Cybersecurity terms A-Z

The contents provided on this page are for informational purposes only and do not constitute financial advice. Consider your personal circumstances and objectives before making any financial decisions.

Did you know that Australians lost $260,000 to PayID scams last year?

You might be wondering about how to protect yourself from falling into scams and cyberattacks, especially when dealing with urgent loans and utility bills. Don’t worry, you're not alone! In fact, 3 in 4 Australians feel that data breaches are one of the biggest cybersecurity risks they face today.  

To help you feel in control of your devices and personal info we’ve compiled a list of terms that might be handy to know what to look out for when using the internet.

The letter A for anti-virus

Anti-virus: Do you wish for a way to keep your devices safe without you having to worry? Well there is and it's called anti-virus - a kind of software used to prevent, scan, detect and delete viruses from a computer. (Source: Verizon

The letter B for botnet

Botnet: A group of computers that have been infected with a virus and work together to create attacks such as sending spam and data theft. These computers are usually controlled by a hacker. (Source: Simpleilearn)

The letter C for cookies

Cookies: You’re probably familiar with the pop-up banner that asks us to accept cookies when we’re browsing the internet. But what actually happens? Cookies are pieces of data stored in a web browser that help websites remember user’s information such as logins and shopping carts. (Source: kaspersky)

The letter D for deep fake

Deep fake: Have you ever come across a meme on the internet of a celebrity doing something random or out of character? That could have been a deep fake. This is an image or recording that has been altered to misrepresent someone doing or saying something that did not happen. (Source: merriam-webster

The letter E for encryption

Encryption: A type of coding that makes messages or information unreadable and secretive. Hackers can use this to lock victims out of their files. (Source: Simpleilearn)

The letter F for firewall

Firewall: Don’t worry, no one needs to be evacuated! A firewall is a type of technology that acts as a security guard for your computer and devices to keep cybersecurity threats such as hackers, spam and viruses away.(Source: Simpleilearn

The letter g for Google dorking

Google dorking: This is when hackers use advanced Google searches to find weak websites or sensitive data they can exploit. (Source: techtarget

The letter H for honeypot

Honeypot: A security system that is generally a website that is used to lure attackers into meaningless locations to avoid harm to genuine and crucial data. (Source: Ukcybersecuritycouncil)

The letter I for internet of things

Internet of Things (IOT): The name for a network of devices that connect to the internet and to each other. More common than you might think, these include everything from your wearable fitness trackers to smart appliances and voice assistants. (Source: trendmicro)

The letter J for JBOH - javascript binding over HTTP

JBOH (JavaScript-Binding-Over-HTTP): This one’s a mouthful, but essentially refers to a mobile device attack often targeting Android users through a malicious or compromised app. (Source: Sangfor Technologies)

The letter K for keylogger

Keylogger: Did you know there’s a type of spyware that can monitor or record what you type on your computer or mobile? It’s called a keylogger and can be used legally, like for device monitoring in agreed contracts, or illegally, like in cases of identity theft or stalking. (Source: Norton

The letter L for LAN - local area network

LAN (Local Area Network): Developed in the 1960s initially for universities and research facilities, a LAN is a network of devices connected in one physical location such as an office or building. The shared network allows for sharing and connection among devices, but also carries the risk of cybersecurity attacks affecting the entire network. (Source: Cisco) 

The letter M for malware

Malware: This covers all types of malicious software that can be used to access data, such as financial information and passwords, in order to conduct illegal activities including identity theft, stealing financial information and infecting computers. (Source: McAfee)

The letter N for network security

Network security: To help detect and prevent cyber attacks, various mechanisms are usually put in place to build a network security framework. This can include technologies such as firewalls and email or app security tools. (Source: IBM)

The letter O for OTP - one time password

One-Time Password (OTP): A unique password that can only be used once, usually generated by the platform you’re logging into, an OTP adds an extra layer of authorisation to help protect your access and identity. (Source: Thales

The letter P for phishing

Phishing: Ever received a suspicious email? That could’ve been phishing in action. This is one of the most common types of cyber attacks, where a fraudulent email is sent with the aim to steal data such as login and financial information. Checking for details in the email such as sender information, poor grammar and spelling and unsolicited attachments could help you protect yourself from phishing attacks. (Source: Cisco) 

The letter Q for quarantine

Quarantine: Yes, this also applies to cybersecurity! Similar to the way quarantining works in health, if a file on a device is suspected of being infected with a virus, an antivirus program may quarantine the file to prevent it from spreading and keep your other files safe and secure. (Source: Blumira)

The letter R for ransomware

Ransomware: Just how it sounds, ransomware is a type of malware that usually involves a cybercriminal locking your files and demanding a ransom to prevent your information being leaked or sold online. (Source: Australian Cyber Security Centre)

The letter S for social engineering

Social Engineering: Picture a digital con artist. They trick people into sharing secrets like passwords and important information by using techniques such as phishing, baiting, etc. (Source: IBM)

The letter T for two-factor authentication (2FA)

Two-Factor Authentication (2FA):  A security method that requires you to provide two forms of verification, typically a password and a temporary code sent to your mobile device, for accessing your account. (Source: TechTarget)

The letter U for user and entity behaviour analytics

User and Entity Behaviour Analytics (UEBA): It’s like a cyber detective. It watches how things usually happen in a computer system and learns the normal stuff. Then, if something strange or bad happens – like unusual data moves or sneaky actions – it raises an alarm. (Source: Paloaltonetworks)

The letter V for vulnerability

Vulnerability: Think of it as a secret weak spot in a system's setup or design. Hackers can find and use this weak spot to sneak in, cause chaos, or swipe valuable info. (Source: Upguard)

The letter W for worm

Worm: Bad software that moves between computers on its own, without people doing anything. It uses weaknesses in networks or systems to spread and can carry harmful things like malware or ransomware. (Source: Malwarebytes)

Group 45

XSS (Cross-Site Scripting): This is where attackers put harmful scripts into websites so that when other people use those sites, the scripts run in their web browsers, letting the attackers steal information and change things. (Source: PortSwigger)

The letter Y for Yubikey

YubiKey: A hardware-based authentication device that provides strong two-factor authentication and passwordless login. (Source: nytime)

The letter Z for zero-day exploit

Zero-Day Exploit: This is when hackers find a hidden weakness in a software to organise a surprise attack. This means that developers of the software aren’t aware of the problem and therefore aren’t ready in time to stop them.  (Source: TechTarget)



Disclaimer: 
Beforepay Group Ltd ABN: 63 633 925 505 (Beforepay) allows eligible customers to access their pay and/or access their tax refund, and also provides budgeting tools. The views provided in this article include factual information and the personal opinions of relevant Beforepay staff. This article contains selected summary information only and is provided for general information purposes only. Beforepay and its related bodies corporate make no representation or warranty, express or implied, as to the accuracy, completeness, timeliness or reliability of the contents of this blog post and do not accept any liability for any loss whatsoever arising from the use of this information. Please read our Terms of Service carefully before deciding whether to use any of our services.