce unwanted database query results. For instance, an attacker can insert a malicious code into a Web form that is used for user authentication. Via this code, the attacker can send his request to the database and perform illicit activities.<\/p>\n<div style=\"text-align: right; margin: 5px 0;\">[<strong><a href=\"#top\">Top<\/a><\/strong>]<\/div>\n<div id=\"list-t\" style=\"font-weight: bold; font-size: 17px; text-align: center; border-bottom: 2px solid #808080;\">T<\/div>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Targeted Attack<\/span><br \/>\nA targeted attack is a highly focused attack on specific individuals or an organization. Hackers use this technique to persistently pursue its target while remaining anonymous, for a long-term period.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Trojan Horse<\/span><br \/>\nA Trojan horse is a computer security threat that disguises itself as a harmless program but turns out to be malicious. For instance, a program that appears to be a game but drops a spyware or adware on the user\u2019s computer upon activation, is a Trojan horse.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Twishing<\/span><br \/>\nTwishing refers to phishing scams that are carried over Twitter. The attacker might tweet a post interesting or strange enough to trick users into visiting a fraudulent website and logging in with their credentials.<\/p>\n<div style=\"text-align: right; margin: 5px 0;\">[<strong><a href=\"#top\">Top<\/a><\/strong>]<\/div>\n<div id=\"list-u\" style=\"font-weight: bold; font-size: 17px; text-align: center; border-bottom: 2px solid #808080;\">U<\/div>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">URL Spoofing<\/span><br \/>\nA technique used by hackers to create a fake URL that impersonates the URL of a secure or legitimate website. A spoofed URL looks exactly like the one of the original website, but redirects users to a phishing or a malicious site.<\/p>\n<div style=\"text-align: right; margin: 5px 0;\">[<strong><a href=\"#top\">Top<\/a><\/strong>]<\/div>\n<div id=\"list-v\" style=\"font-weight: bold; font-size: 17px; text-align: center; border-bottom: 2px solid #808080;\">V<\/div>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Virus<\/span><br \/>\nVirus is a malicious program usually attached to a legitimate or harmless program. When the program runs, the virus gets executed and performs activities that harm infected machines and their data. A virus can copy itself and spread to other files.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Vishing<\/span><br \/>\nVishing is a phishing attack wherein a hacker uses voice calls to trick users into divulging personal or financial information. Vishing attacks are carried out using conventional phone systems or Voice over Internet Procotol (VoIP) systems.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Vulnerability<\/span><br \/>\nA vulnerability, also known as a security vulnerability, is a flow or error in a software or operating system that can let hackers take control of the affected machine and use it for illegal activities.<\/p>\n<div style=\"text-align: right; margin: 5px 0;\">[<strong><a href=\"#top\">Top<\/a><\/strong>]<\/div>\n<div id=\"list-w\" style=\"font-weight: bold; font-size: 17px; text-align: center; border-bottom: 2px solid #808080;\">W<\/div>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Wabbit<\/span><br \/>\nA wabbit is malicious program that keeps dropping its duplicate copies on the infected system. Unlike a worm, it does not spread across networks.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Website Spoofing<\/span><br \/>\nWebsite spoofing refers to creating a fake site that looks exactly like a trusted and popular website, in order to collect personal or financial information from users. Spoofed websites are created using legitimate logos, colors, designs, etc., to make them look realistic.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Whale Phishing<\/span><br \/>\nWhale phishing is a campaign that is aimed particularly at wealthier individuals. It is also known as whaling.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Worm<\/span><br \/>\nA worm is a stand-alone malware that can self-replicate itself. Unlike a virus, it does not require a \u2018host program\u2019 to attach itself to. It spreads by placing its functional copies in email attachments, instant messages, networks, flash drives, etc. A worm can be used to distribute Trojans, viruses, spam, phishing emails, and other forms of malware.<\/p>\n<div style=\"text-align: right; margin: 5px 0;\">[<strong><a href=\"#top\">Top<\/a><\/strong>]<\/div>\n<div id=\"list-z\" style=\"font-weight: bold; font-size: 17px; text-align: center; border-bottom: 2px solid #808080;\">Z<\/div>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Zero-day Vulnerability<\/span><br \/>\nA zero-day vulnerability refers to a security flaw that does not have a fix yet, and can be exploited by hackers at any given time. In most cases, hackers try to find a vulnerability that neither developers nor users are aware of. And before they do, hackers develop an exploit (a malicious code) to take advantage of the flaw.<\/p>\n<p><span style=\"font-size: 17px; color: #006bb2; font-weight: bold;\">Zombie<\/span><br \/>\nA zombie refers to a computer that has been taken over by a hacker. Hackers usually create a large group of zombie computers called botnet, to launch their attacks.<\/p>\n<div style=\"border-bottom: 2px solid #808080; text-align: right; margin: 5px 0;\">[<strong><a href=\"#top\">Top<\/a><\/strong>]<\/div>\n<p>&nbsp;<\/p>\n<p>Share this A-Z dictionary of cybersecurity terms with your friends on <a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?app_id=188707654478&amp;kid_directed_site=0&amp;sdk=joey&amp;u=http%3A%2F%2Fblogs.quickheal.com%2F%3Fp%3D77784&amp;display=popup&amp;ref=plugin&amp;src=share_button\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>, <a href=\"https:\/\/twitter.com\/intent\/tweet?original_referer=http%3A%2F%2Fblogs_admin.quickheal.com%2Fthe-a-z-dictionary-of-cybersecurity-terms%2F&amp;ref_src=twsrc%5Etfw&amp;text=The%20A-Z%20dictionary%20of%20cybersecurity%20terms&amp;tw_p=tweetbutton&amp;url=http%3A%2F%2Fblogs_admin.quickheal.com%2F%3Fp%3D77784&amp;via=quickheal\" target=\"_blank\" rel=\"noopener\">Twitter<\/a> or WhatsApp and pass on the knowledge!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whether you are a normal user or a tech-guru, being aware of the computer security threats will help fortify your defense against them. So, here&#8217;s a handy A-Z dictionary of cybersecurity terms. Index A | B | C | D | E | F | I | K | L | M | P | [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":86015,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24,75,354,151,303,6],"tags":[866,867,868,869,870,871,872,873,874],"class_list":["post-77784","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","category-microsoft-windows","category-mobile-security-2","category-password","category-phishing","category-tips","tag-common-it-security-threats","tag-computer","tag-computer-dictionary","tag-computer-malware-terms","tag-computer-threats","tag-glossary","tag-information-technology","tag-it-education","tag-tech-dictionary"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/77784"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=77784"}],"version-history":[{"count":9,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/77784\/revisions"}],"predecessor-version":[{"id":86026,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/77784\/revisions\/86026"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/86015"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=77784"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=77784"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=77784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}