The Cloud Consultancy Europe Ltd.
+44 (0) 203 637 6667 [email protected]

– Software that is designed to detect, stop and remove viruses and other kinds of malicious software.
– Short for Application, typically refers to a software program for a smartphone or tablet.
– Malicious actor who seeks to exploit computer systems with the intent to change, destroy, steal or disable their information, and then exploit the outcome.

– A network of infected devices, connected to the Internet, used to commit coordinated cyber attacks without their owner’s knowledge.
– An incident in which data, computer systems or networks are accessed or affected in a non-authorised way.
– A software application which presents information and services from the web.
brute force attack
– Using a computational power to automatically enter a huge number of combination of values, usually in order to discover passwords and gain access.
bring your own device (BYOD)
– An organisation’s strategy or policy that allows employees to use their own personal devices for work purposes.

– A form of digital identity for a computer, user or organisation to allow the authentication and secure exchange of information.
– Where shared compute and storage resources are accessed as a service (usually online), instead of hosted locally on physical services. Resources can include infrastructure, platform or software services.
– A user’s authentication information used to verify identity – typically one, or more, of password, token, certificate.
cyber attack
– Malicious attempts to damage, disrupt or gain unauthorised access to computer systems, networks or devices, via cyber means.
cyber incident
– A breach of the security rules for a system or service – most commonly;
– Attempts to gain unauthorised access to a system and/or to data.
– Unauthorised use of systems for the processing or storing of data.
– Changes to a systems firmware, software or hardware without the system owners consent.
– Malicious disruption and/or denial of service.
cyber security
– The protection of devices, services and networks — and the information on them — from theft or damage.

Source: National Cyber Security Centre (a part of GCHQ)