📚 Cybersecurity Vocabulary

Understand all the technical terms used in the game. Each term is explained in simple language to help you learn.

đŸĻ  Malware

Threat

Simple: Bad software designed to harm your computer.

Technical: Malicious software that includes viruses, trojans, spyware, and ransomware. It can steal data, damage files, or take control of systems.

Example: A virus that encrypts your files and demands money.

đŸŽŖ Phishing

Threat

Simple: Fake emails or messages trying to trick you into giving passwords or personal info.

Technical: Social engineering attack using fraudulent communications (email, SMS, calls) to deceive victims into revealing sensitive information or installing malware.

Example: An email pretending to be from your bank asking you to "verify" your password.

🔐 Ransomware

Threat

Simple: Malware that locks your files and demands payment to unlock them.

Technical: Type of malware that encrypts victim's data and demands ransom payment (usually cryptocurrency) for the decryption key. Can spread through networks.

Example: WannaCry ransomware that affected hospitals worldwide in 2017.

đŸšĒ Backdoor

Threat

Simple: A secret way for hackers to get into a system without being detected.

Technical: Hidden method of bypassing normal authentication to gain unauthorized access to a system. Can be intentionally created by attackers or accidentally left by developers.

Example: A hidden admin account that bypasses all security checks.

💉 SQL Injection

Threat

Simple: Inserting malicious code into website forms to access or steal database information.

Technical: Code injection technique that exploits security vulnerabilities in database-driven applications by inserting malicious SQL statements into entry fields.

Example: Typing special characters in a login form to bypass password checks.

đŸĻ  Virus

Threat

Simple: Harmful program that copies itself and spreads to other computers.

Technical: Self-replicating malware that attaches to files or programs and spreads when executed. Can corrupt data, consume resources, or enable other attacks.

Example: A program that infects .exe files and spreads via USB drives.

đŸ’ģ DDoS Attack

Threat

Simple: Overwhelming a website with fake traffic to make it crash or slow down.

Technical: Distributed Denial of Service - coordinated attack from multiple computers flooding a target with requests, making it unavailable to legitimate users. Often uses botnet networks.

Example: Thousands of infected computers sending requests to take down a competitor's website.

👂 Network Sniffing

Threat

Simple: Secretly capturing and reading data traveling over a network.

Technical: Packet sniffing intercepts network traffic to steal passwords, emails, or sensitive data. Common on unsecured WiFi. HTTPS and VPN protect against sniffing.

Example: Attacker at coffee shop capturing unencrypted passwords from HTTP websites.

🤖 Botnet

Threat

Simple: A network of infected computers controlled by hackers to launch attacks.

Technical: Collection of compromised computers (bots/zombies) remotely controlled to perform coordinated attacks like DDoS, spam distribution, or cryptocurrency mining without owners' knowledge.

Example: Mirai botnet used millions of IoT devices to launch massive DDoS attacks.

📱 SIM Swapping

Threat

Simple: Stealing your phone number by convincing your carrier to transfer it to a new SIM card.

Technical: Social engineering attack targeting mobile carriers to port victim's number to attacker's SIM. Bypasses SMS-based 2FA and allows account takeovers. Use authenticator apps instead of SMS.

Example: Attacker calls carrier pretending to be you, gets your number transferred, receives your 2FA codes.

đŸ›Ąī¸ Firewall

Defense

Simple: A security barrier that blocks unwanted connections to your computer or network.

Technical: Network security system that monitors and controls incoming/outgoing traffic based on predetermined security rules. Acts as barrier between trusted and untrusted networks.

Example: Windows Firewall blocking suspicious programs from accessing the internet.

🔐 Encryption

Defense

Simple: Scrambling data so only people with the right key can read it.

Technical: Process of encoding information using algorithms so only authorized parties with the decryption key can access it. Protects data confidentiality.

Example: HTTPS encrypts your credit card number when shopping online.

🔑 Password

Defense

Simple: Secret word or phrase that proves who you are to access accounts.

Technical: Authentication credential consisting of a string of characters used to verify user identity. Strong passwords use combinations of letters, numbers, and symbols.

Example: "Tr0ng!P@ssw0rd#2024" is stronger than "password123".

🔐 Two-Factor Authentication (2FA)

Defense

Simple: Using two different ways to prove it's really you (password + phone code).

Technical: Security process requiring two different authentication factors: something you know (password), something you have (phone), or something you are (fingerprint).

Example: Entering password then SMS code to login to your bank account.

🔐 Multi-Factor Authentication (MFA)

Defense

Simple: Using multiple ways to prove your identity (2 or more methods).

Technical: Enhanced authentication requiring multiple verification methods. Can include password, SMS code, authenticator app, biometrics, or hardware tokens. Stronger than 2FA because it can use 3+ factors.

Example: Password + fingerprint + security key to access high-security systems.

🔒 VPN

Defense

Simple: Creates a secure, private tunnel for your internet connection.

Technical: Virtual Private Network - encrypts internet traffic and routes it through remote servers, hiding your IP address and protecting data from interception.

Example: Using VPN on public WiFi to prevent hackers from seeing your data.

🔒 HTTPS

Protocol

Simple: Secure version of website connections (look for the padlock 🔒).

Technical: HyperText Transfer Protocol Secure - HTTP with SSL/TLS encryption. Ensures data sent between browser and website is encrypted and authenticated.

Example: https://bank.com (secure) vs http://bank.com (not secure).

📡 WiFi Security (WPA/WEP)

Protocol

Simple: Methods to protect wireless networks with passwords.

Technical: WiFi Protected Access (WPA/WPA2/WPA3) - modern, secure. Wired Equivalent Privacy (WEP) - outdated, easily cracked. WPA3 is currently the most secure.

Example: Your home WiFi should use WPA2 or WPA3, never WEP.

📧 Email Security (SPF/DKIM)

Protocol

Simple: Ways to verify that emails really come from who they say they're from.

Technical: SPF (Sender Policy Framework) validates sender IP addresses. DKIM (DomainKeys Identified Mail) uses digital signatures. Both prevent email spoofing.

Example: Gmail checking that an email claiming to be from "paypal.com" really is.

📡 FTP (File Transfer Protocol)

Protocol

Simple: Old method for transferring files over internet (not secure).

Technical: File Transfer Protocol - sends files unencrypted. Passwords and data are visible to attackers. Use SFTP (secure FTP) or FTPS instead for encrypted transfers.

Example: Never use plain FTP to upload website files - use SFTP to protect passwords.

🌐 ARP (Address Resolution Protocol)

Protocol

Simple: Network protocol that connects IP addresses to physical device addresses.

Technical: Maps IP addresses to MAC addresses on local networks. Vulnerable to ARP spoofing attacks where attacker tricks devices to send traffic through them for man-in-the-middle attacks.

Example: On your home network, ARP helps your computer find your router's physical address.

đŸ”ĸ WEP (Wired Equivalent Privacy)

Protocol

Simple: Old, outdated WiFi security that's easily hackable (never use this).

Technical: Obsolete WiFi encryption from 1999. Can be cracked in minutes with freely available tools. Replaced by WPA, WPA2, and WPA3. If your router only has WEP, replace it immediately.

Example: WEP password can be cracked in under 5 minutes - always use WPA2 or WPA3.

📎 Email Attachments

Concept

Simple: Files sent with emails that can contain viruses or malware.

Technical: Files attached to emails can contain malicious payloads. Dangerous extensions: .exe, .zip, .scr, .js. Double extensions like "invoice.pdf.exe" are classic phishing tactics.

Example: Never open "document.pdf.exe" - the .exe makes it a program, not a PDF.

📧 Email Sender Verification

Concept

Simple: Checking if an email really comes from who it claims to be from.

Technical: Verify sender email address matches the domain. Check for typos (paypa1.com vs paypal.com). Display name can be faked, only the actual email address matters.

Example: "PayPal Support <scam@fake-site.com>" - display name says PayPal but email isn't from paypal.com.

🌐 Domain Name

Concept

Simple: The main address of a website (like google.com).

Technical: The root domain comes AFTER the last dot before the first slash. Subdomains come before. "microsoft.security-check.info" - real domain is "security-check.info", NOT microsoft.

Example: In "login.paypal.phishing.com", the real domain is "phishing.com", not PayPal.

🔄 Man-in-the-Middle Attack

Concept

Simple: Someone secretly intercepting your communication with a website.

Technical: Attacker positions themselves between user and legitimate service, intercepting or modifying data. Common on public WiFi. HTTPS prevents this by encrypting communication.

Example: Hacker on coffee shop WiFi reading your passwords as you type them on HTTP sites.

📱 Captive Portal

Concept

Simple: A login page that appears when you connect to public WiFi.

Technical: Web page requiring authentication before allowing network access. Legitimate on public WiFi (hotels, airports) but can be faked by attackers in "Evil Twin" attacks.

Example: Fake WiFi network showing login page to steal credentials.

🔑 SSL Certificate

Concept

Simple: Digital document that proves a website uses encryption (the padlock icon).

Technical: SSL/TLS certificate enables HTTPS encryption. Important: Valid certificate = encryption only, NOT trustworthiness. Phishing sites can have valid certificates too (Let's Encrypt).

Example: A phishing site can show the padlock 🔒 icon and still be malicious.

đŸ’ģ RDP (Remote Desktop Protocol)

Concept

Simple: Technology to control a computer remotely from another location.

Technical: Windows protocol for remote computer access. NEVER expose RDP directly to the internet - subject to massive brute-force attacks. Use VPN + IP filtering instead.

Example: IT accessing your work computer remotely should use VPN, not direct RDP.

🎭 Evil Twin Attack

Concept

Simple: Fake WiFi network that looks exactly like a real one.

Technical: Attacker creates rogue access point with identical name (SSID) as legitimate network. When victims connect, attacker can intercept all traffic and steal credentials.

Example: Two "Starbucks WiFi" networks appear - one is real, one is a trap.

🔨 Brute Force Attack

Concept

Simple: Trying thousands of password combinations automatically until finding the right one.

Technical: Automated attack testing all possible password combinations. Longer passwords exponentially harder to crack. "password123" = seconds, "MyDog!sC00l#2024" = years.

Example: Software trying millions of passwords per second against a login form.

📝 Passphrase

Concept

Simple: A long password made of multiple words instead of random characters.

Technical: Multi-word password that's easier to remember but harder to crack. Length beats complexity: "correct horse battery staple" > "Tr0ub4&0r!". Recommended 4+ random words.

Example: "BlueElephantDancingMonday" is stronger and easier to remember than "xK9@mP2!".

🔍 OSINT (Open Source Intelligence)

OSINT

Simple: Finding information about someone or something using publicly available sources.

Technical: Intelligence gathering from public sources: social media, websites, public records, images, metadata. Used by security professionals, journalists, and investigators. Can reveal sensitive information people didn't realize was public.

Example: Finding someone's location from a photo's GPS metadata or visible landmarks.

đŸ•ĩī¸ OSINT Techniques

OSINT

Simple: Methods to find hidden information in photos, documents, and online profiles.

Technical: Common techniques include: Reverse image search (find where photo appeared online), metadata extraction (EXIF data from images), geolocation (identifying location from visual clues), username correlation (finding same username across platforms), and WHOIS lookups (domain registration info).

Example: Upload a photo to Google Images to find when/where it was originally posted online.

📸 EXIF Data

OSINT

Simple: Hidden information stored in photos (date, time, camera model, GPS location).

Technical: Exchangeable Image File Format - metadata embedded in photos by cameras and smartphones. Includes GPS coordinates, device model, camera settings, timestamps. Remove before sharing sensitive photos using tools or apps.

Example: A photo shared online reveals exact address where it was taken via GPS coordinates in EXIF.

🌍 Geolocation

OSINT

Simple: Figuring out where a photo was taken by looking at visible landmarks or clues.

Technical: OSINT technique to identify location from images without GPS data. Analyze: building architecture, street signs, language on signs, vegetation, shadows/sun angle, vehicle types, business names. Cross-reference with Google Street View.

Example: Identifying a city from unique building style and street signs visible in background.

🔄 Reverse Image Search

OSINT

Simple: Upload a photo to find where else it appears online.

Technical: OSINT tool (Google Images, TinEye, Yandex) that finds similar or identical images online. Reveals if photo was stolen, edited, or previously posted. Can identify people, places, or objects. Useful for verifying authenticity.

Example: Upload profile picture to see if it's stolen from someone else's social media.

📝 Digital Footprint

OSINT

Simple: All the information about you that exists online.

Technical: Trail of data left by online activity: social media posts, comments, photos, account registrations, search history, IP addresses. Can be collected via OSINT. Permanent and searchable. Minimize by privacy settings and thinking before posting.

Example: Old social media posts from years ago can still be found and used against you.

🔍 Metadata

Concept

Simple: Hidden information about files (when created, by who, where taken).

Technical: Data about data. For photos: GPS location, camera model, timestamp. For documents: author, edit history. Can reveal sensitive information if not removed.

Example: A photo's metadata showing your home address where it was taken.

👤 Social Engineering

Concept

Simple: Manipulating people into giving away confidential information.

Technical: Psychological manipulation exploiting human behavior rather than technical vulnerabilities. Includes phishing, pretexting, baiting, and tailgating.

Example: Someone calling pretending to be IT support and asking for your password.

🔗 URL/Link Safety

Concept

Simple: Checking if website addresses are real or fake before clicking.

Technical: Verifying URLs for legitimacy: check domain spelling, look for HTTPS, hover to preview actual destination, avoid shortened links from unknown sources.

Example: "paypa1.com" (with number 1) is fake, "paypal.com" is real.

📱 Mobile Security

Concept

Simple: Protecting your smartphone from theft, malware, and data loss.

Technical: Includes device encryption, screen locks, app permissions management, remote wipe capabilities, avoiding unofficial app stores, and keeping OS updated.

Example: Using fingerprint lock and only downloading apps from official stores.

â˜ī¸ Cloud Security

Concept

Simple: Protecting data stored online (like Google Drive, iCloud).

Technical: Securing data stored in cloud services through encryption, access controls, multi-factor authentication, and understanding shared security responsibility model.

Example: Enabling 2FA on your Google account and encrypting sensitive files before upload.

đŸ´â€â˜ ī¸ Hacker

Concept

Simple: Someone who breaks into computer systems. Can be good (ethical) or bad (criminal).

Technical: White hat (ethical hackers help fix security), Black hat (criminals), Grey hat (between both). Use skills to find and exploit vulnerabilities.

Example: Companies hire white hat hackers to test their security systems.

🔓 Data Breach

Concept

Simple: When hackers steal private information from a company's database.

Technical: Security incident where sensitive, protected, or confidential data is accessed, stolen, or used by unauthorized individuals. Can affect millions of users.

Example: When millions of Facebook user passwords were exposed in 2019.

📞 Phone Number Privacy

Concept

Simple: Being careful about where you share your phone number.

Technical: Protecting phone numbers to prevent SIM swapping attacks, SMS phishing, spam calls, and identity theft. Use temporary numbers for untrusted services.

Example: Don't post your real phone number on public social media profiles.