10 cyber terms you need to know
Cyber terminology is ever-evolving. Here are 10 important terms you need to know.
10 cyber terms you need to know
© HSB Canada
    alt txt

    properties.trackTitle

    properties.trackSubtitle

    The world of cyber is constantly changing, and so is its terminology. Here are 10 important cyber terms you should know. Some terms you may already know, and others will likely be new to you, but all are equally important.

    1.     Social Engineering

    A hack focusing on people rather than technology. Social engineering seeks to use knowledge of one’s life and habits to gain trust or exploit vulnerabilities. Also known as Misdirected Fraud Payment.

    2.     Encryption

    Encryption is used to secure data so that it cannot be stolen or altered. It scrambles the information so that only authorized individuals and computer systems can access it. Encryption helps to protect sensitive information such as passwords, banking information and personal information, and keep such details safe from cyber criminals.

    3.     Phishing

    Phishing is a social engineering attack which attempts to collect information from victims, including bank account numbers, Social Insurance Numbers, passwords, credit card numbers, or other personally identifying information. Such information can be sold or used to commit identity theft. The cyber criminal often pretends to be a trustworthy business or acquaintance.

    4.     Malware

    Malware is code written for the purpose of causing harm, disclosing information, or violating security.  Examples include viruses and worms.

    5.     Ransomware

    Ransomware is a form of malware which holds a victim’s data hostage on their own computer, typically through robust encryption. The cyber criminal tells the victim they will unlock or decrypt their data or systems if the victim pays a ransom, often in cryptocurrency. Paying the cyber criminal does not always mean the victim will be given access to their computer or files again, but desperate individuals may pay if it is the quickest way to get their systems up and running again.

    6.     DDoS attack

    A DDoS attack attempts to halt access to any resource by using multiple computers to overload a computer, server or network.  Users cannot access the server or website once it is down and it can be very expensive for the organization to get it functioning again.

    7.     Cyber attack

    A cyber attack is the unauthorized access of a device, network, or computer system which leads to an interruption, manipulation, or destruction of information, computer software or other data.

    8.     Cyber event

    A cyber event is a confirmed or suspected unauthorized access to a computer system, electronic attack or privacy breach. All cyber attacks are cyber events, but not all cyber events are cyber attacks.

    9.     Multi-factor authentication (MFA)

    Multi-factor authentication is a security measure which protects individuals by requiring users to provide two or more authentication factors to access an application, account, or virtual portal. Examples include email and SMS text verification.

    10.     Keylogger

    A keylogger is a type of malicious software or other eavesdropping measure used to record the victim’s keystrokes to help criminals access login credentials or sensitive personal data.

    Stay safe and informed. For our full list of cyber terms you need to know, please download our cyber glossary.

    Interested in learning more about our cyber offerings?

    This article is for informational purposes only and is not intended to convey or constitute legal advice. HSB makes no warranties or representations as to the accuracy or completeness of the content herein. Under no circumstances shall HSB or any party involved in creating or delivering this article be liable to you for any loss or damage that results from the use of the information contained herein. Except as otherwise expressly permitted by HSB in writing, no portion of this article may be reproduced, copied, or distributed in any way. This article does not modify or invalidate any of the provisions, exclusions, terms or conditions of the applicable policy and endorsements. For specific terms and conditions, please refer to the applicable insurance form.
    Experts
    Zair Kamal
    Zair Kamal
    Director, Client Development and Cyber Specialist
    Toronto - Canada
    Email
    zkamal@hsb.ca
    vCard
    Download
      alt txt

      properties.trackTitle

      properties.trackSubtitle