Chapter 3: Key Terminologies and Concepts in Cyber Security

Navigating the Cyber Security Lexicon

In this chapter, we’ll dive into the essential jargon and concepts that form the backbone of cyber security. Understanding these terms is crucial for grasping the more complex aspects of the field we’ll explore later in the course.

The Language of Cyber Security

Cyber security, like any specialized field, has its own language. This chapter will act as your glossary, helping you become familiar with the terms you’ll frequently encounter.

Malware: The Digital Pest

What is Malware?: An umbrella term for software designed to cause harm to a computer system.

Types of Malware: We’ll explore various forms like viruses, worms, trojans, and ransomware, understanding how they differ and the unique threats they pose.

Phishing: The Art of Deception

Understanding Phishing: A technique used by cybercriminals to trick individuals into revealing sensitive information.

The Mechanics of a Phishing Attack: We’ll dissect how phishing works, from deceptive emails to fake websites, and learn how to spot and avoid these traps.

Ransomware: The Digital Kidnapper

Ransomware Explained: A type of malware that locks users out of their systems or encrypts data, demanding a ransom for access.

Encryption: The Code of Security

The Role of Encryption: How encryption is used to secure data by converting it into a code that only authorized parties can decipher.

Types of Encryption: A look at symmetric and asymmetric encryption, explaining their uses and differences.

Firewalls and VPNs: The Digital Barriers

 

Firewalls: Understanding how firewalls act as a shield against unauthorized access to a network.

VPNs (Virtual Private Networks): How VPNs create a secure and encrypted connection over a less secure network, such as the internet.

The Ever-Evolving Cyber Threat Landscape

As we conclude this chapter, we’ll touch upon how these terminologies and concepts are part of an ever-evolving landscape in cyber security. The field is dynamic, and staying updated with the latest terms and threats is crucial for anyone venturing into cyber security.

en_CAEnglish