INFORMATION SECURITY TERMINOLOGIES

Every field has its own language, and cybersecurity is no different. These eight terms are essential vocabulary for any security professional. Understanding the difference between a vulnerability, a threat, and an exploit is crucial.
📚 IMPORTANT TERMINOLOGIES
💎 Asset
Any data, device, or component that supports information-related activities and should be protected.
🕳️ Vulnerability
A flaw or weakness inside an asset that could be used to gain unauthorized access.
⚠️ Threat
A possible danger to the computer system. Something an organization doesn't want to happen.
🔨 Exploit
Something that takes advantage of a vulnerability to cause unintended behavior.
📊 Risk
The impact (damage) resulting from successful compromise of an asset.
0️⃣ Zero-Day Attack
Threats that exploit vulnerabilities before the developer identifies or patches them.
⛓️ Daisy Chaining
Sequential process of several hacking attempts to gain access, one after another.
📄 Doxing
Publishing information associated with an individual, collected from public sources.