Term | Definition |
---|---|
AI |
AI is Artificial Intelligence. It combines computer science and robust datasets to enable problem solving. AI is a catchall term for applications that perform complex tasks that once required human input. It is intelligence demonstrated by computers, as opposed to human or animal intelligence. 'Intelligence' encompasses the ability to learn and to reason, to generalise and to infer meaning. AI applications include advanced web search engines, recommendation systems, understanding human speech, self-driving cars, generative or creative tools and competing at the highest level in strategic game systems.
Synonyms -
Artificial Intelligence |
Air-gapped |
Air-gapped systems are computer systems or networks that are physically isolated from other networks, including the internet.
|
Algorithm |
An unambiguous specification of how to solve a class of problems. Algorithms can perform calculation, data processing, and automated reasoning tasks.
|
antivirus | Software that is designed to detect, stop and remove viruses and other kinds of malicious software. |
authentication app | An authentication app is a software application that generates one-time passwords (OTPs) for two-factor authentication (2FA). Two-factor authentication is a security process that requires users to provide two forms of identification in order to access an account or a service. The authentication app is used as the second factor of authentication when using MFA (multi factor authentication), typically after the user provides their username and password. The app generates a unique OTP that can be used only once, and the user has to enter this OTP along with their username and password to access the account or service. Examples of popular authentication apps include Google Authenticator, Microsoft Authenticator, and Authy. These apps are commonly used for account logins, online banking, and other sensitive online transactions. Authentication apps offer an additional layer of security and help protect against identity theft, fraud, and other cyber threats. |
biometrics | Biometrics are biological measurements, or physical characteristics, that can be used to identify individuals. |
brute force attack | A brute force attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. |
captcha | A computer program or system intended to distinguish human from machine input, typically as a way of thwarting spam and automated extraction of data from websites |
CISA |
Cybersecurity and Infrastructure Security Agency
|
cloud | Where shared computer and storage resources are accessed as a service (usually online), instead of hosted locally on physical services. Resources can include infrastructure, platform or software services. |
credential stuffing | Credential stuffing is the automated injection of stolen username and password pairs (“credentials”) in to website login forms, in order to fraudulently gain access to user accounts. |
credentials | A user's authentication information used to verify identity - typically one, or more, of password, token, certificate. |
cyber attack | Malicious attempts to damage, disrupt or gain unauthorised access to computer systems, networks or devices, via cyber means. |
cyber incident | A breach of the security rules for a system or service - most commonly;
|
Cyber Security | The protection of devices, services and networks — and the information on them — from theft or damage. |
dark web | The part of the world wide web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable. |
Deep Fake |
Audio visual content that has been altered or maniupulated using AI techniques. Deep fakes are often used to spread misinformation and disinformation.
|
Deep Learning |
A subfield of AI and machine learning that uses artficial neural networks. Deep learning is especially useful in fields where raw data needs to be processed, like image recognition, natural language processing and speech recognition.
|
denial-of-service | A denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled |
encryption | Encryption is a way to conceal information by altering it so that it appears to be random data. Encryption is essential for security on the Internet. |