Skip to content
David X Martin
Cyber Risk Management for business leaders
  • Home
  • Why Cybersecurity Matters
  • CyberWellness
  • Books
  • Articles & Media
  • Glossary
  • How I Help
  • About

Category: Glossary

Cybersecurity Glossary: SQL injection (SQLI)

October 29, 2019 David X Martin

As one of several types of cybersecurity breach, an SQL injection (SQLI) is a type of attack that exploits weaknesses in the database management software of unsecure websites in order to get the website to spit out information from the database that it’s really not supposed to release.

Continue Reading →

Posted in: Glossary Filed under: hack, types of breaches

Cybersecurity Glossary: Exploit

David X Martin

As one of several types of cybersecurity breach, an exploit is a type of attack that takes advantage of software bugs or vulnerabilities, which cybercriminals use to gain unauthorized access to a system and data.

Continue Reading →

Posted in: Glossary Filed under: hack, types of breaches

Cybersecurity Glossary: Cyber Attack

David X Martin

A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks. Cybercriminals use methods including malware, botnets, PUPs, and phishing.

Continue Reading →

Posted in: Articles by DXM, Glossary Filed under: cyberattack, hack

Cybersecurity Glossary: Breach

David X Martin

A breach comes as a result of a cyberattack that allows cybercriminals to gain unauthorized access to a computer system and steal confidential data. Exploits, phishing and other methods are used.

Continue Reading →

Posted in: Glossary Filed under: data breach, types of breaches

Cybersecurity Glossary: Application Security

October 25, 2019 David X Martin

Application security is important because today’s applications are often available over various networks and connected to the Cloud, increasing vulnerabilities to security threats and breaches.

Continue Reading →

Posted in: Glossary Filed under: types of cybersecurity

Post navigation

Page 4 of 4
← Previous 1 … 3 4

Can I help?

Interested to learn more about How I Help?

- Advisor & Board Director
- Expert Witness
- Speaker & Author

Follow me on Twitter

My Tweets

Latest posts

  • Ransomware: Don’t Expect Governments Alone to Save Us
  • CyRM: Mastering the Management of Cybersecurity Risk, with David X Martin
  • The Future of Risk Management

Get in touch


Contact form

Let’s Connect

  • X
  • LinkedIn

NEW! CyRM: Mastering the Management of Cybersecurity

CyRM Mastering the management of cybersecurity by David X Martin

Introducing CyRM as an approach to growth

CyRM cyberWELlness

Search DavidXMartin.com

#cyberwellness
#cyrmbook
#cybersecurity
#riskmanagement
#cyberriskmanagement

LEARN THE LINGO
Cybersecurity Glossary

Privacy Policy

Your data is protected.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
Copyright © David X Martin
Website by MediaMoxie.com