The words you need to know, so you don’t get baffled. 

Cyber Security Glossary

Application security: The how, what, and where, of programmes and digital services, that can be used by your company employees. The security of these applications, and their ability to be installed and operated through your company’s networks, and on company assets, computers, laptops, or servers, is defined and implemented by your IT department’s policies, procedures, and protocols.

Company information: Any information that is owned, used, or gathered by, your company, for the purposes of conducting your business.

Company user: An employee, or external contractor, who makes use of your company information, assets, and equipment, to conduct business on your company’s behalf.

Company user policy: The rules and regulations around how company-owned assets and equipment may be used, and how company users should abide by them.

Cyber: A broad term that encompasses the manufacturing, operation, and utilisation of computers, networks, information technology, virtual reality, and 

Cyber attack: An attempt to access company data, assets, or information, by an unauthorised party. Most cyber attacks happen over the internet and are perpetuated by an individual or organisation that wishes to cause harm to the company or demand a type of ransom.

Cyber risk: The risk of losing company data, or assets, as a result of your technological operations, while conducting your business. 

Cyber security: How your company protects its technological assets, digital assets, and physical assets from unauthorised access.

Cyber security incident response: How your company responds to a potential or real incident of unauthorised access. 

Digital asset: Any company information that is used, gathered or generated, for the purposes of conducting your business, that is stored, shared, or created, online.

Disaster recovery: How your company responds and recovers from, a cyber security incident, or potential disaster.

Disaster recovery procedure: The rules, policies, and procedures, that are to be followed when your company responds to a cyber security incident. 

Hack: To gain unauthorised access to a digital asset, computer, service, system, or network. 

Network: A group or system of interconnected computers, servers, and other technological assets. 

Network security:  The way in which computers, networks, programmes, and information, are protected from unauthorised access or attack. 

Physical asset: Any equipment, building, or tangible asset that belongs to a company. 

Physical security: How physical assets are protected by your company, to prevent unauthorised access, theft, or loss. 

Unauthorised access: When an individual or organisation gains access to a website, programme, service, server, website, or system, to which they have not been granted permission to do so.

We hope this Cyber Security Glossary has been helpful if you need any further help don’t hesitate to get in touch.

Cath Jenkin

Written By Cath Jenkin

As a communications consultant and freelance writer, Cath has helped more than 100 brands, businesses, and people, find the right words to tell their important stories. Cath points her cursor and bashes her keyboard to create useful, reliable content for people who want to learn more about blockchain technologies, finance, property, online safety & information security.

ProPrivacy | GDPR Privacy Cyber Security in Cork, Ireland