Cybersecurity Dictionary for Beginners

New to cybersecurity? This cybersecurity dictionary beginners can use helps you understand key terms to stay safe online.

Looking for cybersecurity acronyms? Check out my Cybersecurity Acronyms page for terms like DNS and FTP!

  • Adware: Malware that shows unwanted ads, for example, pop-ups on your screen, often slowing down your device or stealing data.
  • Antivirus: Software that protects your device, because it detects and removes viruses and other malware, keeping your system safe.
  • Authentication: Proving you are who you say you are.
  • Authorization: Determining what access or permissions you have once authenticated.
  • Brute Force Attack: A hacking method, for instance, attackers guess your password by trying many combinations to break into your account.
  • Cookie: A small file a website saves on your device to remember things like your login or preferences. Cookies are usually safe but can be used by bad sites to track you. Clear them regularly for privacy.
  • Dark Web: A hidden part of the internet, therefore, illegal activities like selling stolen data often happen there.
  • Data Breach: A data breach happens when private data, like your email or password, is accessed or exposed without permission, often during a hack.
  • Decryption: The process of converting encrypted data back to its original form.
  • Denial-of-Service (DoS) Attack: An attack that overwhelms a service to make it unavailable.
  • Digital Footprint: All the information about a person that exists online.
  • DDoS Attack (Distributed Denial-of-Service): An attack that overwhelms a website with traffic to shut it down.
  • Encryption: Encryption keeps your data safe from hackers, because it converts it into a secret code that they can’t easily read.
  • Evil Twin: A fake Wi-Fi hotspot set up by hackers to look like a real one (e.g., “Starbucks Wi-Fi”). When you connect, they can steal your passwords or personal info.
  • Firewall: A firewall acts as a security barrier, for example, it blocks unauthorized access to your device or network to protect your data.
  • GDPR: A European law that protects personal data and privacy.
  • IP Address: A unique identifier for a device on a network, like a phone number for computers.
  • Keylogger: A keylogger is dangerous software, since it records everything you type, including passwords, to steal your information.
  • Malware: Malware is harmful software, such as viruses or ransomware, that can damage your device or steal your data.
  • Man-in-the-Middle Attack: When a hacker intercepts communication between two parties.
  • Modem: A device that connects your home to your internet service provider.
  • NIS2: EU law improving cybersecurity rules for essential sectors, focusing on risk management and incident reporting.
  • NIST: U.S. agency offering trusted cybersecurity guidelines and standards.
  • NIST CSF: A U.S. framework helping organizations reduce cyber risk through five core steps: Identify, Protect, Detect, Respond, Recover.
  • Operating System (OS): Software that runs your device (like Windows, macOS, Linux).
  • Password Manager: A tool that helps you create, store, and manage strong passwords securely.
  • Patch: A software update that fixes security holes to keep your device safe.
  • Penetration Testing: Simulated cyberattacks to identify and fix security weaknesses.
  • Phishing: Phishing is a scam where attackers send fake emails or messages, thus tricking you into sharing personal info like passwords.
  • Port: A communication endpoint on a device used for network traffic.
  • Privacy Policy: A statement of how a company collects and uses your data.
  • Protocol: A set of rules for data communication (like HTTP, FTP, etc.).
  • Public Wi-Fi: Public Wi-Fi refers to free networks, for instance, at cafes, however, they can be risky if not secured properly.
  • Ransomware: Ransomware is malware that locks your device or files, therefore, it demands payment to unlock them, holding your data hostage.
  • Rootkit: A hidden tool that allows unauthorized users to control a system.
  • Router: A router connects your devices to the internet, and it creates a home network, so you can share Wi-Fi easily.
  • Secure Socket Layer (SSL): A technology that encrypts data between your browser and a website (seen as “https://”).
  • Server: A computer that provides data or services to other devices on a network.
  • Social Engineering: Tricks used by attackers (e.g., pretending to be a friend) to manipulate you into sharing sensitive info.
  • Spyware: Spyware is malware that secretly watches your activity, consequently, it steals your information, like your login details.
  • Trojan Horse: Malware disguised as a safe program to trick you into installing it.
  • Two-Factor Authentication (2FA): An extra security step requiring a second verification (e.g., a code on your phone) besides your password.
  • Update: General software improvements, including new features or security patches.
  • Virus: A type of malware that replicates and spreads to other programs or devices.
  • VPN (Virtual Private Network): A VPN hides your online activity, because it protects your data by encrypting your internet connection, keeping you safe online.
  • Vulnerability: A weakness in a system that hackers can exploit to gain access.
  • Wi-Fi: Wireless technology that allows devices to connect to the internet.
  • WPA2 (Wi-Fi Protected Access 2): A widely used Wi-Fi security standard that encrypts your network data to keep it safe. For example, WPA2 protects against many hacking attempts, but WPA3 is even more secure.
  • WPA3 (Wi-Fi Protected Access 3): The latest Wi-Fi security standard that strongly encrypts your network data. Therefore, WPA3 offers the best protection against hacking, making it ideal for keeping your Wi-Fi safe.
  • Worm: Malware that spreads across devices on its own, often slowing down networks.
  • Zero-Day Exploit: A hacking attack that happens before a software’s security flaw is fixed.

This cybersecurity dictionary beginners can use offers simple definitions for key terms like worm, firewall, and phishing, helping you stay safe online with easy-to-understand explanations.

Scroll to Top