Glossary

A B C D E F H I K L M N P R S T U V W Z
Cyber Warfare

Cyber warfare typically refers to cyber-attacks perpetrated by one nation-state against another.

Cyber Hygiene

Cyber hygiene is a reference to the practices and steps that users of computers and other devices take to maintain system health and improve online security.

Cyberbiosecurity

Cyberbiosecurity is an emerging field at the intersection of cybersecurity and biosecurity. The objective of cyberbiosecurity has been described as addressing “the potential for or actual malicious destruction, misuse, or exploitation of valuable information, processes, and material at the interface of the life sciences and digital worlds”. Cyberbiosecurity is part of a system of measures that collectively aim to “Safeguard the Bioeconomy”.

Cyber Attack

An attack, via cyberspace, targeting an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure; or destroying the integrity of the data or stealing controlled information.

CTF

Capture the flag – is a team competition (sometimes personal) in the field of computer (information) security.

Critical Update

A fix for a specific problem that addresses a critical bug in computer software.

Cookie

Cookies are small files which are stored on a user’s computer. Cookies provide a way for the website to recognize you and keep track of your preferences.

Cloud Computing

The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

Clickjacking

Clickjacking, also known as a UI redress attack, is a common hacking technique in which an attacker creates an invisible page or an HTML element that overlays the legitimate page.