Cybersecurity Threats

Expert-defined terms from the Graduate Certificate in Geopolitical Risk Management course at London School of Planning and Management. Free to read, free to share, paired with a globally recognised certification pathway.

Cybersecurity Threats

Cybersecurity Threats #

Cybersecurity threats refer to potential dangers or risks to computer systems, n… #

These threats can come in various forms, such as malware, phishing attacks, denial of service attacks, and insider threats.

Malware #

Malware, short for malicious software, is a type of software designed to gain un… #

Common types of malware include viruses, worms, trojans, ransomware, and spyware.

Phishing #

Phishing is a type of cyber attack where attackers use fraudulent emails, websit… #

The goal of phishing attacks is usually to steal information or money.

Denial of Service (DoS) Attack #

A Denial of Service (DoS) attack is a cyber attack where attackers flood a netwo… #

This can result in service disruptions and downtime.

Insider Threat #

An insider threat refers to a security risk posed by individuals within an organ… #

Insider threats can be intentional or unintentional and can result in data breaches or other security incidents.

Zero #

Day Vulnerability:

A zero #

day vulnerability is a software vulnerability that is unknown to the software vendor or developers. Attackers can exploit zero-day vulnerabilities to launch cyber attacks before a patch or fix is available, making them particularly dangerous.

Advanced Persistent Threat (APT) #

An Advanced Persistent Threat (APT) is a sophisticated and targeted cyber attack… #

APTs are often associated with nation-state actors or organized cybercriminal groups.

Ransomware #

Ransomware is a type of malware that encrypts a victim's files or system and dem… #

Ransomware attacks can result in data loss, financial loss, and operational disruptions.

Botnet #

A botnet is a network of compromised computers or devices infected with maliciou… #

Botnets can be used to launch distributed denial of service (DDoS) attacks, send spam emails, or steal sensitive information.

Social Engineering #

Social engineering is a technique used by cyber attackers to manipulate individu… #

Examples of social engineering tactics include pretexting, phishing, and baiting.

Data Breach #

A data breach is a security incident where sensitive, confidential, or protected… #

Data breaches can have serious consequences for individuals and organizations, including financial loss and reputational damage.

Firewall #

A firewall is a network security device or software that monitors and controls i… #

Firewalls help protect networks from unauthorized access and cyber attacks.

Encryption #

Encryption is the process of converting plaintext data into a scrambled format (… #

Encrypted data can only be read by individuals with the appropriate decryption key.

Multi #

factor Authentication (MFA):

Multi #

factor Authentication (MFA) is a security measure that requires users to provide two or more forms of verification (e.g., password, biometric scan, security token) to access an account or system. MFA enhances security by adding an extra layer of protection.

Vulnerability #

A vulnerability is a weakness or flaw in a system, network, or application that… #

Vulnerabilities can be caused by software bugs, misconfigurations, or human errors.

Penetration Testing #

Penetration testing, also known as ethical hacking, is a security assessment tec… #

Penetration testing helps organizations strengthen their security posture.

Security Incident Response #

Security Incident Response is the process of detecting, analyzing, and respondin… #

A well-defined incident response plan helps organizations mitigate the impact of security breaches.

Security Awareness Training #

Security Awareness Training is educational programs designed to educate employee… #

Security awareness training plays a crucial role in preventing security incidents.

Endpoint Security #

Endpoint Security refers to the protection of individual devices (endpoints) suc… #

Endpoint security solutions include antivirus software, firewalls, and encryption to prevent malware infections.

Security Patch #

A security patch is a software update released by vendors to fix known vulnerabi… #

Installing security patches promptly is essential to protect against cyber attacks exploiting these vulnerabilities.

Network Segmentation #

Network Segmentation is the practice of dividing a network into smaller subnetwo… #

By separating network resources, organizations can limit the impact of security incidents and contain breaches.

Security Information and Event Management (SIEM) #

Security Information and Event Management (SIEM) is a technology solution that c… #

SIEM systems help organizations detect and respond to security threats.

Incident Response Plan #

An Incident Response Plan is a documented set of procedures and guidelines that… #

An effective incident response plan should include roles and responsibilities, communication protocols, and steps for containment and recovery.

Access Control #

Access Control is a security measure that regulates who can access specific reso… #

Access control mechanisms include user authentication, authorization, and permissions to prevent unauthorized access.

Security Risk Assessment #

A Security Risk Assessment is a systematic evaluation of an organization's secur… #

By conducting regular risk assessments, organizations can proactively address vulnerabilities and strengthen their defenses.

Security Policy #

A Security Policy is a set of guidelines, rules, and procedures that define the… #

Security policies help establish a security-conscious culture.

Internet of Things (IoT) Security #

Internet of Things (IoT) Security refers to the measures and practices implement… #

g., smart home devices, wearables, industrial sensors) from cyber threats. IoT security is crucial to prevent unauthorized access and data breaches.

Cloud Security #

Cloud Security is the set of policies, controls, and technologies designed to pr… #

Cloud security measures include encryption, access controls, and security monitoring.

Mobile Security #

Mobile Security focuses on protecting smartphones, tablets, and other mobile dev… #

Mobile security solutions include mobile device management (MDM) and mobile application security.

Insider Threat Detection #

Insider Threat Detection refers to the process of monitoring and analyzing user… #

Insider threat detection tools help organizations detect and mitigate risks posed by employees.

Security Operations Center (SOC) #

A Security Operations Center (SOC) is a centralized facility that houses securit… #

SOCs play a critical role in maintaining the cybersecurity posture of organizations.

Threat Intelligence #

Threat Intelligence is information about potential or current cyber threats coll… #

Threat intelligence sources include open-source data, security vendors, and government agencies.

Cybersecurity Framework #

A Cybersecurity Framework is a set of best practices, standards, and guidelines… #

Common cybersecurity frameworks include NIST Cybersecurity Framework and ISO/IEC 27001.

Disaster Recovery Plan (DRP) #

A Disaster Recovery Plan (DRP) is a documented strategy outlining how an organiz… #

DRPs help organizations minimize downtime and data loss.

Business Continuity Plan (BCP) #

A Business Continuity Plan (BCP) is a comprehensive strategy that outlines how a… #

BCPs ensure business resilience and continuity in the face of security threats.

Virtual Private Network (VPN) #

A Virtual Private Network (VPN) is a secure network connection that encrypts dat… #

VPNs are commonly used to enhance online privacy and security.

Security Awareness #

Security Awareness refers to the knowledge, understanding, and behaviors of indi… #

Cultivating a culture of security awareness within an organization is essential to mitigate human-related security risks.

Security Controls #

Security Controls are technical or administrative measures implemented to protec… #

Common security controls include access controls, encryption, intrusion detection systems, and security policies.

Security Incident #

A Security Incident is an event that compromises the confidentiality, integrity,… #

Security incidents can include data breaches, malware infections, unauthorized access, and denial of service attacks.

Cybersecurity Awareness Training #

Cybersecurity Awareness Training is educational programs designed to educate emp… #

Cybersecurity awareness training helps raise awareness and reduce security risks.

Information Security #

Information Security is the practice of protecting the confidentiality, integrit… #

Information security measures include encryption, access controls, and security policies.

Security Architecture #

Security Architecture refers to the design and structure of security controls, t… #

Security architecture aims to create a layered defense strategy to mitigate risks.

Security Incident Management #

Security Incident Management is the process of detecting, analyzing, and respond… #

Security incident management involves incident detection, containment, eradication, recovery, and post-incident analysis.

Security Policy Compliance #

Security Policy Compliance refers to the adherence to security policies, guideli… #

Ensuring security policy compliance helps organizations reduce security risks and maintain a secure environment.

Security Breach #

A Security Breach is a security incident where unauthorized individuals gain acc… #

Security breaches can have serious consequences for organizations and individuals.

Security Risk Management #

Security Risk Management is the process of identifying, assessing, and mitigatin… #

Security risk management involves risk assessment, risk treatment, and risk monitoring to reduce vulnerabilities and threats.

Security Incident Reporting #

Security Incident Reporting is the process of notifying appropriate stakeholders… #

Timely and accurate incident reporting is essential for effective incident response.

Security Awareness Program #

A Security Awareness Program is a comprehensive initiative that educates employe… #

Security awareness programs aim to create a security-conscious culture within an organization.

Security Monitoring #

Security Monitoring is the continuous assessment and analysis of security events… #

Security monitoring helps organizations identify and mitigate security threats before they escalate.

Security Incident Handling #

Security Incident Handling is the process of responding to security incidents, c… #

Effective security incident handling helps organizations minimize damage and recover quickly.

Network Security #

Network Security refers to the measures and practices implemented to protect net… #

Network security solutions include firewalls, intrusion detection systems, and encryption to safeguard against unauthorized access.

Data Loss Prevention (DLP) #

Data Loss Prevention (DLP) is a strategy and technology solution designed to pre… #

DLP tools monitor, identify, and protect confidential information to ensure data security and compliance.

Security Audit #

A Security Audit is a systematic evaluation of an organization's security contro… #

Security audits help organizations improve their security posture and reduce risks.

Security Incident Response Team (SIRT) #

A Security Incident Response Team (SIRT) is a group of security professionals re… #

SIRTs play a critical role in incident response and crisis management.

Security Posture #

Security Posture refers to an organization's overall security readiness, resilie… #

A strong security posture includes effective security controls, incident response capabilities, and security awareness.

Security Awareness Campaign #

A Security Awareness Campaign is a targeted initiative that raises awareness abo… #

Security awareness campaigns aim to educate employees and promote a culture of security awareness.

Security Incident Investigation #

Security Incident Investigation is the process of examining and analyzing securi… #

Security incident investigations help organizations identify vulnerabilities, improve security controls, and prevent future incidents.

Security Incident Response Plan #

A Security Incident Response Plan is a documented set of procedures and guidelin… #

Security incident response plans help organizations minimize damage and recover quickly.

Security Governance #

Security Governance refers to the framework, policies, and processes that guide… #

Security governance ensures that security objectives align with business goals and comply with regulations.

Security Incident Notification #

Security Incident Notification is the process of informing affected parties, sta… #

Timely and accurate incident notification is essential for compliance and transparency.

Security Incident Classification #

Security Incident Classification is the categorization of security incidents bas… #

Classifying security incidents helps organizations triage and manage incidents efficiently.

Security Incident Response Training #

Security Incident Response Training is educational programs designed to train se… #

Security incident response training helps enhance incident response capabilities.

Security Incident Notification Plan #

A Security Incident Notification Plan is a documented strategy outlining how an… #

Notification plans help organizations meet legal and regulatory requirements.

Security Incident Response Procedure #

A Security Incident Response Procedure is a step #

by-step guide that outlines how an organization will respond to security incidents in a structured and coordinated manner. Security incident response procedures help organizations contain, eradicate, and recover from security breaches.

Security Incident Response Framework #

A Security Incident Response Framework is a structured approach that outlines th… #

Security incident response frameworks help organizations streamline incident response efforts.

Security Incident Response Playbook #

A Security Incident Response Playbook is a collection of predefined response pro… #

Incident response playbooks help organizations respond quickly and effectively to security threats.

Security Incident Response Simulation #

A Security Incident Response Simulation is a training exercise that simulates re… #

Security incident response simulations help identify gaps, refine procedures, and enhance readiness.

Security Incident Response Tabletop Exercise #

A Security Incident Response Tabletop Exercise is a collaborative workshop where… #

Tabletop exercises help organizations prepare for real-world incidents and strengthen incident response.

Security Incident Response Drill #

A Security Incident Response Drill is a practical exercise that tests an organiz… #

Incident response drills help identify weaknesses and improve response readiness.

Security Incident Response War Room #

A Security Incident Response War Room is a dedicated workspace where security te… #

War rooms help facilitate communication, collaboration, and decision-making during crises.

Security Incident Response Communication Plan #

A Security Incident Response Communication Plan is a documented strategy that ou… #

Communication plans ensure timely, accurate, and consistent messaging during crises.

Security Incident Response Team Roles #

Security Incident Response Team Roles are predefined roles and responsibilities… #

Clear role definitions help streamline response efforts and improve communication.

Security Incident Response Team Structure #

Security Incident Response Team Structure refers to the organizational hierarchy… #

A well-defined team structure ensures clear lines of communication, accountability, and coordination during security incidents.

Security Incident Response Team Training #

Security Incident Response Team Training is educational programs designed to tra… #

Training helps enhance team capabilities and readiness.

Security Incident Response Team Activation #

Security Incident Response Team Activation is the process of mobilizing and depl… #

Team activation involves notifying team members, convening a response war room, and initiating response procedures.

Security Incident Response Team Coordination #

Security Incident Response Team Coordination is the process of aligning and sync… #

Team coordination involves communication, collaboration, and task

May 2026 cohort · 29 days left
from £99 GBP
Enrol