Skip to content

12 most common cyber security words

Cybersecurity affects all areas of all companies, large, medium and small. When we talk about cybersecurity and we target users of companies that do not belong to the IT department, we often use terms that can be difficult to understand. Because of this, in this article we’re going to explain the meaning of a few terms that are called common cyber security words. Understanding the most common terms of cybersecurity, means incorporating the appropriate level of protection to avoid putting the company at risk. Following is the list:

1. BYOD (Bring Your On Device)

It means that all employees of the company can bring their own device to work with the resources of the organization, whether portable, mobile or tablet. It is necessary to apply security measures to divide the personal environment of the work environment.

2. IOT (Internet of Things)

Internet of things or things connected to the internet. It means that any element can connect to the internet and take advantage of the advantages that the network allows. It entails the risk of access security by unauthorized third parties that may interfere with its operation and the information stored.

3. CLOUD (Cloud computing)

Cloud computing or information in the cloud. It allows spaces (clouds) where to manage applications and systems by each owner.

4. IA (artificial intelligence)

It refers to machines that have been created especially to perform tasks that require human intelligence. For example robots are the most obvious example. Robots that perform typical tasks of people, from ordering to composing or creating, adaptable to all industries and all sectors. Artificial intelligence is the future, it is science fiction and it already forms part of everyday life.

5. DDOS (Denial of service)

It is a form of cyber-attack that affects a corporate network and causes the loss of connectivity for all users of the system. The DDOS attacks overload until the resources of the company's network collapse, until the service is saturated, causing the stoppage and, therefore, the loss of connection with the service.

They suppose a very high economic cost for the affected organizations, they have an impact at global level, the greater the distribution of the network, the higher the impact of the attack. A good contingency plan can reduce the impact on all organizations.


It describes a database consisting of strings of blocks designed to avoid any subsequent modification using a reliable time stamp and linking to a previous pad.


It refers to user with very advanced knowledge of computer science, programming and communications, which tests new tools on an ongoing basis. There is both positive hacker and the negative hacker.

8. MALWARE (Malicious Software)

Malicious software that is introduced into the computer or operating system and applications to disable, infect, control or seize information and spread in search of new victims.


It is a technique to implement machine learning, a new approach to artificial intelligence using algorithms. In general terms these are machines (neural networks) inspired by the functioning of the human brain, with interconnected neurons but with a difference, they are artificial neural networks with discrete layers, connections and indications of data propagation to reach the end.

Deep learning is an essential tool for the current future, better than human beings. Deep learning is now, it is the future.