AuthenticationProving you are who you claim to be
AuthorizationPermission to access something
BlackHatMalicious hacker who breaks into systems illegally
BugBountyProgram where companies pay for finding vulnerabilities
CTFCapture The Flag - security puzzle competitions
EncryptionScrambling data so only authorized people can read it
ExploitCode or technique that takes advantage of a vulnerability
FirewallSecurity system that monitors network traffic
MalwareMalicious software designed to harm
Penetration TestingAuthorized hacking to find vulnerabilities
PhishingTricking people into revealing sensitive information
Social EngineeringManipulating people to bypass security
VulnerabilityWeakness that could be exploited
WhiteHatEthical hacker who works with permission to improve security