Basic Cyber Terminologies
Malware
What it is: Bad software that can harm your computer or phone.
Example: Like a cold virus that makes you sick, malware makes your device act weird or breaks it.
Learn more about Malware (Norton)
Phishing
What it is: Fake messages or emails trying to trick you into giving away private info.
Example: A scam email pretending to be your bank asking for your password.
Learn more about Phishing (Phishing.org)
Ransomware
What it is: A type of malware that locks your files and asks for money to unlock them.
Example: Your photos suddenly won’t open until you pay a “ransom.”
Learn more about Ransomware (CISA)
Firewall
What it is: A security guard for your internet that blocks bad stuff from coming in.
Example: Like a locked gate stopping strangers from entering your house.
Learn more about Firewalls (Microsoft)
Two-Factor Authentication (2FA)
What it is: A double-check system to make sure it’s really you logging in.
Example: You enter your password, then get a text with a code to type in.
Learn more about 2FA (Google Security)
Encryption
What it is: Scrambling information so only the right person can read it.
Example: Sending a secret message in a code only your friend can understand.
Learn more about Encryption (Kaspersky)
Password Manager
What it is: An app that remembers and protects your passwords so you don’t have to.
Example: Like a safe where you keep all your keys instead of carrying them all.
Learn more about Password Managers (Consumer Reports)
VPN (Virtual Private Network)
What it is: A tool that hides your internet activity and location.
Example: Like wearing a disguise when browsing online so no one can see who you are.
Learn more about VPNs (PCMag)
Spyware
What it is: Sneaky software that watches what you do without telling you.
Example: Like someone secretly reading your diary.
Learn more about Spyware (Norton)
Data Breach
What it is: When someone steals or sees private information they shouldn’t.
Example: Hackers breaking into a company and taking customer details.
Learn more about Data Breaches (Identity Theft Resource Center)
Social Engineering
What it is: Tricks used to fool people into sharing secrets or passwords.
Example: Someone pretending to be tech support and asking for your password.
Learn more about Social Engineering (CISA)
Botnet
What it is: A group of hacked computers controlled by a bad person.
Example: Like a team of robots working together to cause trouble online.
Learn more about Botnets (Kaspersky)
Patch
What it is: A fix or update for software to keep it safe and working right.
Example: Like fixing a leak in your roof to stop rain from coming in.
Learn more about Software Patching (Microsoft)
Spam
What it is: Unwanted messages or emails, often trying to sell you something or scam you.
Example: Junk mail piling up in your email inbox.
Learn more about Spam (FTC)
Backup
What it is: A copy of your important files saved somewhere safe.
Example: Like making a copy of your favorite photos so you don’t lose them if your phone breaks.
Learn more about Backups (Google Workspace)