Skip to main content

Glossary

Establishing a baseline definition of the terminologies used throughout the blog and having a point of reference will greatly ensure everyone is on the same page.

Understand that this page will always be a work in progress. Please feel free to contact us if there are clarifications that you wish to have on the terms defined here or of its use elsewhere in this blog. The source of each definition is referenced.

Definition of Terms

Access
the instruction, communication with, storing in, retrieving data from, or otherwise making use of any resource of a computer system of communication network.1
Access/Credentials Abuse
Activity detected that violates the known use policy of that network or falls outside of what is considered typical usage.2
Alteration
the modification or change, in form or substance of an existing computer data or program.1
Attack
Security events that have been identified by correlation and analytics tools as malicious activity attempting to collect, disrupt, deny, degrade, or destroy information system resources or the information itself. Security events such as SQL Injection, URL tampering, denial of service and spear phishing fall into this category.2
Brief or Compromise
An incident that has successfully defeated security measures and accomplished its designated task.2
Communication
The transmission of information through ICT media, including voice, video or other forms of data.1
Computer
An electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet.1
Computer program
A set of instructions executed by the computer to achieve intended results.1
Computer system
Any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data. It covers any type of device with data processing capabilities including, but not limited to, computers and mobile phones. The device consisting of hardware and software may include input, output and storage components which may stand alone or be connected in a network or other similar devices. It also includes computer data storage devices or media.1
Without right
conduct undertaken without or in excess of authority;1
conduct not covered by established legal defenses, excuses, court orders, justifications, or relevant principles under the law.1
Cyber
A computer or a computer network, the electronic medium in which online communication takes place.1
Critical Infrastructure
The computer systems, and/or networks, whether physical or virtual, and/or the computer programs, computer data and/or traffic data so vital to this country that the incapacity or destruction of or interference with such system and assets would have a debilitating impact on security, national or economic security, national public health and safety, or any combination of those matters.1
Cybersecurity
The collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.1
Database
A representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.1
Interception
Listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.1
Denial of service
Attempts to flood a server or network with such a large amount of traffic or malicious traffic that it renders the device unable to perform its designated functions.2
Droppers
Malicious software designed to install other malicious software on a target.2
Event
An event is an observable occurrence in a system or network.2
Inadvertent Actor
Any attack or suspicious activity sourcing from an IP address inside a customer network that is allegedly being executed without the knowledge of the user.2
Keyloggers
Software designed to record the keystrokes typed on a keyboard. This malicious software is primarily used to steal passwords.2
Malicious code
A term used to describe software created for malicious use. It is usually designed to disrupt systems, gain unauthorized access or gather information about the system or user being attacked. Third-party software, Trojan software, keyloggers and droppers can fall into this category.2
Phishing
A term used to describe when users are tricked into opening an infected email attachment or browsing to a malicious website disguised as a trusted destination where they provide information that can be used to access a system or account or steal their identities.2
Service provides
Any public or private entity that provides to users of its service the ability to communicate by means of a computer system; 1
Any other entity that processes or stores computer data on behalf of such communication service or users of such service.1
Subscriber's information
any information contained in the form of computer data or any other form that is held by a service provider, relating to subscribers of its services other than traffic or content data and by which identity can be established:1
  1. The type of communication service used, the technical provisions taken thereto and the period of service;
  2. The subscriber’s identity, postal or geographic address, telephone and other access numbers, any assigned network address, billing and payment information, available on the basis of the service agreement or arrangement; and
  3. Any other available information on the site of the installation of communication equipment, available on the basis of the service agreement or arrangement.
Spear phishing
Phishing attempts with specific targets. These targets are usually chosen strategically in order to gain access to very specific devices or victims.2
SQL Injection
An attack that attempts to pass SQL commands through a website in order to elicit a desired response.2
Traffic data or non-content data
Any computer data other than the content of the communication including, but not limited to, the communication’s origin, destination, route, time, date, size, duration, or type of underlying service.1
Trojan
Malicious software hidden inside another software package that appears safe
Unauthorized access
This usually denotes suspicious activity on a system or failed attempts to access a system by a user or users who do not have permission.2
Zero-day
An unknown vulnerability in an application or a computer operating system.2
1
2

References

  1. https://www.dict.gov.ph/wp-content/uploads/2014/07/RA10175_CyberCrimePreventionActof2012.pdf
    http://www.gov.ph/2012/09/12/republic-act-no-10175/
  2. https://www.ibm.com/software/info/direct/redirect.jsp?pkg=ov47123
    https://www-02.ibm.com/common/ssi/cgi-bin/ssialias?subtype=WH&infotype=SA&htmlfid=SEW03233USEN&attachment=SEW03233USEN.PDF

Popular Posts

Protect Personal Information - Present and Future Value

Dear Mothers, We understand you are proud of your child. You can shout to the world that you are but please do not share your child's personal information online.

Like Farming - Not All You Like Is What It Is

Only a few people will really believe warnings such as the one we're about to quote. It goes like this: