The world of Cyber Security can be challenging to grasp with many terms and different technologies used. We all understand the need to protect ourselves from the very real threat of security breaches.

This glossary will help you better understand the cyber security terms you may have already heard and provide clarity so you can feel confident protecting your business.

1. Authentication

A process to verify the user, process or device before accessing a system.

2. Communications Security

Usually referring to telecommunications, this is a series of security measures to prevent interception or exploitation.

3. Content Filter

This refers to a filter that has been implemented to assess and examine content against the security policy.

4. Data Spill

A situation where data has been exposed in an uncontrolled or unauthorised environment to persons without authorisation. This can be accidental or deliberate.

5. Digital Preservation

Processes and/or activities that are ongoing, to protect the long-term storage and protection of digital information.

6. Fuzzing or Fuzz Testing

The method used to discover errors or security issues in software.Host-based Intrusion Prevention System
This is a particular software that has been implemented within a system to monitor for malicious or unwanted activities. This software can activate in real-time to prevent any of these activities.

7. Host-based Intrusion Prevention System

This is a particular software that has been implemented within a system to monitor for malicious or unwanted activities. This software can activate in real-time to prevent any of these activities.

8. Media Sanitisation

A process used to erase or overwrite data so it cannot be retrieved. 

9. Non-Repudiation

The practice of providing proof that a user has performed a certain action. This also assists in proving a user is involved in a breach if they are denying it.

10. Perfect Forward Secrecy

In an event where one security system is compromised, this is where additional security will be activated without being compromised.*

By taking the time to familiarise yourself with these terms, you are helping protect your business and less likely to become another victim of cybercrime.

If would like further information about our Cyber Security Services, then click here or email [email protected] to organise your complimentary consultation.

*Terms have been derived from the Australian Government Cyber Security Terminology