Select Your Cookie Preferences

We use cookies and similar tools that are necessary to enable you to use our website, to enhance your experience, and provide our services, as detailed in our Cookie Notice. We also use these cookies to understand how customers use our services (for example, by measuring site visits) so we can make improvements.

If you agree, we'll also use cookies to complement your website experience, as described in our Cookie Notice. This may include using third party cookies for the purpose of displaying and measuring interest-based ads. Click "Customise Cookies" to decline these cookies, make more detailed choices, or learn more.

The Computeam ABC of Cybersecurity

32 Cybersecurity acronyms and terms you need to know

Protecting your school’s data and systems has never been more important. While cyber threats continue to evolve and become more sophisticated, staying ahead of the curve and understanding key cybersecurity concepts is fundamental for both education leads and school staff.

Below you’ll find a comprehensive guide to cybersecurity acronyms and terms that will help you navigate this complex, often bewildering online environment. You can also download a PDF version of this glossary of terms by clicking the button below:

Download ABC of Cybersecurity PDF >

cyber security measures for schools

Threats

1. Advanced Persistent Threat (APT)

A cyber attack in which an advanced (possibly state-backed) hacker or bad actor targets a specific organisation for a long period of time by staying hidden in a network.

2. Bring Your Own Device (BYOD)

A policy allowing employees to use personal devices to access company resources.

3. Data Incident (or data breach)

An event that occurs when information is accessed and/or exfiltrated by an unauthorised person or entity, like a hacker, without the knowledge of the organisation from which it came.

4. Distributed Denial of Service (DDoS)

A type of attack in which a network is flooded with traffic from multiple sources to overload it and cause a service disruption.

5. Encryption

The process of converting plaintext into ciphertext using a secret key.

6. Hacker

Also known as a bad actor or threat actor. An individual who uses a computer system to gain unauthorised access to an account or system for data.

7. Living off the Land

A cybersecurity attack that involves hackers using the target's existing and known hardware and/or software resources to engage in malicious activity.

8. Malware

Also known as malicious software that is designed to cause harm to a computer system or network.

9. Phishing

The most common form of cybercrime in which a hacker or bad actor attempts to gain access to personal and/or company data. Phishing typically occurs via email with links containing malware.

10. Ransomware

A form of malware where bad actors encrypt information on a computer system so users are unable to access their own data and demand payment in exchange for giving back the information.

11. Risk Assessment

A big-picture snapshot of your current cyber risk exposure — revealing vulnerabilities and uncovering opportunities to improve defences.

12. Zero-day Attack

A cyber-attack that infiltrates information systems through previously unknown vulnerabilities in software and/or firmware. When a company updates any server, device, or system, there is a risk of potential incidents in vulnerable areas within the update.

cyber security in schools

Solutions

13. Anti-virus (AV)

Software used to identify and isolate (quarantine) viruses, worms, and other malicious software from endpoints (laptop, servers, mobile devices, etc.)

14. Business Continuity and Disaster Recovery (BCDR)

A solution to reduce business downtime, mitigate legal ramifications, and save SMBs from losing money as the result of disasters, whether natural or human-made.

15. Cloud Computing

The delivery of computing services, including servers, storage, databases, and software, over the internet.

16. Cybersecurity Insurance

A form of insurance that protects businesses and individuals from financial loss from cyber attacks or incidents.

17. Disaster Recovery Plan

A documented procedure for an organisation to follow to recover from a disaster that impacts normal operations.

18. Endpoint Detection and Response (EDR)

A tool that identifies and investigates threats to a business’s endpoints. EDR solutions replace traditional Anti-virus software by offering more security.

19. eXtended Detection Response (XDR)

An advanced security technology that combines multiple security tools and data sources to provide a more thorough and comprehensive look inside your organisation's security posture.

20. Firewall

A network security system that monitors and controls incoming and outgoing network traffic based on security rules.

21. Incident Response (IR)

A formal, documented, and organised approach to managing the effects of a security incident or cyberattack.

22. Managed Detection Response (MDR)

A cybersecurity solution that uses EDR monitored 24/7/365 using trained expert humans (SOC) to provide a more complete cybersecurity defence.

23. Multi-factor Authentication (MFA)

A security method used to add a second layer of authentication when accessing accounts and/or devices. In addition to a username and password, MFA also requires codes, biometrics, or other information to sign into an account.

24. Secure Access Service Edge (SASE)

A cloud-based zero-trust architecture which requires no on-premise hardware.

25. Security Information and Event Management (SIEM)

A log monitoring and archiving tool that provides your business with the ability to identify threats and anomalies in real-time, or to investigate historic network, system, and user activities.

26. Single Sign-On (SSO)

A technology that gives users access to multiple accounts with just one set of login credentials. SSO simplifies the login process and reduces the risk of poor password hygiene, like weak or reused passwords.

27. Virtual Private Network (VPN)

A remote connection method used to obfuscate all network traffic using strong encryption. VPN is often used to access a corporate network, or add security and privacy when using public networks such as in airports or hotels.

28. Vulnerability Management

A service that routinely scans for and patches weak points in your system that could be exploited. The process provides real-time visibility into potential flaws so they can be prioritised and addressed before they pose a serious risk.

cyber security in schools

People

29. Chief Information Security Officer (CISO)

A senior-level executive who is responsible for managing the security of a company’s information and technology.

30. Managed Security Services Provider (MSSP)

An MSP (Managed Services Provider) with a focus on security. MSSPs provide services like cybersecurity, BCDR, network monitoring, and more.

31. Network Operations Centre (NOC)

A centralised location where a team of IT professionals monitor and manage the performance and security of remote monitoring and management software.

32. Security Operations Centre (SOC)

A 24/7/365 operation staffed by expert humans who review incoming security alerts and takes immediate action to isolate and remediate potential threats before they can cause significant damage.

How can we help?

Protect your school against cyber attacks

Here at Computeam, we understand the widespread and complex challenges schools face in defending their systems against cyber attacks. 

Through Computeam Secure, our comprehensive cybersecurity solutions are designed with the specific needs of your school in mind, offering robust protection against phishing, malware, and any other common cyber threats.

Whether it’s through advanced threat detection measures or providing ongoing security training for staff through Learning Locker, we can strengthen your school's defences and create a safe digital learning environment for all. If you'd like to find out more about how Computeam help improve your school's cybersecurity measures, then please click the button below: 

Get in touch  >

You may also like: 

Bridging The Digital Divide
In Education

Read more

Girls in STEM Education: Closing the Gender Gap in Technology

Read more

Posted on July 17th 2024

Loading... Updating page...