Welcome to Ensign’s Cybersecurity 101, the definitive resource for businesses navigating the intricate world of cybersecurity. Our glossary helps you demystify cybersecurity jargon, empowering your team to make informed decisions and implement robust security measures. Gain insights from cybersecurity experts who provide practical examples and contextual understanding for each term, enabling your team to apply this knowledge effectively.

Cryptojacking - Cryptojacking is the unauthorised use of victims’ devices or servers to mine cryptocurrency for illicit profits. Attackers who engage in this form of malicious cryptomining aim to remain hidden in their victims’ computer systems or network for as long as possible to maximise the profits gained from cryptomining.  

 

Cybersecurity Incidents - Cybersecurity incidents are events that pose a threat to the confidentiality and accessibility of an organisation’s data or assets. They often result from failed or inadequate cybersecurity measures and have the potential to disrupt business operations. 

 

Data Breach - Data breach refers to any cybersecurity incident where sensitive or confidential data belonging to individuals or organisations is accessed by unauthorised personnel. These data include Personally Identifiable Information (PII), private credentials, intellectual property, and other classified information. It is important to note that not all cybersecurity incidents or cyberattacks constitute data breaches, as in the case of Denial-of-Service (DoS) attacks. 

 

Digital Forensics - Digital forensics, a branch of forensics science, deals with the acquisition and analysis of digital evidence. The digital evidence gathered is crucial in investigating cybersecurity incidents or other criminal activities, contributing to legal procedures and incident response efforts.

 

Incident Response - Incident response, in the realm of cybersecurity, refers to the approach taken by organisations to manage and address cybersecurity incidents. It encompasses a series of procedures, strategies and technologies aimed at efficiently responding to incidents, mitigating adverse effects and restoring operations to their normal state.  

 

Malware - Malware, short for malicious software, includes any software intentionally designed to cause harm to a computer, server, or network. Malware can come in many variants, but they share similar objectives: financial gains, disruption and destruction of targeted entities, and political motivations. 

 

Phishing - Phishing is a type of social engineering attack where emails, messages, or social media are used to manipulate individuals into compromising their data security. Threat actors often impersonate trusted entities to deceive victims into clicking malicious links or revealing sensitive credentials and personal information.

 

Ransomware - Ransomware is a type of malicious software (malware) that blocks a victim’s access to data or a computer system, usually by encrypting it, until the victim pays a ransom fee to the attacker. Attackers often promise to restore the data if the ransom is paid, but these days, victims cannot be sure about this assurance, as the risk of data being destroyed or leaked remains.

 

    Contact Us
Copyright © 2025 Ensign InfoSecurity Pte. Ltd.