Cyber Security Glossary

Search for glossary terms (regular expression allowed)
Term Definition

A computer program or system intended to distinguish human from machine input, typically as a way of thwarting spam and automated extraction of data from websites

Cybersecurity and Infrastructure Security Agency

Where shared computer and storage resources are accessed as a service (usually online), instead of hosted locally on physical services. Resources can include infrastructure, platform or software services.

credential stuffing

Credential stuffing is the automated injection of stolen username and password pairs (“credentials”) in to website login forms, in order to fraudulently gain access to user accounts.


A user's authentication information used to verify identity - typically one, or more, of password, token, certificate.

cyber attack

Malicious attempts to damage, disrupt or gain unauthorised access to computer systems, networks or devices, via cyber means.

cyber incident

A breach of the security rules for a system or service - most commonly;

  • Attempts to gain unauthorised access to a system and/or to data.
  • Unauthorised use of systems for the processing or storing of data.
  • Changes to a systems firmware, software or hardware without the system owners consent.
  • Malicious disruption and/or denial of service.
Cyber Security

The protection of devices, services and networks — and the information on them — from theft or damage.