(770) 589-5654 service@computerrepairroswell.com Mon–Sat: 9am – 7pm
No-Fix, No-Fee Guarantee
Reference · Security

Cybersecurity Glossary, A–Z

A plain-English reference for the antivirus and security terms you'll encounter in our articles, your security software, and the news. Written for PC and Mac owners by the certified technicians at our Roswell shop.

99 terms · 9 categories Updated May 2026 By Computer Repair Roswell

Ninety-nine terms, alphabetized, across nine categories — from malware and attack methods to identity, privacy, network, mobile, and hardware-level security. Each term is tagged so you can tell at a glance what kind of thing you're looking at. Where useful, we've added a short tip on what to do if you encounter the thing. If a term isn't here, drop us a line — we'll add it.

A 6 terms
Adware Malware

Software that displays unwanted ads — pop-ups, banner injections, redirected search results. Often bundled with free downloads, sometimes a vehicle for worse infections.

If you're seeing pop-ups when nothing is open, you have adware, not "a virus."
AES a.k.a. Advanced Encryption Standard Defense

The encryption algorithm used by virtually every secure system today — BitLocker, FileVault, WPA2/3, HTTPS. AES-256 means a 256-bit key, currently considered unbreakable by brute force.

Air-gapped Defense

A computer or backup drive that has no network connection — physically isolated from any network. The strongest defense against remote attack, used for offline backups and high-security systems.

Antivirus a.k.a. AV Defense

Software that scans files and processes for known malware signatures and suspicious behavior. Windows Defender (built into Windows 10/11) is sufficient for most home users.

APT a.k.a. Advanced Persistent Threat Attack

A targeted, long-running attack — usually nation-state or organized crime — that quietly maintains access to a network for months or years. Rarely a concern for home users.

Authentication Identity

The process of proving you are who you say you are — typically via password, biometric, or hardware key. Distinct from authorization, which is what you're allowed to do once authenticated.

B 8 terms
Backdoor Malware

A covert remote-access channel an attacker installs (or that a developer left in) so they can re-enter the system at will, bypassing normal authentication.

See our full article on backdoor trojans for detection and removal.
Backup Defense

A separate copy of your data stored somewhere your machine can't reach in normal operation. The 3-2-1 rule: 3 copies, on 2 different media, with 1 off-site.

A connected external drive isn't a backup against ransomware. Use cloud backup or an unplugged drive.
Biometric Identity

Authentication based on a physical trait — fingerprint, face, iris. Fast and convenient, but unlike a password, you can't change your fingerprint after a breach.

BIOS / UEFI Hardware

The low-level firmware that runs before your operating system loads, initializing hardware. UEFI replaced the older BIOS on modern machines and supports Secure Boot.

Boot Sector Virus Malware

An old class of virus that infected the first sector of a hard disk so it ran before the OS loaded. Largely defeated by Secure Boot on modern UEFI systems, but rare specimens still appear.

Botnet Attack

A network of compromised computers controlled remotely by an attacker — used to send spam, run DDoS attacks, or mine cryptocurrency. Your machine can be a botnet member without you noticing.

Browser Hijacker Malware

Malware that changes your browser's homepage, search engine, or new-tab page to one the attacker controls — usually to push ads or harvest search data.

Resetting browser settings rarely removes the underlying program. Bring it in.
Brute Force Attack

An attack that tries every possible password until one works. Defended against by long passwords, rate limiting, and lockout policies.

C 5 terms
CAPTCHA Defense

A puzzle (pick the traffic lights, click the boxes) used to distinguish humans from automated bots. Increasingly defeated by AI; many sites have moved to invisible behavioral checks instead.

Clickjacking Attack

An attack that overlays an invisible button on top of what you think you're clicking — you "Like" something or grant a permission without realizing.

Cookie Privacy

A small piece of data a website stores in your browser — used legitimately for login sessions and preferences, sometimes abused for cross-site tracking. Not malware on its own.

Credential Stuffing Attack

An attack that takes username/password pairs leaked from one breach and tries them on other sites, banking on password reuse. Defeated by a unique password per site.

Cryptojacking Malware

Software that secretly uses your machine's CPU or GPU to mine cryptocurrency for an attacker. Often shows up as a hot, slow, fan-running computer with no visible cause.

D 7 terms
Dark Web Concept

Parts of the internet that require special software (commonly Tor) to access. Used for both privacy-protective and illegal activity, including the sale of stolen credentials.

Data Breach Privacy

An incident where data — credentials, personal info, financial data — leaks from a company's systems into the wild. Free site haveibeenpwned.com tells you if your email is in known breaches.

Assume any password you used at a breached site is now public. Change it everywhere it was reused.
DDoS a.k.a. Distributed Denial of Service Attack

An attack that overwhelms a server or service with traffic from many sources at once, knocking it offline. Targets are usually businesses, not home users.

Deepfake Attack

AI-generated audio or video impersonating a real person. Increasingly used in voice-phishing scams that imitate a family member's voice or a CEO's face on a video call.

Digital Certificate Defense

A cryptographic credential that proves a website (or person) is who it claims to be. The lock icon in your browser checks the site's certificate against a chain of trusted authorities.

DNS Hijacking Attack

An attack that changes which servers your machine asks to translate domain names — silently redirecting your traffic to attacker-controlled sites even when the URL looks correct.

If your browser shows certificate warnings on banking sites, suspect DNS hijacking.
Drive-by Download Attack

Malware that installs automatically when you visit a compromised website, exploiting a browser or plugin vulnerability without any click required.

E 4 terms
EDR a.k.a. Endpoint Detection & Response Defense

A modern, behavior-based step beyond traditional antivirus. Records what processes do and flags suspicious patterns. Mostly a business tool; some consumer AV products now include EDR-style features.

Encryption Defense

Mathematical scrambling of data so only someone with the right key can read it. Two flavors: at rest (BitLocker, FileVault) protects a stolen drive; in transit (HTTPS, VPN) protects data on the wire.

Endpoint Concept

Any device on a network — laptop, phone, server, smart fridge. "Endpoint security" means protecting individual devices rather than the network around them.

Exploit Attack

Code that takes advantage of a specific vulnerability in software to do something the software wasn't supposed to allow — usually to run an attacker's code.

F 3 terms
False Positive Concept

When AV flags a legitimate file as malicious. Common with heuristic detection. If you're sure a flagged file is safe, you can usually allow it; if you're not sure, ask us.

Fileless Malware Malware

Modern malware that runs entirely in memory and leaves no executable file on disk. Defeats signature-based AV; detected only by behavior monitoring or memory forensics.

Firewall Defense

A filter between your machine (or network) and the internet that decides what traffic is allowed in or out. Built into Windows and macOS; also a feature of your home router.

G 1 term
GDPR a.k.a. General Data Protection Regulation Privacy

European data-protection law that gives individuals rights over how their personal data is collected, stored, and used. Has shaped privacy practices and cookie banners worldwide.

H 4 terms
Hash Concept

A one-way mathematical fingerprint of a file or password. Two different inputs essentially never produce the same hash. Used for integrity checks and for storing passwords without storing the password itself.

Heuristic Detection Defense

AV detection based on behavior patterns rather than known signatures — flags software that acts like malware even if it's never been seen before. Catches more new threats but produces more false positives.

HSTS a.k.a. HTTP Strict Transport Security Defense

A web standard that tells your browser "always use HTTPS for this site, never plain HTTP." Defends against downgrade attacks where an attacker tries to force you onto unencrypted HTTP.

HTTPS Defense

The encrypted version of HTTP, indicated by the lock icon in your browser's address bar. Protects what you send to and receive from a site, but doesn't guarantee the site itself is trustworthy.

I 4 terms
Identity Theft Identity

When someone impersonates you using stolen credentials or personal data — opening accounts, filing tax returns, or taking out loans in your name. Recovery can take months.

IDS / IPS a.k.a. Intrusion Detection / Prevention System Defense

Network-monitoring tools that watch for suspicious traffic. IDS alerts; IPS actively blocks. Mostly business-grade, but some consumer routers and firewalls include lightweight IDS features.

Incident Response Concept

The structured process of detecting, containing, eradicating, and recovering from a security incident. Has a formal lifecycle in business security but the principles apply at home too.

IoT a.k.a. Internet of Things Concept

Networked smart devices — thermostats, doorbells, fridges, cameras, light bulbs. Often poorly secured and a common entry point onto home networks.

Put IoT devices on a separate Wi-Fi network from your laptops and phones if your router supports it.
J 1 term
Jailbreak Mobile

Removing the manufacturer's software restrictions on a phone or tablet so you can install apps from outside the official store. Voids most security guarantees of the device.

K 1 term
Keylogger Malware

Software (occasionally hardware) that records every keystroke — capturing passwords, messages, and credit card numbers as you type them. Usually bundled inside spyware.

L 2 terms
Least Privilege Defense

The principle that a user, program, or service should have only the access it needs to do its job — no more. The single most important architectural defense in security.

Logic Bomb Malware

Malicious code that lies dormant until a specific trigger (a date, a condition) fires it. Often planted by an insider before they leave a company.

M 4 terms
Macro Virus Malware

Malware embedded in Office document macros (Word, Excel). Triggered when you open the file and click "Enable Macros." Still common in business phishing.

Never enable macros on a document from someone you don't know — and even from people you do, ask if they sent it.
Malware Malware

Umbrella term for malicious software. Includes viruses, worms, trojans, spyware, ransomware, rootkits, adware, and others. The word "virus" is often misused to mean any of these.

MFA / 2FA a.k.a. Multi-factor / Two-factor Authentication Identity

Requiring a second proof beyond your password — usually a code from an authenticator app or hardware key. SMS codes are better than nothing but vulnerable to SIM-swap attacks.

Enable MFA on email first. Email is the master key to every other account.
MITM a.k.a. Man-in-the-Middle Attack

An attack where the attacker secretly relays and possibly alters communication between two parties who believe they're talking directly to each other. Common on unsecured public Wi-Fi.

N 1 term
Network Segmentation Network

Dividing a network into separate zones (your laptops, your IoT devices, your guest Wi-Fi) so a compromise in one zone can't easily reach the others. A common pattern: main + IoT + guest.

O 1 term
OAuth Identity

The standard that lets you "Sign in with Google/Apple/Microsoft" on third-party sites without giving them your password. The site receives a limited-scope token instead.

P 8 terms
Passkey Identity

A passwordless login standard backed by Apple, Google, and Microsoft that replaces passwords with a cryptographic key tied to your device's biometric. Cannot be phished.

If a site offers passkeys, use them. They're strictly safer than passwords plus MFA.
Password Manager Defense

A program that stores a unique strong password for every account, locked behind one master password. Bitwarden, 1Password, and similar are far safer than reusing passwords.

Patch Defense

A software update that fixes a known vulnerability. The single most effective defense against most malware is keeping your OS and apps patched.

Pharming Attack

An attack that secretly redirects your traffic from a legitimate site to a fake one — usually via DNS hijacking — without changing the URL you typed in your browser.

Phishing Attack

A fake email, text, or page designed to look like a legitimate one (your bank, Microsoft, the IRS) to trick you into entering credentials or clicking a malicious link. The most common way home users get compromised.

When in doubt, type the company's URL directly. Never trust a link in an unexpected email.
Privilege Escalation Attack

An attacker who's gained limited access then exploits a vulnerability to gain administrator-level access on a compromised machine. The bridge from "got in" to "owns everything."

Public / Private Key Defense

A pair of mathematically linked keys used in asymmetric cryptography. Anything encrypted with the public key can only be decrypted by the private key. Underpins HTTPS, SSH, and modern messaging apps.

PUP a.k.a. Potentially Unwanted Program Malware

Borderline software — toolbars, "registry cleaners," fake optimizers — that isn't quite malware but isn't something you wanted either. Usually bundled with free downloads.

Q 2 terms
Quarantine Defense

An isolated holding area inside your antivirus program where suspect files are kept (encrypted, unable to run) until you decide whether to delete or restore them.

Quishing a.k.a. QR-code Phishing Attack

Phishing delivered via a malicious QR code — on a parking meter, a restaurant menu, an email attachment. Bypasses URL-filtering since the link is hidden inside the image.

Don't scan QR codes that aren't obviously from a trusted source. Type URLs instead when possible.
R 3 terms
Ransomware Malware

Malware that encrypts your files and demands payment (usually in cryptocurrency) for the decryption key. The defense is offline backups; once encrypted without backups, recovery is rarely possible.

Never pay. Bring the machine to us — sometimes there are free decryptors for older variants.
Recovery Key Defense

The long, randomly-generated string that lets you decrypt a BitLocker or FileVault drive if you lose your password. Without it, the drive is unrecoverable.

Store it somewhere safe — your Microsoft/Apple account, a password manager, or printed in a drawer.
Rootkit Malware

Malware that buries itself deep in the operating system to hide other malware from antivirus and from you. Detection usually requires booting the drive into a separate environment.

S 17 terms
Salt Concept

A random value added to a password before hashing so two users with the same password produce different hashes. Prevents pre-computed lookup-table attacks.

Sandbox Defense

An isolated environment where suspect software runs without being able to affect the rest of the system — used by AV products to safely test files, and by browsers to contain page code.

Scareware Malware

Fake "Your computer is infected!" pop-ups that try to panic you into installing a program (which is itself the malware) or paying for fake support. Often delivered via web ads.

Secure Boot Hardware

A UEFI feature that refuses to load operating-system code that hasn't been signed by a trusted vendor. Defends against bootkits and rootkits that try to load before the OS.

Session Hijacking Attack

Stealing the cookie or token that proves you're logged in to a site, then using it to access the account without needing the password. Why HTTPS and HSTS matter.

Signature Defense

A unique fingerprint (often a hash or byte pattern) that identifies a specific piece of known malware. Effective for known threats, useless for new ones — hence the move toward heuristic and behavioral methods.

SIM Swap Mobile

Convincing a mobile carrier (often via social engineering) to transfer your phone number to an attacker's SIM card — defeating SMS-based 2FA and potentially locking you out of accounts.

Use an authenticator app instead of SMS for 2FA wherever possible.
Skimmer Hardware

A physical device attached to an ATM, gas pump, or card reader that records magnetic-stripe data as you swipe. Wiggle the card slot before inserting — skimmers often feel loose.

Smishing a.k.a. SMS Phishing Attack

Phishing delivered via text message — fake delivery notifications, fake bank alerts, fake IRS warnings. Has overtaken email as the most common phishing channel for personal accounts.

SOC a.k.a. Security Operations Center Defense

A team or facility that monitors a network 24/7 for security events. Mostly a business concept; large enterprises run a SOC, smaller ones contract one.

Social Engineering Attack

Manipulating a person rather than a machine — a fake phone call from "Microsoft support," a phishing email, a tailgater at the office door. The human is almost always easier to compromise than the technology.

Spear Phishing Attack

Phishing customized for a specific target — using their real name, employer, or recent project — making it far harder to spot than mass phishing. Often the first step in a major breach.

Spyware Malware

Malware that secretly observes — keystrokes, screenshots, microphone, browsing history — and exfiltrates the data to an attacker. Often combined with keyloggers.

SQL Injection Attack

An attack that smuggles database commands into a website's text fields. Mostly a web-developer concern, but a common cause of the data breaches that end up exposing your credentials.

SSL / TLS Defense

The encryption protocol underlying HTTPS. SSL is the older name; TLS is the current standard. The lock icon in your browser means a TLS connection is active.

SSO a.k.a. Single Sign-On Identity

One login that grants access to multiple related services. "Sign in with Microsoft 365" is SSO. Convenient, but a compromised SSO account is a master key.

Supply Chain Attack Attack

An attack that compromises a trusted vendor (a software updater, a hardware supplier, a cloud provider) to reach the vendor's many customers at once. SolarWinds and 3CX are well-known examples.

T 3 terms
Threat Actor Concept

Anyone behind a cyberattack — categorized by motivation (financial, political, ideological) and capability (script kiddie, criminal, nation-state).

TPM a.k.a. Trusted Platform Module Hardware

A small chip on your motherboard that stores encryption keys and credentials securely. Required by Windows 11; used by BitLocker and Windows Hello.

Trojan Malware

Malware disguised as something legitimate. Named for the Trojan Horse — you let it in voluntarily because it looked useful. The most common modern infection vector by a wide margin.

U 1 term
UAC a.k.a. User Account Control Defense

The Windows prompt that pops up before changes to system settings or installations. Annoying when frequent, but the most effective defense against silent installs.

When a UAC prompt appears that you didn't initiate, click No.
V 5 terms
Virus Malware

In the strict sense: code that attaches itself to a legitimate file and replicates when that file is opened. The word is widely used (loosely) to mean any malware, but true viruses are now relatively rare compared to trojans.

Vishing a.k.a. Voice Phishing Attack

Phishing delivered by phone call — fake "Microsoft support," fake bank fraud alerts, fake IRS warnings. Caller ID spoofing makes the number appear legitimate.

Hang up and call the company back at a number you know is real.
VLAN a.k.a. Virtual LAN Network

A way to separate one physical network into isolated logical networks. Used at home (on better routers) to keep IoT devices off your main network.

VPN a.k.a. Virtual Private Network Defense

An encrypted tunnel between your device and a VPN provider's server, used to protect traffic on untrusted networks (public Wi-Fi) and to obscure your IP. Doesn't protect you from malware, only from network eavesdropping.

Vulnerability Concept

A flaw in software (or hardware) that can be exploited to make it do something it wasn't supposed to. Patches close vulnerabilities; until patched, a vulnerability is an open door.

W 5 terms
Watering Hole Attack

An attacker compromises a website that members of a target group are known to visit (an industry forum, a niche news site) and waits for the targets to come to them. Indirect, hard to detect.

Whaling Attack

Phishing aimed specifically at high-value targets — executives, finance staff, IT administrators — usually with a hand-crafted message that's harder to spot than mass phishing.

Wi-Fi Sniffing Attack

Capturing wireless network traffic from nearby devices. Modern HTTPS makes most captured traffic unreadable, but unsecured Wi-Fi networks still leak metadata and connection patterns.

Worm Malware

Self-replicating malware that spreads across networks on its own — no host file required and no user action needed. Famous examples: Conficker, WannaCry.

WPA / WPA2 / WPA3 Network

Wi-Fi encryption standards. WPA3 is current; WPA2 is acceptable; anything older (WEP, WPA1) is broken and trivially intercepted.

Check your router admin page for the security mode. If it shows WEP or WPA, upgrade to WPA2/WPA3 immediately.
X 1 term
XSS a.k.a. Cross-Site Scripting Attack

An attack where malicious JavaScript injected into one site runs in your browser when you visit, often stealing cookies or session tokens. A web-developer issue, but the cause of many account takeovers.

Z 2 terms
Zero-Day Concept

A vulnerability that the software vendor doesn't know about yet, meaning no patch exists. Named for the number of days defenders have had to fix it. Highly valuable to attackers.

Zombie Malware

A computer that's been compromised and added to a botnet without the owner knowing. Receives commands from a command-and-control server.

Ready to Get Your Computer Fixed?

Same-day diagnostics, transparent pricing, and a 90-day warranty on every repair. Submit your request now or call us directly.

Call (770) 589-5654