"Cyber" terms that we use

Let’s look at the terms that start with the word “Cyber”, which is widely used today and means related to computers and networks.

  • Cyber ​​Age: It is the period in which the development of information technologies changed the direction of social, economic and change in human history and society gradually emerged.

  • Cyber ​​Espionage: These are methods that aim to infiltrate target systems, steal sensitive information, or maintain secret access without the target’s knowledge or consent.

  • Cyber Security: It is the protection of the confidentiality, integrity and accessibility of our communication with people or institutions in information systems, our electronic data, and our material or moral assets.

  • Cyber Intelligence: It is to collect all kinds of information about computer systems, networks and digital environment, associate it with a meaningful whole, evaluate, analyze and report it.

  • Cyber Pirate: They are attackers who aim to gain unauthorized access to digital systems for malicious purposes such as stealing data, locking systems, and demanding ransom.

  • Cyber Incident: It is the violation or attempted violation of the confidentiality, integrity and accessibility of information systems or the information processed by these systems.

  • Cyber Risk: Operational disruption resulting from a problem in an organization’s information systems or processes is the possibility of any cyber incident and the resulting reputational or financial loss.

  • Cyber Attack: These are attempts to gain unauthorized access to computer systems in order to steal, change or destroy digital data.

  • Cyber Warfare: These are infiltration activities carried out to damage or disrupt the computer systems or networks of one state or another state.

  • Cyber Defense: It is a set of preventive, detecting and responsive measures taken to protect against attacks in the cyberspace.

  • Cyber Crime: These are actions such as entering a system and damaging it, deleting data, encrypting, seizing, adding data, preventing the use of the system, interfering with the privacy of private life, blocking communication, monitoring and recording communication without permission.

  • Cyber Threat: Refers to potential dangers to computer systems such as computers, networks, software and digital environments.

  • Cyber Space: It is the environment that includes computer networks and all data resources accessible through these networks.

  • Cyber Asset: It is the whole of the software and hardware components of informatics elements (computer, server, network devices, internet of things, etc.).

  • Cyber Bullying: It is the intentional sending of threatening, frightening, humiliating and embarrassing messages by an individual or group to another individual or group via information and communication technologies.

Are there any other terms you know? If you specify in the comments, we can expand it.

2 Likes

Hi Mustafa,

Great list! You’ve covered many essential terms there. Here are a few more that might be useful to expand the glossary:

Cyber Hygiene: Practices and steps that users of computers and other devices take to maintain system health and improve online security.

Cyber Forensics: The process of collecting, analyzing, and reporting on digital data in a way that is legally admissible, often used in the investigation of cyber crimes.

Cyber Law: Legal regulations and considerations related to cyber activities, including issues like data protection, privacy, and cyber crime legislation.

Cyber Ecosystem: The interconnected system of people, processes, and technology that interacts in the digital world.

Thanks for starting this discussion. It’s crucial for everyone to have a clear understanding of these terms in our increasingly digital world.

Cheers.

1 Like