Cyber Security Key Terms
Essential Vocabulary for Security Professionals
Building Your Security Knowledge Foundation
Adversary
Definition: Any entity that poses a threat to an information system by attempting unauthorized access, destruction, or disruption of data and systems.
Examples:
- Hackers
- Cybercriminals
- Nation-state actors
- Insider threats
Attack
Definition: Any attempt to exploit vulnerabilities in a system to gain unauthorized access or cause damage.
Types:
- Phishing attacks
- Denial-of-Service (DoS)
- Malware infections
- Social engineering
Countermeasure
Definition: An action, device, procedure, or technique that reduces or eliminates a security threat.
Examples:
- Firewalls
- Intrusion Detection Systems (IDS)
- Encryption
- Access controls
Risk
Definition: The potential for loss or damage when a threat exploits a vulnerability.
Risk Components:
- Threat: Possibility of harmful event
- Vulnerability: Weaknesses to exploit
- Impact: Potential damage or loss
Security Policy
Definition: A formal set of rules and practices that define how an organization manages, protects, and distributes sensitive information.
Components:
- Access control policies
- Data protection guidelines
- Incident response procedures
System Resource (Asset)
Definition: Any hardware, software, data, or service within an information system that needs protection.
Examples:
- Databases
- Network devices
- Application software
- User data
Threat
Definition: Any potential event or action that could cause harm to an information system.
Categories:
- Natural disasters
- Human errors
- Cyber attacks
- Technical failures
Vulnerability
Definition: A weakness or flaw in a system that can be exploited by a threat to gain unauthorized access or cause harm.
Examples:
- Software bugs
- Misconfigured systems
- Weak passwords
- Unpatched software
Memory Aid
"Always Aim Carefully, Reduce Stress, Save Time, Value"
- Adversary
- Attack
- Countermeasure
- Risk
- Security Policy
- System Resource
- Threat
- Vulnerability
Real-World Example
Scenario: Online Banking System
- Asset: Customer financial data
- Threat: Cybercriminals
- Vulnerability: Weak password policy
- Attack: Credential stuffing
- Risk: Data breach and financial loss
- Countermeasure: Multi-factor authentication
How Terms Connect
- Adversary launches Attack
- Attack exploits Vulnerability
- Vulnerability creates Risk
- Risk threatens System Resource
- Countermeasure reduces Risk
- Security Policy guides implementation
Quick Check
Match the definition:
- A weakness in a system = ?
- Potential for loss = ?
- Action to reduce threats = ?
- Attempt to exploit systems = ?
Answers:
- Vulnerability
- Risk
- Countermeasure
- Attack
Key Takeaways
- 8 fundamental security terms
- Each term has specific meaning
- Terms are interconnected
- Understanding helps in risk management
- Foundation for security discussions
Remember: Security vocabulary builds understanding
Thank You
Questions & Discussion
Next: OSI Model Security Framework

