Blog

Bluesnarfing, Bluejacking, Typosquatting and Other Cyber Terms You Need to Know Now

April 17, 2018

Developed by the PSA Cybsecurity Committee as a section of newly released whitepaper, CSC Controls. The full whitepaper is available in the Cybersecurity Committee section of PSAEducation.com.


Cybersecurity can be complicated to talk about, with new terminology popping up about as often as a big data breach. Ask yourself: Do I know the difference between bluejacking and bluesnarfing? What would I say if my client asked about the dangers of typosquatting? Check out this key terms glossary to familiarize yourself with the language of cybersecurity and be prepared to answer the tough questions.


Active interception – normally refers to placing a computer between a sender and receiver and an effort to capture and possibly modify information

Ad filtering – ways of blocking and filtering out unwanted advertisements pop-up blockers and content filters are considered to be at filtering methods

Adware – type of spyware that pops up advertisements based on what it has learned about you

Application whitelisting – a method of restricting users to specific applications

Attack vector – the path or means by which an attacker gains access to a computer

Back doors – used in computer programs to bypass a normal authentication and other security mechanisms in place

Bluejacking – the sending of unsolicited messages to Bluetooth enabled devices such as mobile phones and tablets

Bluesnarfing – the unauthorized access of information from a wireless device through a Bluetooth connection

Botnet – a group of compromised computers used to distribute malware across the internet the members are usually zombies

Business Impact Analysis (BIA) – a systematic process aimed at predicting and evaluating the potential impact and loss of critical business operations as a result of disaster, accident or emergency

CIA Traid – Confidentiality, Integrity, and Availability (CIA)is a model designed to guide strategy and policy governance over the security of information systems within an organization.  Confidentiality aims at a set of rules that limits access to information, integrity is the assurance information is trustworthy and accurate, and availability is a guarantee system resources will be available upon request by authorized users

Content filters – individual computer programs that block external files that use JavaScript or images from loading into the browser

Easter egg – a platonic extra added to an OS where application as a sort of joke the harmless cousin of the logic bomb

Grayware – a general term used to describe applications that are behaving improperly but without serious consequences often describes types of spyware

Hardware security module – a physical device that deals with the encryption of authentication processes digital signings and payment processes

Host based intrusion detection system – a type of system loaded on an individual computer and analyzes and monitors what happens inside that computer

Information & Communication Technology (ICT) – the infrastructure, network components, applications and information systems that enable modern networking and computing

Logic bomb – code that has, in some way, been inserted into software it is meant to initiate some type of malicious function if specific criteria are met

Malware – software designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent

Mobile device management – is centralized software solution that allows for the control configuration of mobile devices

Open mail relay – also known as an SMTP open relay, enables anyone on the internet to send an email through an SMTP server

Personal firewall – an application that protects an individual computer from unwanted internet traffic it does so by way of rules and policies

Pop-up blocker – an application or add onto a web browser the blocks pop-up windows that you see contain advertisements

Privilege escalation – the act of exploding a bug or design flaw in a software or firmware application to gain access to resources that normally would have been protected from an application or user

Ransomware – a type of malware that restricts access to a computer system and Demands a ransom be paid

Risk-Based Security (RBS) – security model that attempts to deliver the most effective security in the most efficient manner by steering resources and assets to the highest areas of security risk and vulnerability

Rootkit – a type of software design to gain administrator level control over a computer system without being detected

Social Engineering Attacks – the psychological manipulation of organizational employees to attain confidential information for the purposes of fraud, gathering information or systems access.  This type of activity aims at using human interaction in an attempt to trick employees to break organizational security procedures to gain access to buildings, systems, or organizational

Spam – the abuse of electronic messaging systems such as email broadcast media and instant messaging

Spyware – a type of malicious software either downloaded unwittingly from a website or installed along with some other third-party software

Storage segmentation – a clear separation of organizational and personal information applications and other content

Threat Vector – the method of threat uses to gain access to a target computer

Time bomb – a Trojan set off on a certain date

Trojan Horse – an application that appears to perform desired functions but is actually performing malicious functions behind the scenes

Typosquatting – a method used by attackers that takes advantage of user’s typos when accessing websites. Instead of the expected website the user ends up at a website with a similar name but often malicious content

Virus – code that runs on a computer without the user’s knowledge it infects the computer when the code is accessed and executed

Worm – code that runs on a computer without the user’s knowledge a worm self-replicates whereas a virus does not

Zombie – an individual compromised computer in a botnet


Find more from PSA Committees on PSAEducation.com. Create a free account today to get started!


Source: Prowse, D.L. (2015). CompTIA Security SY0-401 (3rd ed.) Indianapolis, IN: Pearson.