The words you need to know, so you don’t get baffled. 

Cyber Security Glossary

Application security: The how, what, and where, of programmes and digital services, that can be used by your company employees. The security of these applications, and their ability to be installed and operated through your company’s networks, and on company assets, computers, laptops, or servers, is defined and implemented by your IT department’s policies, procedures, and protocols.

Company information: Any information that is owned, used, or gathered by, your company, for the purposes of conducting your business.

Company user: An employee, or external contractor, who makes use of your company information, assets, and equipment, to conduct business on your company’s behalf.

Company user policy: The rules and regulations around how company-owned assets and equipment may be used, and how company users should abide by them.

Cyber: A broad term that encompasses the manufacturing, operation, and utilisation of computers, networks, information technology, virtual reality, and 

Cyber attack: An attempt to access company data, assets, or information, by an unauthorised party. Most cyber attacks happen over the internet and are perpetuated by an individual or organisation that wishes to cause harm to the company or demand a type of ransom.

Cyber risk: The risk of losing company data, or assets, as a result of your technological operations, while conducting your business. 

Cyber security: How your company protects its technological assets, digital assets, and physical assets from unauthorised access.

Cyber security incident response: How your company responds to a potential or real incident of unauthorised access. 

Digital asset: Any company information that is used, gathered or generated, for the purposes of conducting your business, that is stored, shared, or created, online.

Disaster recovery: How your company responds and recovers from, a cyber security incident, or potential disaster.

Disaster recovery procedure: The rules, policies, and procedures, that are to be followed when your company responds to a cyber security incident. 

Hack: To gain unauthorised access to a digital asset, computer, service, system, or network. 

Network: A group or system of interconnected computers, servers, and other technological assets. 

Network security:  The way in which computers, networks, programmes, and information, are protected from unauthorised access or attack. 

Physical asset: Any equipment, building, or tangible asset that belongs to a company. 

Physical security: How physical assets are protected by your company, to prevent unauthorised access, theft, or loss. 

Unauthorised access: When an individual or organisation gains access to a website, programme, service, server, website, or system, to which they have not been granted permission to do so.

We hope this Cyber Security Glossary has been helpful if you need any further help don’t hesitate to get in touch.

Philipa Jane Farley

Written By Philipa Jane Farley

Philipa is the lead consultant and auditor at ProPrivacy.  With clients as far afield as Canada, South Africa, Kenya, Germany, Spain and other such exotic locations, besides Cork and elsewhere in Ireland, Philipa enjoys a broad view of the state of data protection, privacy and cyber security worldwide.  Philipa’s passion is manageable data compliance for SMEs.

Philipa is a qualified teacher besides holding a computer science (Bachelor of Science in Artificial Intelligence Programming) and electronic and intellectual property law (LLB) qualified. She is trained in constitutional (fundamental) rights litigation and enjoys a good debate.

Philipa has over twenty years of experience working in different sized organisations and sectors on operational, governance, risk management and compliance matters. She is an analytical and focused person that enjoys a challenge in the workplace. She loves technology, systems and people and has a passion for showing people how technology can make life easier and better. She understands that the world is driven by data today but privacy is paramount. Responsibly developed AI excites Philipa for the future.

ProPrivacy | GDPR Privacy Cyber Security in Cork, Ireland