Translate

Monday, 29 December 2025

Cyber Security Terminologies in Telugu

 1) Advanced Persistent Threat / APT - English Video - Telugu Video

2) Adware  - English Video - Telugu Video

3) Angler Exploit Kit  - English Video - Telugu Video

4) Anomaly-based detection - English Video - Telugu Video

5) Anonymizing proxy  - English Video - Telugu Video

6) Anti malware  - English Video - Telugu Video

7) Anti spam - English Video - Telugu Video

8) Anti spyware software  - English Video - Telugu Video

9) Anti-spoofing - English Video - Telugu Video

10) Antivirus software - English Video - Telugu Video

11) Atmos  - English Video - Telugu Video

12) Attack (online)   - English Video - Telugu Video

13) Attack signature - English Video - Telugu Video

14) Authentication - English Video - Telugu Video

15) Autorun worm - English Video - Telugu Video

16) Backdoor Trojan - English Video - Telugu Video

17) Backup  - English Video - Telugu Video

18) Baseline security - English Video - Telugu Video

19) Blackhat hacker  - English Video - Telugu Video

20) Blacklisting  - English Video - Telugu Video

21) Blended Threat - English Video - Telugu Video

22) Boot sector malware  - English Video - Telugu Video

23) Bot  - English Video - Telugu Video

24) Botnet  - English Video - Telugu Video

25) Browser hijacking  - English Video - Telugu Video

26) Brute force attack - English Video - Telugu Video

27) Buffer overflow  - English Video - Telugu Video

28) Bug  - English Video - Telugu Video

29) Bulk Encryption - English Video - Telugu Video

30) Business Impact Analysis (BIA)   - English Video - Telugu Video

31) BYOD - English Video - Telugu Video

32) Cache - English Video - Telugu Video

33) Cache Cramming - English Video - Telugu Video

34) Catfishing - English Video - Telugu Video

35) Chargeware - English Video - Telugu Video

36) Chief Information Officer (CIO)  - English Video - Telugu Video

37) CISO - English Video - Telugu Video

38) Citadel - English Video - Telugu Video

39) Code injection - English Video - Telugu Video

40) Command and control center - English Video - Telugu Video

41) Computer Abuse - English Video - Telugu Video

42) Computer Forensics - English Video - Telugu Video

43) Computer Incident Response Team (CIRT)  - English Video - Telugu Video

44) Confidentiality - English Video - Telugu Video

45) Cookie - English Video - Telugu Video

46) CoreBOT - English Video - Telugu Video

47) Crimeware - English Video - Telugu Video

48) Cross Site Scripting (XSS)  - English Video - Telugu Video

49) CryptoLocker - English Video - Telugu Video

50) CryptoWall - English Video - Telugu Video

51) CSO - English Video - Telugu Video

52) CTB Locker - English Video - Telugu Video

53) Cyber Attack - English Video - Telugu Video

54) Cyber incident - English Video - Telugu Video

55) Cyber security - English Video - Telugu Video

56) Cyber weapon - English Video - Telugu Video

57) Dark Web - English Video - Telugu Video

58) Data Asset - English Video - Telugu Video

59) Data Integrity - English Video - Telugu Video

60) Data leakage - English Video - Telugu Video

61) Data loss - English Video - Telugu Video

62) Data theft - English Video - Telugu Video

63) Deep Web - English Video - Telugu Video

64) Denial of service attack (DDoS)  - English Video - Telugu Video

65) Dialer - English Video - Telugu Video

66) Digital Signature - English Video - Telugu Video

67) Disaster Recovery Plan (DRP) - English Video - Telugu Video

68) DNS Cache Poisoning - English Video - Telugu Video

69) DNS hijacking - English Video - Telugu Video

70) Document malware - English Video - Telugu Video

71) Domain generation algorithm (DGA) - English Video - Telugu Video 

72) Domain shadowing - English Video - Telugu Video

73) Dormant code - English Video - Telugu Video

74) Dridex - English Video - Telugu Video

75) Drive-by attack - English Video - Telugu Video

76) Due diligence - English Video - Telugu Video

77) Dumpster diving - English Video - Telugu Video

78) Dyreza / Dyre - English Video - Telugu Video

79) Eavesdropping Attack - English Video - Telugu Video

80) Email malware distribution - English Video - Telugu Video

81) Encrypted Network - English Video - Telugu Video

82) Encryption - English Video - Telugu Video

83) End-to-End Encryption - English Video - Telugu Video

84) End-to-End Security - English Video - Telugu Video

85) Enterprise Risk Management - English Video - Telugu Video

86) Exploit - English Video - Telugu Video

87) Exploit kit - English Video - Telugu Video

88) Exploit kits-as-a-service - English Video - Telugu Video

89) External Security Testing - English Video - Telugu Video

90) Fail Safe - English Video - Telugu Video

91) Fake antivirus malware - English Video - Telugu Video

92) False positive - English Video - Telugu Video

93) File binder - English Video - Telugu Video

94) Fileless malware - English Video - Telugu Video

95) Financial malware - English Video - Telugu Video

96) Firewall - English Video - Telugu Video

97) Flip button - English Video - Telugu Video

98) Flooding - English Video - Telugu Video

99) Forensic Specialist - English Video - Telugu Video

100) Form-grabbing malware - English Video - Telugu Video

101) Greyhat hacker - English Video - Telugu Video

102) Hacker - English Video - Telugu Video

103) Hacktivism - English Video - Telugu Video

104) Heartbleed vulnerability - English Video - Telugu Video

105) Hoax - English Video - Telugu Video

106) Honeymonkey - English Video - Telugu Video

107) Honeypot - English Video - Telugu Video

108) HTTPS scanning - English Video - Telugu Video

109) Hybrid attack - English Video - Telugu Video

110) Identity Theft - English Video - Telugu Video

111) Inadvertent Disclosure - English Video - Telugu Video

112) Incremental Backups - English Video - Telugu Video

113) Information Assurance (IA)  - English Video - Telugu Video

114) Information Flow Control - English Video - Telugu Video

115) Information Security - English Video - Telugu Video

116) Information Security Policy - English Video - Telugu Video

117) Information Security Risk - English Video - Telugu Video

118) Information System Resilience - English Video - Telugu Video

119) Information Systems Security (INFOSEC)  - English Video - Telugu Video

120) Inside Threat - English Video - Telugu Video

121) Integrity - English Video - Telugu Video

122) Intellectual Property - English Video - Telugu Video

123) Internal Security Testing - English Video - Telugu Video

124) Internet worm - English Video - Telugu Video

125) Intrusion - English Video - Telugu Video

126) Intrusion Detection Systems (IDS) - English Video - Telugu Video 

127) IP Flood - English Video - Telugu Video

128) IP Spoofing - English Video - Telugu Video

129) Keylogging - English Video - Telugu Video

130) Kovter - English Video - Telugu Video

131) Level of Concern - English Video - Telugu Video

132) Likelihood of Occurrence - English Video - Telugu Video

133) Locky - English Video - Telugu Video

134) Logic Bomb - English Video - Telugu Video

135) Low Impact - English Video - Telugu Video

136) Macro Virus - English Video - Telugu Video

137) Malicious Applet - English Video - Telugu Video

138) Malicious Code - English Video - Telugu Video

139) Malvertisement - English Video - Telugu Video

140) Malvertising - English Video - Telugu Video

141) Malware - English Video - Telugu Video

142) Malware - English Video - Telugu Video

143) Malware-as-a-service - English Video - Telugu Video

144) Man-in-the-middle Attack (MitM)  - English Video - Telugu Video

145) Maximum Tolerable Downtime - English Video - Telugu Video

146) Mazar BOT - English Video - Telugu Video

147) Mobile code - English Video - Telugu Video

148) Mobile phone malware - English Video - Telugu Video

149) Moderate Impact - English Video - Telugu Video

150) Multifactor Authentication - English Video - Telugu Video

151) Netiquette - English Video - Telugu Video

152) Network Sniffing

153) Neutrino

154) Non-Repudiation

159) Nuclear Exploit Kit

160) Obfuscation

161) Offline Attack

162) Operation Tovar

163) Outside Threat

164) Packet Sniffer

165) Parasitic viruses

166) Passive attack

167) Password sniffing

168) Patch

169) Patch Management

170) Patching

171) Payload

172) Penetration

173) Penetration Testing

174) Personal Firewall

175) Pharming

176) Phishing

177) Plaintext

178) Polymorphic code

179) Polymorphic engine

180) Polymorphic malware

181) Polymorphic packer

182) Pop-up ad

183) Potential Impact

184) Potentially unwanted application (PUA) 

185) Poweliks

186) Power virus

187) Proprietary Information (PROPIN) 

188) Proxy server

189) Ransomware

190) Real-time  reaction

191) Remote access

192) Remote access Trojan / RAT

193) Remote diagnostics / maintenance

194) Replay attacks

195) Residual risk

196) Resilience

197) Reverse engineering

198) Risk assessment

199) Risk management

200) Risk mitigation

201) Rogue security software

202) Rogueware

203) Root cause analysis

204) Rootkit

205) Safeguards

206) Scareware

207) Scavenging

208) Security controls

209) Security impact analysis

210) Security requirements

211) Sensitive information

212) Shylock

213) Signature

214) Skimming

215) Sniffer

216) Social engineering

217) Spam

218) Spam filtering software

219) Spear phishing

220) Spillage

221) Spoofing (Email) 

222) Spy-phishing

223) Spyware

224) SQL injection

225) SSL / Secure Sockets Layer

226) Stealware

227) Strong authentication

228) Supply chain attack

229) Suppression measure

230) Suspicious files and behavior

231) System administrator / Sysadmin

232) System integrity

233) Tampering

234) Targeted threat

235) TeslaCrypt

236) Threat

237) Threat analysis

238) Threat assessment

239) Threat event

240) Threat monitoring

241) Threat scenario

242) Threat shifting

243) Threat source

244) Time bomb

245) Time-dependent password

246) Token

247) Tracking cookie

248) Traffic analysis

249) Traffic Encryption Key (TEK) 

250) Trojan (Trojan horse) 

251) Typhoid adware

252) Unauthorized access

253) Unauthorized disclosure

254) URL injection

255) Vaccine

256) Vawtrak / Neverquest

257) Virtual Private Network / VPN

258) Virus

259) Virus hoax

260) Vishing

261) Vulnerability

262) Wabbits

263) Watering Hole

264) Web bug

265) Web content filtering software

266) Webattacker

267) Whaling

268) Whitehat hacker

269) Whitelist

270) Worm

271) Zero Day

272) Zero Day virus / malware

273) Zero-Day attack

274) ZeuS / Zbot

275) Zeus GameOver / Zeus P2P

276) Zip bomb

277) Zombie

No comments:

Post a Comment

Note: only a member of this blog may post a comment.