We spend plenty of time ensuring that our most valuable things are protected at all costs. Whether that’s our home, our belongings, our money and even ourselves, staying secure is, for many of us, the only way we can relax. Besides, we don’t ever want to feel exposed to prying eyes, on the lookout for what they can steal from us! Because of this, there are plenty of DIY guides, tips and tricks and expert advice on how to secure all sorts of things. From home insurance experts to banks offering fraud protection schemes, as a society, we’ve really invested in quick and accessible security.

But what about our tech?

Our phones, laptops and tablets are home to all sorts of private information. From bank account details, to personal memories that we hold near to our hearts. This kind of data should be kept under lock and key, but for so many, it’s open for any tech savvy person to see. Of course, not everyone picks up technology at the same pace, with some of us being able to pick up the newest tech and use it with ease. However, others find even the simplest of things incredibly confusing, (think explaining how Bluetooth works to someone who’s just learned about wireless internet). But, just because some people don’t pick up technology as quickly as others, doesn’t mean their online privacy should suffer.

Understanding tech and cyber terminology

We want to help you on your path to complete technological security, as we believe that everyone should be able to keep on top of their virtual fortress. That way, everyone can rest easy knowing that their private information is completely protected. However, the complicated world of cybersecurity is full of terminology which can throw even an experienced person off. So, in order to make cybersecurity more accessible to the everyday person, we’ve compiled a list of some of the most common, and some really obscure, cybersecurity jargon. The technology world is made up of almost a completely different language, with terms, abbreviations and acronyms all over the place. To an outsider, it can seem almost impossible to decipher, like a secret code. Some of the phrases used can be quite straightforward, but others are incredibly obscure and need a bit more explanation. Have a look at the overview below.

And the list continues…

Zero Day Exploits

For example, ‘Zero Day Exploit’ is actually a type of cyber attack that occurs on the same day a weakness is discovered. At that point, it’s exploited before a solution becomes available, rendering the software vulnerable!

Brute Force Attacks

A “brute-force attack” is also a type of cyber attack. This is also known as brute-force cracking, and it’s the equivalent of trying every key on your keyring to break into your account.

Business Email Compromise

Another type of cyber attack is the ‘Business Email Compromise’. It’s a form of cybercrime which uses email fraud to attack commercial, government and non-profit organizations.

Replay Attacks

A ‘Replay Attack’ is similar to the ‘Man in the Middle attack’. It’s a form of network attack in which data is maliciously or fraudulently repeated or delated, usually performed by someone who has intercepted the data.

Smishing

‘Smishing’ is another, slightly strange, phrase that is used to describe a type of fraudulent activity. This is when you receive a text message from a ‘reputable company’ that is asking for sensitive information, but in actual fact, it’s a scammer!

Proxy servers

You might have heard of the word ‘Proxy’ before. It’s relatively simple, as it describes a server that acts as an intermediate server between a user and the internet. A proxy server allows you to change your virtual location, but it doesn’t encrypt your data at the same time like a VPN does, so don’t rely on it for online protection.

Certificate Authority

A ‘Certificate Authority’ is much more to the point term, as it is simply an entity that emits digital certificates that prove the ownership of a public key in codes.

BitTorrent

If you’re in the business of sharing data and content online, you may have already heard of ‘BitTorrent’. It is a communication protocol for peer-to-peer file sharing, and is especially popular for sharing music, movies and software.

Asymmetric Encryption

Grab your notebook and a pen for this one, as it takes some explanation to really understand! ‘Asymmetric Encryption’ is a kind of encryption that makes use of two asymmetric keys. For example, a public key which is observable for everyone, and a private key that is only available to the owner. The public owner key is a function that can only encrypt data, whereas the private key is the only one that can decrypt it. Complicated stuff!

Ad blocker

One we’ve all heard of before is ‘Ad Blocker’. It does what it says on the tin, as it’s a program or browser-extension which blocks advertisements or obtrusive pop-ups. Perfect for avoiding unwanted interruptions when watching content online!

Tech acronyms explained

A huge part of this ‘language’ is taken up by acronyms, used in all sorts of settings. To help you get used to some of them, we’ve broken down some of the most common acronyms you’re likely to encounter on your cybersecurity journey. If you’re looking for a specific acronym, you might be able to find it in the table below. With this in-depth glossary, you’re officially on your way to being a cybersecurity pro. No more awkward conversations with the IT department at work when your laptop has a virus. You’ll be able to confidently say you understood everything your tech quiz family member told you, and maybe even offer some advice. You might even be able to start making amendments to your own antivirus software, strengthening your technology’s protection against prying eyes and damaging downloads.

Your next steps to staying cyber secure

Once you’re ready to dive into the world of cybersecurity, the first steps we recommend taking is to download a VPN app, a good antivirus program, and a password manager. A Virtual Private Network is the best way to keep all your data traffic encrypted, through a virtual tunnel. It creates a secure connection between you and the internet, so you can browse to your heart’s content, worry-free. The advantages include:

Your IP address will be hidden from others online, meaning your anonymity will be much more protected, as well as your location Keeping your data encrypted will prevent you from being vulnerable to cybercriminals A VPN enables you to change your location, meaning you’ll be able to access different websites and other online services that may usually be blocked in your location

See our expert’s explanation about VPNs and how you can utilize them to better protect yourself online. In addition to a VPN, make us of a good antivirus solution; there a quality paid antivirus programs but also solid free antimalware packages out there. And to complete the holy trinity of consumer cybersecurity software, get yourself a decent password manager. We wrote a whole section on these nifty password tools!

The best glossary for cybersecurity terms   VPNOverview com - 31The best glossary for cybersecurity terms   VPNOverview com - 18