Bravo, Delta, Oscar, Tango, Victor | Busting the jargon with the ECRC

Does cyber jargon leave you scratching your head or does it leave you with your head in your hands? Cyber terminology can often be confusing and complicated, so we wanted to share the NCSC's definitions for common cyber security terms to make things a little bit easier.



Software that is designed to detect, stop and remove viruses and other kinds of malicious software. ​


Short for Application, typically refers to a software program for a smartphone or tablet. Attacker Malicious actor who seeks to exploit computer systems with the intent to change, destroy, steal or disable their information, and then exploit the outcome.



A network of infected devices, connected to the Internet, used to commit coordinated cyber attacks without their owner's knowledge. ​


An incident in which data, computer systems or networks are accessed or affected in a non-authorised way. ​


A software application which presents information and services from the web.

Brute force attack

Using a computational power to automatically enter a huge number of combination of values, usually in order to discover passwords and gain access. ​

Bring your own device (BYOD)

An organisation's strategy or policy that allows employees to use their own personal devices for work purposes.



A form of digital identity for a computer, user or organisation to allow the authentication and secure exchange of information.


Where shared compute and storage resources are accessed as a service (usually online), instead of hosted locally on physical services. Resources can include infrastructure, platform or software services. ​


A user's authentication information used to verify identity - typically one, or more, of password, token, certificate. ​

Cyber attack

Malicious attempts to damage, disrupt or gain unauthorised access to computer systems, networks or devices, via cyber means. ​

Cyber incident

A breach of the security rules for a system or service - most commonly; Attempts to gain unauthorised access to a system and/or to data. Unauthorised use of systems for the processing or storing of data. Changes to a systems firmware, software or hardware without the system owners consent. Malicious disruption and/or denial of service.

Cyber security

The protection of devices, services and networks — and the information on them — from theft or damage.


Data at rest

Describes data in persistent storage such as hard disks, removable media or backups.

Dictionary attack

A type of brute force attack in which the attacker uses known dictionary words, phrases or common passwords as their guesses.

Digital footprint

A 'footprint' of digital information that a user's online activity leaves behind.

Denial of service (DoS)

When legitimate users are denied access to computer services (or resources), usually by overloading the service with requests.

Download attack

The unintentional installation of malicious software or virus onto a device without the users knowledge or consent. May also be known as a drive-by download.



A mathematical function that protects information by making it unreadable by everyone except those with the key to decode it. ​

End user device (EUD)

Collective term to describe modern smartphones, laptops and tablets that connect to an organisation's network.


May refer to software or data that takes advantage of a vulnerability in a system to cause unintended consequences.



Hardware or software which uses a defined rule set to constrain network traffic to prevent unauthorised access to or from a network.


H Hacker In mainstream use as being someone with some computer skills who uses them to break into computers, systems and networks. ​ Honeypot (honeynet) Decoy system or network to attract potential attackers that helps limit access to actual systems by detecting and deflecting or learning from an attack. Multiple honeypots form a honeynet.



A breach of the security rules for a system or service, such as: attempts to gain unauthorised access to a system and/or data unauthorised use of systems for the processing or storing of data changes to a systems firmware, software or hardware without the system owners consent malicious disruption and/or denial of service.

Insider risks

The potential for damage to be done maliciously or inadvertently by a legitimate user with privilleged access to systems, networks or data.

Internet of things (IoT)

Refers to the ability of everyday objects (rather than computers and devices) to connect to the Internet. Examples include kettles, fridges and televisions.






A small program that can automate tasks in applications (such as Microsoft Office) which attackers can use to gain access to (or harm) a system.


Using online advertising as a delivery method for malware.


Malicious software - a term that includes viruses, trojans, worms or any code or content that could have an adverse impact on organisations or individuals.


Steps that organisations and individuals can take to minimise and address risks.



Two or more computers linked in order to share resources.




Applying updates to firmware or software to improve security and/or enhance functionality.


Short for penetration test. An authorised test of a computer network or system designed to look for security weaknesses so that they can be fixed.


An attack on network infrastructure that results in a user being redirected to an illegitimate website despite the user having entered the correct address.


Untargeted, mass emails sent to many people asking for sensitive information (such as bank details) or encouraging them to visit a fake website.