Cyber security refers to the necessary steps taken to ensure information security over the web or offline information that can be accessed from the web. With the development of the internet, cyber security has become one of the most common object of concern for government, financial organization and business entities. Cyber security as a whole involves each and every step taken to save and defend data from all sorts of unauthorized access via the internet. This means that the contingency plan or a back plan to save the companies information and restore them as they were, also falls under the cyber security system as well.

Cyber security is a widely spread area of work which currently has hundreds of terminology that are used on a daily basis to describe its different aspects. Some of the common terminology used to describe the types of cyber-attack are:

  • Active attack: An active attack refers to the incident when an authorized user uses brute force to access a protected system with the intention of stealing, manipulating or destroying its vital information to create disturbance in the organization or the process.
  • Passive attack: A passive attack refers to an act of using brute force to penetrate an information database or a system for observing or collecting vital information without destroying or manipulating it.
  • Data breach: An act of online vigilance where brutal script penetration is used to access a secured system with the intention of destroying its common workflow or to damage the system in a permanent way.

Common terminology used to define a suspicious script and its activity are:

Bot: A bot is an automated script which is designed to use a computer system to initiate certain course of action which would cause disturbance and break down of the system.
Backdoor: Backdoor is an encrypted scripts which helps the hacker (a programmer who has the intention to get unauthorized access to an information and manipulate it at his own will) to create whole in an information database for easy access and information manipulation.
Malware: Malware refers to plugins, scripts or a software that creates disturbance in a steady system and initiates unauthorized process by its own.
Spyware: Spyware is a script or software that creates backdoor by its own to pass vital information of a computer or a system to its pre-determined receiver.
Phishing: Phishing is a form of social engineering used to fraud an internet user to collect his vital personal information.