Tartan App Logo

Resources

Cybersecurity Glossary for K-12 Schools

This glossary defines common cybersecurity, phishing, and human risk terms in plain language so school and district teams can make faster, safer decisions.

Phishing & Social Engineering

These terms cover deceptive tactics that target people, not just systems. Most school security incidents start with this category.

Phishing

Phishing is a fraudulent message designed to trick someone into clicking a malicious link, sharing credentials, or sending sensitive data.

Why it matters for schools: K-12 staff and students get frequent email attacks, and one click can expose student records or district systems.

Spear Phishing

Spear phishing is a targeted phishing attack customized for a specific person, role, school, or district.

Why it matters for schools: Personalized messages are harder to spot and often target principals, payroll staff, and IT administrators.

Whaling

Whaling is spear phishing aimed at high-value leaders such as superintendents, CFOs, and executive administrators.

Why it matters for schools: A successful whaling attack can lead to large wire fraud losses or broad access to district systems.

Smishing

Smishing is phishing delivered through SMS or text messaging instead of email.

Why it matters for schools: Staff often trust text messages more than email, making mobile attacks a growing school risk.

Vishing

Vishing is voice phishing where attackers use phone calls or voicemail to impersonate trusted contacts.

Why it matters for schools: School front offices and help desks are common targets because they process urgent requests by phone.

Quishing

Quishing is phishing that uses QR codes to send users to malicious sites or fake login pages.

Why it matters for schools: QR codes on posters, emails, and handouts are common in schools, so users may scan without verifying.

Spoofing

Spoofing is falsifying an identity such as an email sender, website, phone number, or domain to appear legitimate.

Why it matters for schools: Impersonation makes fake messages look like district leadership, vendors, or trusted school systems.

Social Engineering

Social engineering is manipulating people into bypassing security controls by exploiting trust, urgency, or fear.

Why it matters for schools: Even strong technical defenses fail when users are pressured into unsafe actions.

Pretexting

Pretexting is an attack where someone invents a believable story to obtain data, access, or action.

Why it matters for schools: Attackers can pose as parents, vendors, or auditors to request sensitive student or payroll information.

Baiting

Baiting is a social engineering method that offers something tempting, such as a free download or USB drive, to trigger unsafe behavior.

Why it matters for schools: Curiosity-driven clicks or device use can introduce malware into school networks.

Tailgating

Tailgating is physically following an authorized person into a restricted area without proper access credentials.

Why it matters for schools: Physical access can expose servers, admin offices, and records systems in school buildings.

BEC (Business Email Compromise)

BEC is a fraud scheme where attackers impersonate trusted accounts to request payments, gift cards, or sensitive data.

Why it matters for schools: District finance teams and principals are frequent BEC targets, and losses can be immediate and severe.

Phishing Simulation

Phishing simulation is a controlled training exercise that sends realistic test messages to measure and improve user behavior.

Why it matters for schools: Schools use simulations to reduce risky click behavior and build practical detection habits over time.

Malware & Endpoint Threats

These terms focus on malicious software and endpoint behavior. Endpoint protection is critical in K-12 because devices are widely distributed.

Malware

Malware is malicious software designed to damage systems, steal information, disrupt operations, or gain unauthorized control.

Why it matters for schools: A single infected staff or student device can spread risk across shared district services.

Ransomware

Ransomware is malware that encrypts files or systems and demands payment to restore access.

Why it matters for schools: Ransomware can halt instruction, transportation, payroll, and critical school operations.

Spyware

Spyware is malware that silently collects user activity, credentials, or other sensitive information.

Why it matters for schools: Undetected surveillance can expose student data, staff accounts, and administrative workflows.

Trojan

A trojan is malware disguised as legitimate software to trick users into installing it.

Why it matters for schools: Users may install fake tools or updates that create hidden access for attackers.

Keylogger

A keylogger is software or hardware that records keystrokes to capture passwords and sensitive information.

Why it matters for schools: Captured credentials can allow attackers into grade systems, email accounts, and finance platforms.

Endpoint Detection and Response (EDR)

EDR is a security capability that monitors endpoint activity to detect suspicious behavior and support rapid response.

Why it matters for schools: EDR helps school IT teams find and contain threats before they spread across the district.

Attack Surface

Attack surface is the total number of possible entry points an attacker can target across people, devices, apps, and networks.

Why it matters for schools: K-12 environments have large attack surfaces due to many users, locations, and connected systems.

Patch Management

Patch management is the process of testing, prioritizing, and applying software updates that fix vulnerabilities.

Why it matters for schools: Unpatched systems are a common path for school breaches and ransomware outbreaks.

Identity, Access & Authentication

These terms govern who can access what and under which conditions. Strong identity controls reduce account abuse and lateral movement.

MFA (Multifactor Authentication)

MFA requires two or more verification factors, such as password plus a code or authenticator app, to access an account.

Why it matters for schools: MFA blocks many account takeovers even when passwords are exposed.

Least Privilege

Least privilege is the security principle of giving users only the minimum access needed to perform their tasks.

Why it matters for schools: Limiting permissions reduces the impact of compromised accounts in district systems.

Session Hijacking

Session hijacking occurs when an attacker steals or reuses a valid session token to impersonate an authenticated user.

Why it matters for schools: Attackers may bypass password checks and access school systems as legitimate users.

Digital Signature

A digital signature uses cryptography to verify that a message or document is authentic and has not been altered.

Why it matters for schools: Integrity checks help schools trust sensitive communications and official records.

Hashing

Hashing transforms data into a fixed-length value used for integrity checks and secure credential storage.

Why it matters for schools: Proper hashing helps protect passwords and supports verification in security workflows.

Network & Infrastructure

These terms cover controls that protect traffic, email flow, and systems at the infrastructure layer.

DNS (Domain Name System)

DNS translates domain names into IP addresses so devices can find websites and network services.

Why it matters for schools: Malicious DNS activity can redirect users to fake sites and support phishing campaigns.

VPN (Virtual Private Network)

A VPN creates an encrypted tunnel between a user and network resources over untrusted connections.

Why it matters for schools: Remote staff and vendors need secure access when working outside district facilities.

Network Segmentation

Network segmentation separates network zones to limit access and contain potential compromise.

Why it matters for schools: Segmentation can prevent an issue in one school system from spreading district-wide.

Encryption

Encryption converts readable data into protected ciphertext so only authorized parties can decode it.

Why it matters for schools: Encryption protects student and employee data in transit and at rest.

Secure Email Gateway

A secure email gateway filters and analyzes inbound and outbound email for spam, malware, and policy violations.

Why it matters for schools: Email is a primary attack vector in K-12, so filtering is a key preventive control.

Related terms

DMARC

DMARC is an email authentication policy that tells receiving servers how to handle messages that fail domain checks.

Why it matters for schools: DMARC helps reduce domain spoofing and brand impersonation attacks against schools.

Related terms

SPF

SPF is a DNS-based email control that identifies which mail servers are authorized to send email for a domain.

Why it matters for schools: SPF helps receiving systems identify unauthorized senders using district domains.

DKIM

DKIM adds a cryptographic signature to email so recipients can verify the message was authorized and not altered.

Why it matters for schools: DKIM supports trusted district communications and strengthens anti-spoofing controls.

Human Risk & Security Awareness

These terms focus on behavior, culture, and user-level resilience. Human risk is often the deciding factor in real incidents.

Security Awareness Training

Security awareness training teaches users how to recognize and respond to threats such as phishing, social engineering, and unsafe data handling.

Why it matters for schools: Consistent training improves decisions by staff and students during real attacks.

Human Risk Management

Human risk management measures and reduces security risk created by user behavior, not just technical vulnerabilities.

Why it matters for schools: District leaders can prioritize support based on behavior data, not assumptions.

Security Culture

Security culture is the shared mindset and habits that influence how people handle security decisions every day.

Why it matters for schools: A strong culture makes safe behavior normal and improves reporting of suspicious activity.

Insider Threat Program

An insider threat program identifies and manages risk from trusted users whose actions, intentional or accidental, may harm the organization.

Why it matters for schools: Schools need clear processes for risky behavior, account misuse, and policy violations.

Acceptable Use Policy

An acceptable use policy defines allowed and prohibited use of district devices, accounts, networks, and data.

Why it matters for schools: Clear expectations help staff and students make safer decisions and support enforcement consistency.

Policy, Compliance & Response

These terms focus on legal obligations, incident handling, and continuity planning for school operations.

Security Incident

A security incident is an event that threatens the confidentiality, integrity, or availability of information or systems.

Why it matters for schools: Rapid identification and escalation reduce disruption and potential data loss.

Incident Response Plan

An incident response plan is a documented process for detecting, containing, investigating, and recovering from security incidents.

Why it matters for schools: Schools need predefined roles and workflows to respond quickly during active incidents.

PII (Personally Identifiable Information)

PII is data that can identify an individual, such as full name, address, ID numbers, or contact details.

Why it matters for schools: School districts must protect PII to meet legal, ethical, and operational requirements.

Business Continuity

Business continuity is the capability to keep essential services running during and after disruptive events.

Why it matters for schools: Schools must maintain instruction, communications, and critical operations during cyber incidents.

Tabletop Exercise

A tabletop exercise is a discussion-based simulation where teams practice incident response decisions in a realistic scenario.

Why it matters for schools: Practice improves coordination across IT, leadership, legal, communications, and school operations.

Frequently Asked Questions

What is the difference between phishing, spear phishing, and whaling?

Phishing is broad and can target anyone. Spear phishing is tailored to a specific person or role. Whaling is spear phishing focused on high-value leaders such as superintendents or finance leaders.

Why should schools care about DMARC, SPF, and DKIM?

These controls help prevent domain spoofing and improve email trust. Together, they reduce impersonation attacks that target staff, families, and district finance workflows.

What is human risk in cybersecurity?

Human risk is the security risk created by everyday user behavior, such as clicking suspicious links or sharing sensitive data in unsafe ways. Managing human risk complements technical controls.

Does security awareness training replace technical security tools?

No. Security awareness training supports technical controls like filtering, endpoint protection, and access management. Effective programs combine both people-focused and technology-focused defenses.

How often should a school run phishing simulations?

Many schools run simulations on a recurring cadence, such as every 30 to 90 days, with follow-up education for risky behavior. The best cadence balances training impact and operational capacity.

What should be in a school incident response plan?

A plan should define roles, escalation paths, communication procedures, containment steps, recovery actions, and post-incident review responsibilities across IT and leadership teams.

How do tabletop exercises improve readiness?

They let teams rehearse incident decisions before a real event. This exposes gaps in communication, roles, and process while stress is low and fixes are easier.

Build a stronger human firewall in your school or district

Use this glossary as a baseline for shared language, then turn it into action through ongoing training, simulations, and reporting.