Skip to main content
  1. Resources/
  2. Study Materials/
  3. Information & Communication Technology Engineering/
  4. ICT Semester 5/
  5. Cyber Security (4353204)/

2 mins· ·
Milav Dabgar
Author
Milav Dabgar
Experienced lecturer in the electrical and electronic manufacturing industry. Skilled in Embedded Systems, Image Processing, Data Science, MATLAB, Python, STM32. Strong education professional with a Master’s degree in Communication Systems Engineering from L.D. College of Engineering - Ahmedabad.
Cyber Security Key Terms

Cyber Security Key Terms

Essential Vocabulary for Security Professionals

Building Your Security Knowledge Foundation

Risk Assessment Framework
Cyber Security Key Terms
Cyber Security Key Terms Relationships

Adversary

Definition: Any entity that poses a threat to an information system by attempting unauthorized access, destruction, or disruption of data and systems.

Examples:

  • Hackers
  • Cybercriminals
  • Nation-state actors
  • Insider threats

Attack

Definition: Any attempt to exploit vulnerabilities in a system to gain unauthorized access or cause damage.

Types:

  • Phishing attacks
  • Denial-of-Service (DoS)
  • Malware infections
  • Social engineering

Countermeasure

Definition: An action, device, procedure, or technique that reduces or eliminates a security threat.

Examples:

  • Firewalls
  • Intrusion Detection Systems (IDS)
  • Encryption
  • Access controls

Risk

Definition: The potential for loss or damage when a threat exploits a vulnerability.

Risk Components:

  • Threat: Possibility of harmful event
  • Vulnerability: Weaknesses to exploit
  • Impact: Potential damage or loss
Risk Assessment Framework
Security Threat Model

Security Policy

Definition: A formal set of rules and practices that define how an organization manages, protects, and distributes sensitive information.

Components:

  • Access control policies
  • Data protection guidelines
  • Incident response procedures
Cybersecurity Terms Matching

System Resource (Asset)

Definition: Any hardware, software, data, or service within an information system that needs protection.

Examples:

  • Databases
  • Network devices
  • Application software
  • User data

Threat

Definition: Any potential event or action that could cause harm to an information system.

Categories:

  • Natural disasters
  • Human errors
  • Cyber attacks
  • Technical failures
Attack Types and Methods

Vulnerability

Definition: A weakness or flaw in a system that can be exploited by a threat to gain unauthorized access or cause harm.

Examples:

  • Software bugs
  • Misconfigured systems
  • Weak passwords
  • Unpatched software

Memory Aid

"Always Aim Carefully, Reduce Stress, Save Time, Value"

  • Adversary
  • Attack
  • Countermeasure
  • Risk
  • Security Policy
  • System Resource
  • Threat
  • Vulnerability

Real-World Example

Scenario: Online Banking System
  • Asset: Customer financial data
  • Threat: Cybercriminals
  • Vulnerability: Weak password policy
  • Attack: Credential stuffing
  • Risk: Data breach and financial loss
  • Countermeasure: Multi-factor authentication

How Terms Connect

  • Adversary launches Attack
  • Attack exploits Vulnerability
  • Vulnerability creates Risk
  • Risk threatens System Resource
  • Countermeasure reduces Risk
  • Security Policy guides implementation

Quick Check

Match the definition:

  1. A weakness in a system = ?
  2. Potential for loss = ?
  3. Action to reduce threats = ?
  4. Attempt to exploit systems = ?

Answers:

  1. Vulnerability
  2. Risk
  3. Countermeasure
  4. Attack

Key Takeaways

  • 8 fundamental security terms
  • Each term has specific meaning
  • Terms are interconnected
  • Understanding helps in risk management
  • Foundation for security discussions
Remember: Security vocabulary builds understanding

Thank You

Questions & Discussion

Next: OSI Model Security Framework