Urgent assistance Help
 

Security glossary

Find out some basic cybersecurity terms which may be of interest to you

banner glosario

Use this glossary to consult the cybersecurity concepts that you should know to protect your accounts better from any possible attacks.

Phishing
 
This is the most widely-used form of cyber attack due to its technical and functional simplicity. It consists in stealing the user's confidential data by creating a pretext for the user to provide this.
Malware
 
This is a type of malicious software which tries to infect a computer or mobile device, for the general purpose of harming the user, and if this is bank malware, for stealing confidential information such as passwords, stealing money or jeopardising the security of bank accounts.
Social engineering
 
This is one of the methods most widely used by cybercriminals to obtain confidential data about users. This is based on psychological manipulation: cybercriminals use social engineering methods to obtain information, commit fraud or obtain unlawful access to users' confidential areas.
Firewall o cortafuegos
 
This is a safety element on the web which decides whether any specific traffic should be allowed or blocked. Firewalls set up a barrier between internal networks, which are reliable and safe, and more unreliable external networks such as Internet.
Antivirus programs
 
These are computer programs for detecting malware or potentially harmful software.
Two-factor authentication
 
When accessing a mobile, program or web, two- factor authentication means that you need a code to access the required service, apart from the password. This tends to be a code which is received in the mobile phone. It is particularly useful in the fight against cybercrime, since two-factor authentication means it is useless for a cybercriminal to know the user's passwords, as they could never access this second code required to complete the operation that they wish to carry out. What is more, with the arrival of the two-authentication message in the mobile phone, the user realises that someone is trying to access some operation instead of them. Another features of this is that a "code" which is ephemeral, for a single use, and which is received in a device which only the customer must have.
Password manager
 
This is an app used for storing passwords in an encoded database, which is protected by a master password. These managers tend to generate strong passwords, of sufficient length and combining letters, numbers and special characters with no meaning, to thus increase their strength. This enables users to dodge attacks and use of foreseeable patterns.