Canopius - Cyber Insurance Glossary

In an increasingly digital world, understanding the language of cyber risk is essential. At Canopius, we recognise that cybersecurity can often feel complex and technical — especially when navigating the evolving threats and technologies that shape today’s digital landscape.

This Cyber glossary is designed to provide clear, accessible definitions of key cybersecurity terms. Whether you’re a policyholder, broker, or simply looking to better understand the risks and protections associated with Cyber insurance, this resource will help you make informed decisions with confidence.

canopius-image-block-insurance-cyber-incident-response

Hacking is when an individual manipulates computer systems or networks to gain unauthorised access. They do this by exploiting security weaknesses to infiltrate systems for malicious purposes; for example, if they want to steal sensitive data. However, it can also...

Trojan Horse malware is a malware type that gives the illusion of a legitimate or useful software. It tricks users into downloading or installing it by masquerading as a harmless file or program, such as fake antivirus software or a...

ARP, otherwise known as Address Resolution Protocol, is a network protocol that maps an IP address to a physical MAC (Media Access Control) address within a local area network (LAN). This process allows devices on a network to communicate with...

A DMZ, or Demilitarised Zone, in computer networking, refers to a subnetwork that sits between an internal network and an external network, such as the internet. The DMZ acts as a buffer zone, where services exposed to the public (like...

A port scan is a technique that is used to identify open or vulnerable ports on a network or device. An attacker or security professional can gather information about the services running on a system and determine any potential security...

Single Sign-On (SSO) is an authentication method that gives users access to multiple applications or systems with just one set of login credentials. Instead of needing to remember separate usernames and passwords for each service, users log in once and...

Unified Threat Management is a security solution that has multiple security features into a single device or platform. It is designed to protect networks from various cyber threats, including viruses, malware, and unauthorised access. UTM solutions help simplify network security...

Spyware is a type of malicious software that infiltrates a device to monitor and collect information about the user without their knowledge. It can secretly track activities such as your browsing habits, personal information, and even login credentials. This data...

A keylogger is a type of malicious software (malware) designed to record the keystrokes made on a computer or device. When it’s installed, it operates silently in the background, capturing everything a user types. This can include sensitive information such...

A Wide Area Network (WAN) is a telecommunications network that connects multiple smaller networks over long distances. WANs are used to link computers, devices, or networks from different locations. This enables them to communicate as if they were in the...

An Intrusion Detection System (IDS) is for protecting networks and data from unauthorised access and attacks. It monitors network traffic to identify malicious activities and potential threats. IDS can detect both external and internal threats, ensuring a secure environment for...

A digital worm, also known as a computer worm, is malware designed to self-replicate and spread across networks. However, unlike viruses, these digital worms don’t require a host file or program to latch onto. Instead, they exist as self-contained files...

Staff Bio Content