Skip to content

Flashcards · 91 cards

Glossary

Jargon-buster: 80+ terms. Click any card to flip it. Click again to flip back.

Glossary · Identity & access

MFA · Multi-Factor Authentication.

Click to flip →

A second proof of identity (a code from your phone, a security key) on top of the password. Stops the most common SME breach — stolen-password attacks.
Open full page → Click to flip back

Glossary · Identity & access

SSO · Single Sign-On.

Click to flip →

One login that opens many systems. Reduces password sprawl. Centralises the risk — if SSO is compromised, everything is.
Open full page → Click to flip back

Glossary · Identity & access

IAM · Identity and Access Management.

Click to flip →

The set of tools and rules deciding who can access what.
Open full page → Click to flip back

Glossary · Identity & access

RBAC · Role-Based Access Control.

Click to flip →

People get access based on their job, not their name. Easier to audit.
Open full page → Click to flip back

Glossary · Identity & access

Privileged access · Admin / superuser rights.

Click to flip →

Accounts that can change other accounts, delete data, install software. The keys to the kingdom.
Open full page → Click to flip back

Glossary · Identity & access

Conditional access · Login rules that depend on context.

Click to flip →

“Only allow admin login from inside the office or from a managed laptop.”
Open full page → Click to flip back

Glossary · Identity & access

OAuth · “Sign in with…” under the bonnet.

Click to flip →

How one app gets permission to act on another. The scopes you grant matter.
Open full page → Click to flip back

Glossary · Identity & access

Federated identity · Your identity, used in someone else's system.

Click to flip →

Convenient. Means losing your account loses access to many things.
Open full page → Click to flip back

Glossary · Identity & access

SCIM · Auto-sync of user accounts across SaaS tools.

Click to flip →

Creates and disables accounts when HR records change.
Open full page → Click to flip back

Glossary · Identity & access

Account takeover (ATO) · When an attacker controls a real user account.

Click to flip →

Often invisible for days. MFA + login alerts are the main defences.
Open full page → Click to flip back

Glossary · Identity & access

Token / session theft · Stealing the “logged-in” cookie, not the password.

Click to flip →

Modern attack that bypasses MFA after sign-in.
Open full page → Click to flip back

Glossary · Threats & attacks

Ransomware · Malware that encrypts your files and demands a payment.

Click to flip →

Modern variants also steal data and threaten to leak it.
Open full page → Click to flip back

Glossary · Threats & attacks

Phishing · Fraudulent emails or messages that trick people.

Click to flip →

The most common cause of SME breaches.
Open full page → Click to flip back

Glossary · Threats & attacks

Spear phishing · Phishing targeted at a specific person.

Click to flip →

Researched, personalised. Far more successful than generic phishing.
Open full page → Click to flip back

Glossary · Threats & attacks

Whaling · Spear phishing aimed at executives.

Click to flip →

Targets directors who can authorise payments.
Open full page → Click to flip back

Glossary · Threats & attacks

Smishing · Phishing via SMS / text message.

Click to flip →

Often pretends to be a courier, bank, or HMRC.
Open full page → Click to flip back

Glossary · Threats & attacks

Vishing · Phishing via phone call.

Click to flip →

“This is Microsoft / your bank.” Hang up and call back on a known number.
Open full page → Click to flip back

Glossary · Threats & attacks

Social engineering · Manipulating a person rather than a system.

Click to flip →

Trust and urgency are the levers.
Open full page → Click to flip back

Glossary · Threats & attacks

BEC · Business Email Compromise.

Click to flip →

Attacker takes over a real email account — usually finance or a director.
Open full page → Click to flip back

Glossary · Threats & attacks

Payroll diversion · Fraudster impersonates an employee asking to change bank details.

Click to flip →

Verify changes by phone using a number from your records.
Open full page → Click to flip back

Glossary · Threats & attacks

Zero-day · A flaw being exploited before there is a fix.

Click to flip →

Most real-world breaches use old, well-known flaws on unpatched systems.
Open full page → Click to flip back

Glossary · Threats & attacks

Supply-chain attack · Attacking you via one of your suppliers.

Click to flip →

Your supplier's problem becomes your problem.
Open full page → Click to flip back

Glossary · Threats & attacks

DDoS · Distributed Denial of Service.

Click to flip →

Flooding a website with junk traffic until it stops responding.
Open full page → Click to flip back

Glossary · Threats & attacks

Drive-by download · Malware that infects you by visiting a website.

Click to flip →

Rare with patched browsers but still happens.
Open full page → Click to flip back

Glossary · Threats & attacks

Juice jacking · Compromised public USB charging points.

Click to flip →

Use your own plug at airports.
Open full page → Click to flip back

Glossary · Threats & attacks

USB drop · An attacker leaves an infected USB stick somewhere staff will find it.

Click to flip →

Unknown USB sticks go to IT, never into a work machine.
Open full page → Click to flip back

Glossary · Threats & attacks

Malware · Malicious software — the umbrella term.

Click to flip →

Ransomware, info-stealers, banking trojans, cryptominers.
Open full page → Click to flip back

Glossary · Threats & attacks

Info-stealer · Malware whose job is to harvest passwords, cookies, and tokens.

Click to flip →

Increasingly common. Why session-token theft bypasses MFA.
Open full page → Click to flip back

Glossary · Backup & recovery

RTO · Recovery Time Objective.

Click to flip →

How long you can survive being down before it really hurts.
Open full page → Click to flip back

Glossary · Backup & recovery

RPO · Recovery Point Objective.

Click to flip →

How much recent data you can afford to lose.
Open full page → Click to flip back

Glossary · Backup & recovery

3-2-1 backup · Three copies, two media, one off-site.

Click to flip →

The minimum rule of thumb.
Open full page → Click to flip back

Glossary · Backup & recovery

Immutable backup · A backup that cannot be changed or deleted after writing.

Click to flip →

Critical for ransomware survival.
Open full page → Click to flip back

Glossary · Backup & recovery

Bare-metal restore · Rebuilding a server from scratch using backup.

Click to flip →

Test whether you have this or just file-level backups.
Open full page → Click to flip back

Glossary · Backup & recovery

DR / BCP · Disaster Recovery & Business Continuity Planning.

Click to flip →

DR is the technical recovery. BCP is keeping the business running while DR happens.
Open full page → Click to flip back

Glossary · Operations

SLA · Service Level Agreement.

Click to flip →

What your IT supplier promises to do.
Open full page → Click to flip back

Glossary · Operations

MSP · Managed Service Provider.

Click to flip →

Outsourced IT — runs your systems for a monthly fee.
Open full page → Click to flip back

Glossary · Operations

Endpoint · A laptop, desktop, phone, or server.

Click to flip →

The place most breaches start.
Open full page → Click to flip back

Glossary · Operations

Patching · Applying security updates.

Click to flip →

The single most boring and most effective security activity.
Open full page → Click to flip back

Glossary · Operations

SIEM · Security Information and Event Management.

Click to flip →

Collects and watches security logs.
Open full page → Click to flip back

Glossary · Operations

EDR · Endpoint Detection and Response.

Click to flip →

Modern antivirus that looks for suspicious behaviour, not just known viruses.
Open full page → Click to flip back

Glossary · Operations

API · Application Programming Interface.

Click to flip →

How two systems talk to each other.
Open full page → Click to flip back

Glossary · Operations

Webhook · An automated notification one system sends another.

Click to flip →

Used by Zapier, Make, Power Automate.
Open full page → Click to flip back

Glossary · Operations

MDM · Mobile Device Management.

Click to flip →

Software that lets you enforce passcodes, encryption, and remote wipe on phones and laptops.
Open full page → Click to flip back

Glossary · Operations

SSRF · Server-Side Request Forgery.

Click to flip →

Where a website fetches a URL provided by the attacker. OWASP A10.
Open full page → Click to flip back

Glossary · Operations

SBOM · Software Bill of Materials.

Click to flip →

A list of every third-party library your application includes.
Open full page → Click to flip back

Glossary · Operations

WAF · Web Application Firewall.

Click to flip →

A filter sat in front of your website that blocks common attacks.
Open full page → Click to flip back

Glossary · Email security

SPF · Sender Policy Framework.

Click to flip →

DNS record listing who's allowed to send email from your domain.
Open full page → Click to flip back

Glossary · Email security

DKIM · DomainKeys Identified Mail.

Click to flip →

A cryptographic signature on outgoing email.
Open full page → Click to flip back

Glossary · Email security

DMARC · Email authentication policy.

Click to flip →

Tells receiving servers what to do when SPF or DKIM fails. Without DMARC at p=reject, criminals can impersonate your domain.
Open full page → Click to flip back

Glossary · Email security

Email spoofing · Forging the “From” field of an email.

Click to flip →

Trivially easy without SPF/DKIM/DMARC.
Open full page → Click to flip back

Glossary · Email security

BIMI · Brand Indicators for Message Identification.

Click to flip →

Lets your verified logo show next to emails.
Open full page → Click to flip back

Glossary · Data & compliance

GDPR · UK / EU data protection law.

Click to flip →

Governs how you handle personal data. Applies to almost every business.
Open full page → Click to flip back

Glossary · Data & compliance

DPA 2018 · Data Protection Act 2018.

Click to flip →

The UK domestic law alongside UK GDPR.
Open full page → Click to flip back

Glossary · Data & compliance

Personal data · Information about an identifiable person.

Click to flip →

Wider than people think — includes business contact details.
Open full page → Click to flip back

Glossary · Data & compliance

ICO · Information Commissioner's Office.

Click to flip →

The UK data protection regulator. Breach line: 0303 123 1113.
Open full page → Click to flip back

Glossary · Data & compliance

DPIA · Data Protection Impact Assessment.

Click to flip →

A structured review of risk when you do something new with personal data.
Open full page → Click to flip back

Glossary · Data & compliance

DSAR / Subject Access Request · When someone asks for the data you hold on them.

Click to flip →

You must respond within one month.
Open full page → Click to flip back

Glossary · Data & compliance

PECR · Privacy and Electronic Communications Regulations.

Click to flip →

The cookies + electronic marketing rules.
Open full page → Click to flip back

Glossary · Data & compliance

NIS / NIS 2 · Network and Information Systems Regulations.

Click to flip →

Cyber resilience law for “essential” and “important” services.
Open full page → Click to flip back

Glossary · Data & compliance

Cyber Essentials · UK government-backed minimum cyber standard.

Click to flip →

Five technical controls. Achievable in weeks.
Open full page → Click to flip back

Glossary · Data & compliance

ISO 27001 · International information-security management standard.

Click to flip →

Heavier-weight than Cyber Essentials.
Open full page → Click to flip back

Glossary · Data & compliance

IASME · Cyber-security certification body.

Click to flip →

Runs Cyber Essentials assessments.
Open full page → Click to flip back

Glossary · Data & compliance

CIS Controls · A prioritised list of cyber controls.

Click to flip →

Free, framework-style.
Open full page → Click to flip back

Glossary · Data & compliance

OWASP · Open Web Application Security Project.

Click to flip →

The non-profit behind the OWASP Top 10.
Open full page → Click to flip back

Glossary · Data & compliance

ROPA · Record of Processing Activities.

Click to flip →

A list of what personal data you process, why, and for how long. GDPR Article 30 requirement.
Open full page → Click to flip back

Glossary · Insurance

Cyber insurance · Insurance against cyber incidents.

Click to flip →

Usually covers ransomware response, business interruption, customer notification.
Open full page → Click to flip back

Glossary · Insurance

Deductible / Excess · What you pay before the policy pays.

Click to flip →

Set it at a level you could absorb.
Open full page → Click to flip back

Glossary · Insurance

Sub-limit · A cap inside a cap.

Click to flip →

Your £1m policy may have a £100k sub-limit on social engineering.
Open full page → Click to flip back

Glossary · Insurance

Retroactive date · How far back a policy will look.

Click to flip →

If you discover a breach today that happened last year, the retroactive date decides whether you're covered.
Open full page → Click to flip back

Glossary · Insurance

IR retainer · A pre-paid incident response engagement.

Click to flip →

Included with many cyber policies.
Open full page → Click to flip back

Glossary · AI

LLM · Large Language Model.

Click to flip →

The technology behind ChatGPT, Claude, Copilot.
Open full page → Click to flip back

Glossary · AI

Hallucination · When an AI confidently invents an incorrect answer.

Click to flip →

Common, even with good models.
Open full page → Click to flip back

Glossary · AI

Prompt injection · Hostile instructions hidden in data the AI reads.

Click to flip →

A risk for AI that browses, reads emails, or uses tools on your behalf.
Open full page → Click to flip back

Glossary · AI

Training data · What the AI learned from.

Click to flip →

If a vendor trains on your prompts, your inputs become part of the model.
Open full page → Click to flip back

Glossary · AI

RAG · Retrieval-Augmented Generation.

Click to flip →

An AI that looks up your documents before answering.
Open full page → Click to flip back

Glossary · AI

AI agent · An AI that can take actions, not just answer.

Click to flip →

Treat agents as junior staff with no probation.
Open full page → Click to flip back

Glossary · Cloud

SaaS · Software as a Service.

Click to flip →

You log in to use someone else's software.
Open full page → Click to flip back

Glossary · Cloud

IaaS · Infrastructure as a Service.

Click to flip →

You rent virtual servers.
Open full page → Click to flip back

Glossary · Cloud

PaaS · Platform as a Service.

Click to flip →

You bring code; the platform runs it.
Open full page → Click to flip back

Glossary · Cloud

Shared responsibility model · What the cloud provider does vs what you do.

Click to flip →

Most cloud breaches are misunderstanding this line.
Open full page → Click to flip back

Glossary · Cloud

Tenant · Your isolated slice of a shared cloud service.

Click to flip →

Whoever owns the tenant owns your data.
Open full page → Click to flip back

Glossary · Cloud

Data residency · Where your data physically lives.

Click to flip →

Matters for GDPR and customer contracts.
Open full page → Click to flip back

Glossary · Network & web

VPN · Virtual Private Network.

Click to flip →

An encrypted tunnel between two networks.
Open full page → Click to flip back

Glossary · Network & web

Firewall · Network filter that allows or blocks traffic.

Click to flip →

Still essential.
Open full page → Click to flip back

Glossary · Network & web

DNS · The internet's address book.

Click to flip →

Who controls your DNS controls your email and website.
Open full page → Click to flip back

Glossary · Network & web

TLS / SSL certificate · The padlock in your browser.

Click to flip →

Expires — track the date.
Open full page → Click to flip back

Glossary · Network & web

Network segmentation · Splitting one network into several.

Click to flip →

Stops a compromise in one place spreading.
Open full page → Click to flip back

Glossary · Network & web

Zero trust · Don't trust anything by default.

Click to flip →

Practical version: MFA everywhere, conditional access, device compliance.
Open full page → Click to flip back

Glossary · Network & web

Rate limiting · Capping how often something can be tried.

Click to flip →

Stops brute-forcing of logins.
Open full page → Click to flip back

Glossary · Network & web

XSS · Cross-site scripting.

Click to flip →

A web flaw that lets an attacker run malicious code in another user's browser.
Open full page → Click to flip back

Glossary · Network & web

CSRF · Cross-site request forgery.

Click to flip →

Tricking a logged-in user's browser into making a request they didn't intend.
Open full page → Click to flip back