198+ Terms

Cybersecurity Glossary

A comprehensive reference of cybersecurity terms, threats, technologies, and best practices. Written by security professionals for IT leaders, compliance teams, and anyone looking to strengthen their security knowledge.

A
14 terms

Access Control

Identity & Access

Access control is a security mechanism that regulates who or what can view, use, or interact with resources in a computing environment. It enforces policies that grant or deny permissions based on user identity, role, or other attributes.

Advanced Persistent Threat

Threats & Attacks

An Advanced Persistent Threat (APT) is a prolonged, targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period. APTs typically target high-value organizations to steal data rather than cause immediate damage.

Authentication

Identity & Access

Authentication is the process of verifying the identity of a user, device, or system before granting access to resources. It typically involves credentials such as passwords, biometrics, security tokens, or digital certificates.

Authorization

Identity & Access

Authorization is the security process that determines whether an authenticated user or system has permission to access a specific resource or perform a particular action. It follows authentication and enforces access policies.

Active Directory

Identity & Access

Active Directory (AD) is Microsoft's directory service for Windows domain networks that provides authentication, authorization, group policy management, and centralized resource management across an organization.

Account Lockout

Identity & Access

Account Lockout is a security mechanism that temporarily or permanently disables a user account after a specified number of consecutive failed authentication attempts to prevent brute force attacks.

ARP Spoofing

Threats & Attacks

ARP Spoofing is a network attack where an attacker sends falsified ARP messages on a local network to link their MAC address with a legitimate IP address, intercepting or modifying network traffic.

Adware

Threats & Attacks

Adware is software that automatically displays or downloads unwanted advertising content, often bundled with free programs, and may track browsing habits to deliver targeted advertisements.

Acceptable Use Policy

Risk & Compliance

An Acceptable Use Policy (AUP) defines the rules and guidelines for how employees and users may use an organization's IT resources, including computers, networks, email, internet access, and software.

AES Encryption

Data Protection

AES (Advanced Encryption Standard) is a symmetric block cipher algorithm adopted by the US government as the standard for encrypting sensitive data, using 128, 192, or 256-bit keys to provide strong, efficient encryption.

API Security

Application Security

API Security encompasses the practices and tools for protecting Application Programming Interfaces from attacks, abuse, and unauthorized access, ensuring data integrity and confidentiality in API-driven architectures.

AI Security

Emerging Technology

AI Security addresses the unique threats and vulnerabilities associated with artificial intelligence and machine learning systems, including adversarial attacks, model poisoning, data privacy, and the security of AI-driven decision-making.

Application Security

Application Security

Application Security is the practice of protecting software applications from threats throughout their entire lifecycle, using a combination of secure development practices, security testing, and runtime protection technologies.

Attack Surface Management

Security Operations

Attack Surface Management (ASM) is the continuous discovery, inventory, classification, and monitoring of an organization's internet-facing assets and exposures to identify and reduce potential entry points for attackers.

B
11 terms

Botnet

Threats & Attacks

A botnet is a network of compromised computers or devices (bots) that are remotely controlled by a threat actor. Botnets are used to launch distributed denial-of-service (DDoS) attacks, send spam, steal data, and perform other malicious activities at scale.

Business Continuity

Risk & Compliance

Business continuity is an organization's ability to maintain essential functions during and after a disaster or disruptive event. In cybersecurity, it encompasses planning, policies, and procedures that ensure critical systems and data remain available during security incidents.

Biometric Authentication

Identity & Access

Biometric Authentication uses unique physical or behavioral characteristics such as fingerprints, facial recognition, iris scans, or voice patterns to verify a person's identity for access control.

Business Email Compromise

Threats & Attacks

Business Email Compromise (BEC) is a sophisticated scam targeting organizations that conduct wire transfers, where attackers impersonate executives or trusted partners via email to trick employees into transferring funds or sensitive data.

Brute Force Attack

Threats & Attacks

A Brute Force Attack is a trial-and-error method where attackers systematically try every possible combination of passwords or encryption keys until the correct one is found.

Business Impact Analysis

Risk & Compliance

A Business Impact Analysis (BIA) is the process of determining the potential effects of disruptions to critical business operations, including financial losses, operational impacts, and recovery priorities.

BGP Security

Infrastructure

BGP Security refers to the practices and technologies that protect the Border Gateway Protocol from route hijacking, route leaks, and other attacks that can misdirect internet traffic at a global scale.

Backup and Recovery

Data Protection

Backup and Recovery is the practice of creating and storing copies of data so that it can be restored after data loss events such as hardware failures, ransomware attacks, accidental deletion, or natural disasters.

Blue Team

Security Operations

A Blue Team is a group of security professionals responsible for defending an organization's information systems by maintaining security controls, detecting threats, responding to incidents, and strengthening defenses against attacks.

Bug Bounty

Security Operations

A Bug Bounty program is a crowdsourced initiative that rewards independent security researchers for discovering and responsibly reporting security vulnerabilities in an organization's systems, applications, or products.

Blockchain Security

Emerging Technology

Blockchain Security encompasses the practices and technologies for protecting blockchain networks, smart contracts, cryptocurrency wallets, and decentralized applications from attacks, vulnerabilities, and fraud.

C
24 terms

Cloud Security

Infrastructure

Cloud security is the set of policies, controls, technologies, and procedures used to protect data, applications, and infrastructure hosted in cloud computing environments. It addresses unique challenges such as shared responsibility, multi-tenancy, and dynamic resource provisioning.

Compliance

Risk & Compliance

Compliance in cybersecurity refers to the process of meeting established security standards, regulations, and legal requirements. Organizations must adhere to frameworks such as SOC 2, HIPAA, PCI DSS, GDPR, and industry-specific regulations to protect data and avoid penalties.

Cryptography

Data Protection

Cryptography is the practice and study of techniques for securing communication and data by transforming information into an unreadable format using mathematical algorithms. Only authorized parties with the correct key can decrypt and access the original data.

Certificate Authority

Identity & Access

A Certificate Authority (CA) is a trusted entity that issues, manages, and revokes digital certificates used to verify the identity of organizations, servers, and individuals in encrypted communications.

Cross-Site Scripting (XSS)

Threats & Attacks

Cross-Site Scripting (XSS) is a web application vulnerability that allows attackers to inject malicious client-side scripts into web pages viewed by other users, enabling session hijacking, defacement, or malicious redirects.

Credential Stuffing

Threats & Attacks

Credential Stuffing is an automated attack that uses stolen username and password pairs from data breaches to gain unauthorized access to user accounts on other services, exploiting password reuse.

Cryptojacking

Threats & Attacks

Cryptojacking is the unauthorized use of someone's computing resources to mine cryptocurrency, typically delivered through malicious scripts in web browsers or malware installed on the victim's device.

CMMC

Risk & Compliance

The Cybersecurity Maturity Model Certification (CMMC) is a US Department of Defense framework that requires defense contractors to meet specific cybersecurity maturity levels to protect controlled unclassified information (CUI).

CCPA

Risk & Compliance

The California Consumer Privacy Act (CCPA) is a state privacy law that gives California residents the right to know what personal data is collected about them, to delete it, to opt out of its sale, and to receive equal service regardless of exercising their rights.

Compliance Audit

Risk & Compliance

A Compliance Audit is a formal examination of an organization's adherence to regulatory requirements, industry standards, and internal policies, conducted by internal or external auditors to verify security controls are implemented and effective.

Configuration Management

Security Operations

Configuration Management is the process of maintaining systems, servers, and software in a consistent, desired state, ensuring security settings, hardening baselines, and compliance configurations are applied and monitored.

Change Management

Security Operations

Change Management is the structured process for reviewing, approving, and implementing changes to IT systems and infrastructure to minimize risk, prevent unauthorized modifications, and maintain system stability and security.

CASB

Cloud Security

A Cloud Access Security Broker (CASB) is a security policy enforcement point positioned between cloud service consumers and providers to monitor activity, enforce security policies, and protect data in cloud applications.

CSPM

Cloud Security

Cloud Security Posture Management (CSPM) is a category of security tools that continuously monitors cloud infrastructure for misconfigurations, compliance violations, and security risks, providing automated remediation recommendations.

CWPP

Cloud Security

Cloud Workload Protection Platform (CWPP) is a security solution that provides consistent protection for server workloads across physical machines, virtual machines, containers, and serverless functions in any cloud environment.

Cloud Access Security

Cloud Security

Cloud Access Security encompasses the policies, technologies, and controls that govern how users and devices access cloud services, ensuring that only authorized entities can reach cloud resources through secure channels.

Cloud Workload Protection

Cloud Security

Cloud Workload Protection is the practice of securing computing workloads running in cloud environments through runtime protection, vulnerability management, integrity monitoring, and behavioral analysis across VMs, containers, and serverless functions.

Container Security

Cloud Security

Container Security encompasses the tools, policies, and practices for protecting containerized applications throughout their lifecycle, from image building and registry storage to runtime deployment and orchestration.

Cloud Key Management

Cloud Security

Cloud Key Management is the practice of creating, storing, rotating, and managing cryptographic keys used to encrypt data in cloud environments, often leveraging cloud-native key management services or hardware security modules.

Code Review

Application Security

Security Code Review is the systematic examination of application source code to identify security vulnerabilities, coding flaws, and deviations from secure coding practices before the code is deployed to production.

Cyber Insurance

Risk & Compliance

Cyber Insurance is a specialized insurance product that provides financial protection against losses resulting from cyber incidents such as data breaches, ransomware attacks, business interruption, and regulatory penalties.

Cyber Kill Chain

Security Operations

The Cyber Kill Chain is a framework developed by Lockheed Martin that describes the seven stages of a cyberattack, from initial reconnaissance to data exfiltration, helping defenders identify and disrupt attacks at each stage.

Cyber Resilience

Risk & Compliance

Cyber Resilience is an organization's ability to continuously deliver intended outcomes despite adverse cyber events, combining cybersecurity, business continuity, and organizational adaptability to withstand and recover from attacks.

Compliance as a Service

Risk & Compliance

Compliance as a Service (CaaS) is a cloud-based model that provides organizations with ongoing compliance monitoring, evidence collection, policy management, and audit preparation through a managed service platform.

D
25 terms

DDoS

Threats & Attacks

A Distributed Denial-of-Service (DDoS) attack is a cyberattack that overwhelms a target server, service, or network with a flood of internet traffic from multiple distributed sources. The goal is to make the target unavailable to legitimate users by exhausting its resources.

Data Loss Prevention

Data Protection

Data Loss Prevention (DLP) is a set of tools and processes that ensure sensitive data is not lost, misused, or accessed by unauthorized users. DLP solutions monitor, detect, and block the unauthorized transmission of confidential information.

Disaster Recovery

Risk & Compliance

Disaster recovery is the process and set of policies for restoring IT systems, data, and infrastructure after a cyberattack, natural disaster, or other disruptive event. It focuses on minimizing downtime and data loss through backup strategies and recovery procedures.

Digital Certificate

Identity & Access

A Digital Certificate is an electronic credential issued by a certificate authority that binds a public key to an identity, enabling encrypted communication and authentication between parties.

Denial of Service (DoS)

Threats & Attacks

A Denial of Service (DoS) attack aims to make a machine, network, or service unavailable to its intended users by overwhelming it with traffic or exploiting vulnerabilities that cause the system to crash.

Drive-by Download

Threats & Attacks

A Drive-by Download is a malware delivery method where malicious software is automatically downloaded to a user's device simply by visiting a compromised or malicious website, without requiring any user interaction.

Domain Spoofing

Threats & Attacks

Domain Spoofing is a technique where attackers forge or impersonate a legitimate domain name in emails or websites to deceive users into believing they are interacting with a trusted entity.

DNS Poisoning

Threats & Attacks

DNS Poisoning (also called DNS Spoofing) is an attack that corrupts DNS cache data so that domain name queries return incorrect IP addresses, redirecting users to malicious websites without their knowledge.

Data Retention Policy

Risk & Compliance

A Data Retention Policy defines how long an organization keeps different types of data, when data should be securely disposed of, and the procedures for managing the data lifecycle to meet legal and business requirements.

DMZ (Demilitarized Zone)

Infrastructure

A DMZ (Demilitarized Zone) is a network segment that acts as a buffer zone between an organization's internal network and untrusted external networks, hosting public-facing services while protecting the internal network.

DNS Security

Infrastructure

DNS Security encompasses the technologies and practices that protect DNS infrastructure from attacks such as DNS poisoning, amplification attacks, and hijacking, ensuring the integrity and availability of domain name resolution.

DNSSEC

Infrastructure

DNSSEC (Domain Name System Security Extensions) is a suite of specifications that add authentication to DNS responses through digital signatures, preventing DNS spoofing and cache poisoning attacks.

Data Classification

Data Protection

Data Classification is the process of categorizing data based on its sensitivity level and business value, enabling organizations to apply appropriate security controls, access restrictions, and handling procedures for each category.

Data Masking

Data Protection

Data Masking is a technique that obscures specific data within a database to protect sensitive information while maintaining the data's usability for testing, development, or analytics purposes.

Data Sovereignty

Data Protection

Data Sovereignty is the concept that data is subject to the laws and governance of the country or region where it is collected, processed, or stored, requiring organizations to understand and comply with local data regulations.

Data Breach Notification

Data Protection

Data Breach Notification is the legal requirement for organizations to inform affected individuals, regulators, and sometimes the public when personal data has been compromised in a security breach, within specified timeframes.

Digital Rights Management

Data Protection

Digital Rights Management (DRM) is a set of technologies and policies that control access to, and usage of, copyrighted digital content and proprietary information, preventing unauthorized copying, distribution, and modification.

Digital Forensics

Security Operations

Digital Forensics is the process of collecting, preserving, analyzing, and presenting digital evidence from computers, networks, and mobile devices in a manner that is legally admissible and maintains chain of custody.

Dynamic Application Security Testing (DAST)

Application Security

Dynamic Application Security Testing (DAST) is a black-box testing methodology that analyzes running web applications by simulating attacks from the outside to identify security vulnerabilities in deployed applications.

DevSecOps

Application Security

DevSecOps is a software development methodology that integrates security practices throughout the entire development lifecycle, making security a shared responsibility between development, security, and operations teams rather than an afterthought.

Digital Twin Security

Emerging Technology

Digital Twin Security focuses on protecting the virtual replicas of physical systems, processes, or products that are used for simulation, monitoring, and optimization, ensuring the integrity of both the digital model and its connection to real-world assets.

Data Loss Prevention (DLP)

Data Protection

Data Loss Prevention (DLP) encompasses the strategies, processes, and technologies used to detect and prevent the unauthorized transmission, exfiltration, or exposure of sensitive data from an organization's network.

Distributed Denial of Service (DDoS)

Threats & Attacks

A Distributed Denial of Service (DDoS) attack uses multiple compromised systems across the internet to flood a target with traffic, overwhelming resources and making services unavailable to legitimate users.

Data Encryption at Rest

Data Protection

Data Encryption at Rest is the practice of encrypting stored data on disk, in databases, or in storage systems so that the data remains protected even if the physical storage media is accessed by unauthorized parties.

Data Privacy

Data Protection

Data Privacy is the right of individuals to control how their personal information is collected, used, stored, and shared by organizations, enforced through regulations like GDPR, CCPA, and PIPEDA.

I
12 terms

Incident Response

Security Operations

Incident response is the organized approach to addressing and managing the aftermath of a security breach or cyberattack. The goal is to handle the situation in a way that limits damage, reduces recovery time and costs, and prevents future incidents.

Intrusion Detection System

Security Operations

An Intrusion Detection System (IDS) is a security tool that monitors network traffic or system activities for malicious behavior or policy violations. It alerts security teams when suspicious activity is detected, enabling rapid investigation and response.

Identity Governance

Identity & Access

Identity Governance is the policy-based framework for managing digital identities, ensuring users have appropriate access to resources, and maintaining compliance through regular access reviews and certifications.

Insider Threat

Threats & Attacks

An Insider Threat is a security risk posed by individuals within an organization, such as employees, contractors, or partners, who misuse their authorized access to harm the organization's data, systems, or operations.

ISO 27001

Risk & Compliance

ISO 27001 is an international standard for information security management systems (ISMS) that provides a systematic approach to managing sensitive company information through risk management processes and security controls.

Intrusion Prevention System (IPS)

Infrastructure

An Intrusion Prevention System (IPS) is an active network security technology that monitors network traffic, detects malicious activity, and automatically takes action to block or prevent threats in real time.

Incident Response Plan

Security Operations

An Incident Response Plan is a documented set of procedures and guidelines that defines how an organization will detect, respond to, and recover from security incidents to minimize damage and restore operations.

Infrastructure as Code Security

Cloud Security

Infrastructure as Code (IaC) Security is the practice of scanning and validating infrastructure-as-code templates (Terraform, CloudFormation, ARM) for security misconfigurations and policy violations before deployment.

Interactive Application Security Testing (IAST)

Application Security

Interactive Application Security Testing (IAST) combines elements of SAST and DAST by using agents instrumented within the application to analyze code behavior during runtime testing, providing accurate vulnerability detection with low false positives.

IoT Security

Emerging Technology

IoT Security encompasses the strategies, technologies, and practices for protecting Internet of Things devices and networks from cyber threats, addressing the unique challenges of resource-constrained, interconnected devices.

ICS Security

Emerging Technology

Industrial Control System (ICS) Security focuses on protecting the computers, networks, and control systems that manage industrial processes in sectors such as energy, water, manufacturing, and transportation.

Identity and Access Management (IAM)

Identity & Access

Identity and Access Management (IAM) is the framework of policies, processes, and technologies that manages digital identities and controls user access to critical information and systems across an organization.

M
8 terms

Malware

Threats & Attacks

Malware (malicious software) is any software intentionally designed to cause damage to a computer, server, client, or network. Common types include viruses, worms, trojans, ransomware, spyware, adware, and rootkits.

Multi-Factor Authentication

Identity & Access

Multi-Factor Authentication (MFA) is a security method that requires users to provide two or more verification factors to gain access to a resource. It combines something you know (password), something you have (token), and something you are (biometrics).

Man-in-the-Middle Attack

Threats & Attacks

A Man-in-the-Middle (MitM) attack is a cyberattack where an attacker secretly intercepts and potentially alters communications between two parties who believe they are communicating directly with each other.

Multi-Cloud Security

Cloud Security

Multi-Cloud Security is the practice of maintaining consistent security policies, controls, and visibility across multiple cloud service providers, addressing the complexity of managing security in heterogeneous cloud environments.

MITRE ATT&CK

Security Operations

MITRE ATT&CK is a globally accessible knowledge base of adversary tactics, techniques, and procedures (TTPs) based on real-world observations, used for threat modeling, detection engineering, and security assessment.

Managed Detection and Response

Security Operations

Managed Detection and Response (MDR) is a cybersecurity service that combines technology and human expertise to perform threat monitoring, detection, and response on behalf of organizations that lack in-house security operations capabilities.

Micro-Segmentation

Infrastructure

Micro-Segmentation is a security technique that creates fine-grained security zones around individual workloads or applications, enforcing strict access policies that prevent lateral movement even within the same network segment.

Malware Analysis

Security Operations

Malware Analysis is the process of studying and dissecting malicious software to understand its behavior, origin, capabilities, and impact, enabling security teams to develop detection signatures, containment strategies, and prevention measures.

P
13 terms

Penetration Testing

Assessment & Testing

Penetration testing (pen testing) is a simulated cyberattack against your computer system, network, or web application to identify exploitable vulnerabilities. Ethical hackers use the same tools and techniques as malicious attackers to find weaknesses before they can be exploited.

Phishing

Threats & Attacks

Phishing is a social engineering attack where cybercriminals send fraudulent communications, typically emails, that appear to come from a trusted source. The goal is to trick recipients into revealing sensitive information, clicking malicious links, or downloading malware.

Privileged Access Management

Identity & Access

Privileged Access Management (PAM) is a cybersecurity discipline that secures, controls, and monitors access for privileged accounts that have elevated permissions to critical systems and data.

Password Policy

Identity & Access

A Password Policy is a set of rules and guidelines that define requirements for creating, managing, and protecting passwords, including length, complexity, rotation, and storage standards.

PCI DSS

Risk & Compliance

PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards designed to ensure that all organizations that accept, process, store, or transmit credit card information maintain a secure environment.

PIPEDA

Risk & Compliance

PIPEDA (Personal Information Protection and Electronic Documents Act) is Canada's federal privacy law governing how private-sector organizations collect, use, and disclose personal information in the course of commercial activities.

Privacy Impact Assessment

Risk & Compliance

A Privacy Impact Assessment (PIA) is a systematic process for evaluating how a project, system, or process collects, uses, and protects personal information, identifying privacy risks and recommending mitigations.

Proxy Server

Infrastructure

A Proxy Server is an intermediary server that sits between client devices and the internet, forwarding requests on behalf of clients while providing anonymity, caching, content filtering, and security benefits.

Patch Management

Security Operations

Patch Management is the process of identifying, acquiring, testing, and deploying software updates and security patches across an organization's systems to fix vulnerabilities and improve functionality.

Purple Team

Security Operations

A Purple Team is a collaborative security approach where red team (offensive) and blue team (defensive) personnel work together to maximize the effectiveness of security testing by sharing knowledge, techniques, and findings in real time.

Penetration Testing Methodology

Security Operations

Penetration Testing Methodology refers to the structured frameworks and standards that guide how penetration tests are planned, executed, and reported, ensuring comprehensive and repeatable security assessments.

Penetration Testing as a Service (PTaaS)

Assessment & Testing

Penetration Testing as a Service (PTaaS) is a modern delivery model that combines continuous automated scanning with on-demand expert-led penetration testing, providing organizations with ongoing security validation through a cloud-based platform.

Phishing Simulation

Assessment & Testing

Phishing Simulation is a security training exercise that sends realistic but benign phishing emails to employees to test their ability to recognize and report phishing attempts, measuring organizational resilience to social engineering.

R
9 terms

Ransomware

Threats & Attacks

Ransomware is a type of malware that encrypts a victim's files or locks them out of their systems, then demands a ransom payment in exchange for the decryption key. Modern ransomware often includes double extortion, where attackers also threaten to leak stolen data.

Red Team

Assessment & Testing

A red team is a group of security professionals who simulate real-world attacks against an organization to test its defenses. Unlike penetration testing, red team exercises assess the entire security posture including people, processes, and technology across an extended engagement.

Risk Assessment

Risk & Compliance

A risk assessment is the systematic process of identifying, analyzing, and evaluating cybersecurity risks to an organization. It determines the likelihood and potential impact of threats, helping prioritize security investments and mitigation strategies.

Rootkit

Threats & Attacks

A Rootkit is a collection of malicious software tools that provides privileged access to a computer while actively concealing its presence from users, administrators, and security software.

Risk Management

Risk & Compliance

Risk Management is the ongoing process of identifying, assessing, prioritizing, and mitigating cybersecurity risks to reduce their potential impact on an organization's operations, assets, and reputation.

Reverse Proxy

Infrastructure

A Reverse Proxy is a server that sits in front of web servers and forwards client requests to the appropriate backend server, providing load balancing, SSL termination, caching, and an additional layer of security.

RSA Encryption

Data Protection

RSA is an asymmetric encryption algorithm that uses a pair of mathematically related public and private keys, widely used for secure data transmission, digital signatures, and key exchange in protocols like TLS/SSL.

Right to be Forgotten

Data Protection

The Right to be Forgotten is a data privacy concept, codified in GDPR as the right to erasure, that allows individuals to request the deletion of their personal data from an organization's records under certain circumstances.

Runtime Application Self-Protection (RASP)

Application Security

Runtime Application Self-Protection (RASP) is a security technology that runs within an application to detect and prevent real-time attacks by analyzing application behavior and context from inside the running application.

S
30 terms

SIEM

Security Operations

Security Information and Event Management (SIEM) is a technology solution that collects, aggregates, and analyzes security event data from across an organization's IT infrastructure. SIEM provides real-time monitoring, threat detection, correlation of security events, and compliance reporting.

Single Sign-On

Identity & Access

Single Sign-On (SSO) is an authentication method that allows users to access multiple applications and services with one set of login credentials. SSO improves user experience, reduces password fatigue, and centralizes authentication management.

Social Engineering

Threats & Attacks

Social engineering is a manipulation technique that exploits human psychology to trick people into making security mistakes or giving away sensitive information. It is the human element of cybersecurity attacks and often serves as the initial vector for more complex attacks.

SAML

Identity & Access

Security Assertion Markup Language (SAML) is an XML-based open standard for exchanging authentication and authorization data between an identity provider and a service provider, enabling single sign-on across domains.

Session Management

Identity & Access

Session Management is the process of securely handling user sessions from login to logout, including generating session tokens, maintaining session state, enforcing timeouts, and preventing session hijacking attacks.

Spear Phishing

Threats & Attacks

Spear Phishing is a targeted form of phishing that crafts personalized messages aimed at specific individuals or organizations, using gathered intelligence to make the attack more convincing and effective.

SQL Injection

Threats & Attacks

SQL Injection is a code injection attack that exploits vulnerabilities in an application's database layer by inserting malicious SQL statements into input fields, allowing attackers to read, modify, or delete database contents.

Supply Chain Attack

Threats & Attacks

A Supply Chain Attack targets an organization by compromising a trusted third-party vendor, software provider, or service in its supply chain, using the trusted relationship to deliver malware or gain unauthorized access.

Spyware

Threats & Attacks

Spyware is malicious software that secretly monitors user activity, collects personal information, and transmits it to third parties without the user's knowledge or consent.

SOC 2

Risk & Compliance

SOC 2 (System and Organization Controls 2) is an auditing framework developed by AICPA that evaluates an organization's information systems based on five trust service criteria: security, availability, processing integrity, confidentiality, and privacy.

Security Policy

Risk & Compliance

A Security Policy is a formal document that defines an organization's approach to information security, establishing rules, guidelines, and responsibilities for protecting assets, data, and systems from threats.

Software-Defined Networking (SDN)

Infrastructure

Software-Defined Networking (SDN) is a network architecture approach that separates the control plane from the data plane, enabling centralized, programmable management of network infrastructure through software applications.

Secure File Transfer

Data Protection

Secure File Transfer refers to methods and protocols for transmitting files between systems or users with encryption, authentication, and integrity verification to prevent unauthorized access or tampering during transit.

SOAR

Security Operations

Security Orchestration, Automation, and Response (SOAR) platforms combine incident response, orchestration, automation, and threat intelligence management to help security teams efficiently manage and respond to threats.

Security Operations Center (SOC)

Security Operations

A Security Operations Center (SOC) is a centralized facility staffed with security analysts who continuously monitor, detect, analyze, and respond to cybersecurity incidents using a combination of technology solutions and processes.

Security Awareness Training

Security Operations

Security Awareness Training is an educational program that teaches employees to recognize and respond to cybersecurity threats such as phishing, social engineering, and data handling risks, building a human firewall against attacks.

Shared Responsibility Model

Cloud Security

The Shared Responsibility Model is a cloud security framework that defines which security obligations belong to the cloud service provider and which belong to the customer, varying by service type (IaaS, PaaS, SaaS).

Serverless Security

Cloud Security

Serverless Security addresses the unique security challenges of serverless computing platforms like AWS Lambda and Azure Functions, where the provider manages infrastructure but application-level vulnerabilities remain the customer's responsibility.

Static Application Security Testing (SAST)

Application Security

Static Application Security Testing (SAST) is a white-box testing methodology that analyzes application source code, bytecode, or binaries without executing the program to identify security vulnerabilities early in the development lifecycle.

Software Composition Analysis (SCA)

Application Security

Software Composition Analysis (SCA) is a security practice that identifies open-source components and third-party libraries in applications, detects known vulnerabilities, and ensures license compliance across the software supply chain.

Secure SDLC

Application Security

Secure SDLC (Software Development Lifecycle) is a framework that integrates security activities such as threat modeling, secure coding, security testing, and vulnerability management into every phase of the software development process.

SCADA Security

Emerging Technology

SCADA (Supervisory Control and Data Acquisition) Security addresses the protection of SCADA systems that monitor and control geographically dispersed industrial processes in sectors like utilities, oil and gas, water treatment, and transportation.

Security Information Sharing

Security Operations

Security Information Sharing is the practice of exchanging threat intelligence, indicators of compromise, and security best practices between organizations, industries, and government agencies to improve collective cybersecurity defense.

Security Architecture

Infrastructure

Security Architecture is the design and framework that defines how security controls, technologies, and processes are structured and integrated to protect an organization's information assets and meet business objectives.

Security Orchestration

Security Operations

Security Orchestration is the automated coordination and integration of multiple security tools, processes, and workflows to streamline security operations, accelerate incident response, and reduce manual effort.

Secure Access Service Edge (SASE)

Infrastructure

Secure Access Service Edge (SASE) is a cloud-native architecture that converges networking and security services including SD-WAN, CASB, FWaaS, and ZTNA into a single cloud-delivered platform for secure access from any location.

Security Baseline

Security Operations

A Security Baseline is a minimum set of security controls and configuration standards that must be applied to systems, applications, and networks to ensure a consistent and acceptable level of security across an organization.

Security Audit

Assessment & Testing

A Security Audit is a systematic evaluation of an organization's information security posture by assessing how well it conforms to established security policies, regulatory requirements, and industry best practices.

Secrets Management

Data Protection

Secrets Management is the practice of securely storing, accessing, and managing sensitive credentials such as API keys, passwords, certificates, and tokens used by applications and services in development and production environments.

Secure Web Gateway

Infrastructure

A Secure Web Gateway (SWG) is a security solution that protects users from web-based threats by filtering internet traffic, enforcing corporate policies, blocking malicious websites, and preventing data exfiltration through web channels.

T
9 terms

Threat Intelligence

Security Operations

Threat intelligence is evidence-based knowledge about existing or emerging threats to an organization's security. It includes context, indicators of compromise (IOCs), and actionable insights that help organizations understand, prevent, and respond to cyber threats.

Typosquatting

Threats & Attacks

Typosquatting is a social engineering attack that registers domain names similar to popular websites, exploiting common typing errors to redirect users to malicious sites for phishing, malware distribution, or ad fraud.

Trojan Horse

Threats & Attacks

A Trojan Horse is malware disguised as legitimate software that tricks users into installing it, then provides attackers with unauthorized access to the victim's system for data theft, surveillance, or further attacks.

Third-Party Risk

Risk & Compliance

Third-Party Risk refers to the potential threats and vulnerabilities introduced to an organization through its relationships with external vendors, partners, contractors, and service providers who access its systems or data.

TLS/SSL

Data Protection

TLS (Transport Layer Security) and its predecessor SSL (Secure Sockets Layer) are cryptographic protocols that provide secure, encrypted communication over networks, most commonly used to protect web traffic via HTTPS.

Tokenization

Data Protection

Tokenization is a data protection technique that replaces sensitive data elements with non-sensitive placeholder tokens, while the original data is stored securely in a separate token vault with restricted access.

Threat Hunting

Security Operations

Threat Hunting is the proactive practice of searching through networks, endpoints, and datasets to detect and isolate advanced threats that evade existing automated security solutions.

Tabletop Exercise

Security Operations

A Tabletop Exercise is a discussion-based simulation where key stakeholders walk through a hypothetical security incident scenario to evaluate their response plans, identify gaps, and improve coordination without executing actual operations.

Threat Modeling

Assessment & Testing

Threat Modeling is a structured approach for identifying, quantifying, and addressing security threats to a system by analyzing its architecture, data flows, and trust boundaries to proactively design security controls.

V
6 terms

Vulnerability Assessment

Assessment & Testing

A vulnerability assessment is a systematic process of identifying, quantifying, and prioritizing security vulnerabilities in systems, networks, and applications. It uses automated scanning tools and manual analysis to discover weaknesses that could be exploited by attackers.

VPN

Infrastructure

A Virtual Private Network (VPN) creates an encrypted tunnel between a user's device and a remote server, protecting data in transit from eavesdropping. VPNs are used to secure remote access to corporate networks and to maintain privacy on public networks.

Virus

Threats & Attacks

A Computer Virus is malicious code that attaches itself to legitimate programs or files and replicates when the infected program is executed, spreading to other files and systems while delivering harmful payloads.

Vendor Risk Management

Risk & Compliance

Vendor Risk Management is the process of assessing, monitoring, and mitigating security risks posed by third-party vendors, suppliers, and service providers who have access to an organization's data or systems.

Vulnerability Management

Security Operations

Vulnerability Management is the continuous process of identifying, classifying, prioritizing, remediating, and mitigating security vulnerabilities across an organization's IT infrastructure and applications.

Virtual CISO

Security Operations

A Virtual CISO (vCISO) is an outsourced security leadership service that provides organizations with experienced chief information security officer expertise on a fractional or part-time basis without the cost of a full-time executive.

Need Expert Help With Cybersecurity?

Our team of certified security professionals can help you implement the right solutions for your organization.

Book a Free Consultation