The Cloud Consultancy Europe Ltd.
+44 (0) 203 637 6667 [email protected]

H
hacker
– In mainstream use as being someone with some computer skills who uses them to break into computers, systems and networks.
honeypot (honeynet)
– Decoy system or network to attract potential attackers that helps limit access to actual systems by detecting and deflecting or learning from an attack. Multiple honeypots form a honeynet.

I
incident
A breach of the security rules for a system or service, such as:
> attempts to gain unauthorised access to a system and/or data
> unauthorised use of systems for the processing or storing of data
> changes to a systems firmware, software or hardware without the system owners consent
> malicious disruption and/or denial of service
insider risks
– The potential for damage to be done maliciously or inadvertently by a legitimate user with privilleged access to systems, networks or data.
Internet of things (IoT)
– Refers to the ability of everyday objects (rather than computers and devices) to connect to the Internet. Examples include kettles, fridges and televisions.

M
macro
– A small program that can automate tasks in applications (such as Microsoft Office) which attackers can use to gain access to (or harm) a system.
malvertising
– Using online advertising as a delivery method for malware.
malware
– Malicious software – a term that includes viruses, trojans, worms or any code or content that could have an adverse impact on organisations or individuals.
mitigation
– Steps that organisations and individuals can take to minimise and address risks.

Source: National Cyber Security Centre (a part of GCHQ)