Welcome to the second article on the above heading, we are going to continue from where we stopped from Part 1. If you haven’t read it just click the link above.
Before we even define other terms lets define Cybersecurity. This is the practice of protecting networks, systems, programs, and data from criminal or unauthorized use.
Cloud: The cloud is the storage space on the internet. As far as you have internet access, you can access the files stored in the “cloud” from anywhere. The cloud is basically the internet.
Domain Name: This is the name of your website. It uses addresses that is called “IP address”. The name can be of any combinations of letters, names and numbers.
IP Address: This is the virtual address that the internet gives you when you connect to the internet. The full meaning is Internet Protocol Address. It identifies your device and it also locates you physically or it tracks your device.
VPN(Virtual Private Network)
We have talked about VPNs in some of our articles, you should be familiar with it already. VPNs are your privacy protectors. They also protect your IP Addresses. The full meaning is Virtual Private Network.
Exploits: This is a technique to breach the security of a network or information system in violation of the security policy of an organization. There can be remote exploit and local exploit.
Firewall: An electronic device/software program that limits network traffic according to a set of rules of what access is and is not allowed or authorized is called a Firewall. It is the primary defense system of your computer device.
Virus: This is a computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.
There is macro virus, it is a type of a virus that attaches itself to documents and uses the documents programming to execute itself.
Trojan Horse
The term “Trojan” imitates the battle of Troy. This is a computer program that appears to have a useful function, but it also has a hidden malicious function that hides from security mechanisms and sometimes it exploits legitimate authorizations of a system software that force starts the program.
Worm: The name explains it all, it is a self-replicating, a self-propagating and a self-contained program that uses networking methods to spread itself in a system.
Botnet/Bot
A computer connected to the Internet and has been secretly compromised with malicious intent can be a bot. A bot perform activities under a remote command and control of a remote administrator. A bot can also be a member of a collection of compromised computers known as a botnet. You can call a bot a zombie! A collection of computers that are compromised by malicious codes and controlled across a network can be called botnet.
For now this is all for this edition of Terms in Cybersecurity. We’ll continue with more of the above terms next time. Bis bald.