Term | Definition |
---|---|
Access Control | Techniques that restrict access to resources based on user identity and permissions. |
Access Control List (ACL) | A list of rules used to control network traffic and reduce network attacks. |
Access Management | The process of managing user identities and their access to systems and data. |
Advanced Encryption Standard (AES) | A symmetric encryption algorithm widely used across the globe. |
Air Gap | A security measure that involves isolating a computer or network to prevent external access. |
Antivirus Software | Programs designed to detect and eliminate malicious software. |
Application Security | Practices to improve the security of software applications. |
Asset Management | Process of tracking and managing IT assets throughout their lifecycle. |
Attack Surface | All the points where an unauthorized user can try to enter or extract data. |
Audit Trail | A record showing who accessed what data and when. |
Authentication | The process of verifying the identity of a user, device, or system. |
Authorization | Granting an authenticated user permission to access specific resources. |
Term | Definition |
---|---|
BYOD (Bring Your Own Device) | A policy allowing employees to use personal devices for work purposes. |
Backup | The practice of copying and storing data to prevent loss. |
Behavioral Analytics | Using machine learning to detect anomalies in user behavior. |
Black Hat | A hacker who violates computer security for personal gain or malicious intent. |
Blue Team | A group responsible for defending an organization’s information systems. |
Botnet | A network of compromised computers controlled remotely. |
Brute Force Attack | A method of cracking passwords through exhaustive trial-and-error attempts. |
Business Continuity Plan (BCP) | A plan to ensure critical operations continue during a disruption. |
Term | Definition |
---|---|
CMMC | Cybersecurity Maturity Model Certification – required for DoD contractors. |
Certificate Authority (CA) | An entity that issues digital certificates to verify identities online. |
Clickjacking | An attack where a user is tricked into clicking something different than intended. |
Cloud Security | Protecting cloud-based systems and data from unauthorized access. |
Command and Control (C2) | Servers or systems used by attackers to maintain communications with compromised devices. |
Compliance | Adherence to regulations, laws, and guidelines in cybersecurity. |
Configuration Management | Maintaining computer systems in a consistent, secure state. |
Cryptography | The use of mathematical algorithms to encrypt and secure data. |
Cyber Hygiene | Routine practices to ensure the safe handling of data and systems. |
Cybersecurity | The practice of protecting systems, networks, and programs from digital attacks. |
Term | Definition |
---|---|
DDoS Attack | Distributed Denial-of-Service attack – floods systems to make them unavailable. |
Data Breach | An incident where sensitive information is accessed without authorization. |
Data Encryption | Converting data into a coded format to prevent unauthorized access. |
Data Exfiltration | Unauthorized transfer of data from a computer or network. |
Data Integrity | Ensuring information is accurate and unaltered during processing or transit. |
Deep Packet Inspection | A form of network packet filtering that examines the data part of a packet. |
Demilitarized Zone (DMZ) | A physical or logical subnetwork that contains and exposes external services to the internet. |
Digital Forensics | Recovering and investigating data related to cybercrime. |
Digital Signature | A mathematical technique used to validate the authenticity and integrity of a message. |
Drive-by Download | Malicious software that automatically downloads to a user’s system without consent. |
Term | Definition |
---|---|
Email Spoofing | Faking the sender address in an email to trick recipients. |
Endpoint Security | Protection of devices like laptops and smartphones from threats. |
Exploit | Code or commands that take advantage of vulnerabilities in systems. |
Exploit Kit | A toolkit used to exploit security holes found in software applications. |
Term | Definition |
---|---|
Fileless Malware | Malware that operates without leaving traditional files behind. |
Firewall | A security device that monitors and filters incoming and outgoing traffic. |
Term | Definition |
---|---|
GRC | Governance, Risk Management, and Compliance – framework for managing enterprise security. |
Gray Hat | A hacker who may violate ethical standards but not for personal gain. |
Term | Definition |
---|---|
HIPAA | Health Insurance Portability and Accountability Act – governs health data privacy. |
Honeypot | A decoy system used to lure attackers and analyze their techniques. |
Term | Definition |
---|---|
IP Spoofing | Impersonating another computer using its IP address. |
ISO 27001 | International standard for information security management systems. |
Incident Response | Actions taken to address and manage a cybersecurity breach. |
Insider Threat | A threat to security from within the organization. |
Intrusion Detection System (IDS) | Tool used to monitor networks for suspicious activity. |
Term | Definition |
---|
Term | Definition |
---|---|
Key Management | Handling cryptographic keys in a secure and efficient manner. |
Keylogger | A type of surveillance software that records keystrokes made by a user. |
Term | Definition |
---|---|
Least Privilege | Security principle of giving users the minimal level of access necessary. |
Log Management | Collecting and analyzing log data for security insights. |
Logic Bomb | Malicious code triggered by a specific event or condition in a system. |
Term | Definition |
---|---|
MITM (Man-in-the-Middle) | An attack where the attacker secretly intercepts communication between two parties. |
Malware | Malicious software designed to disrupt or damage systems. |
Man-in-the-Middle Attack | Interception of communication between two parties without their knowledge. |
Mantrap | A physical security device to prevent tailgating and unauthorized entry. |
Mobile Device Management (MDM) | Tools to monitor and secure mobile devices. |
Multi-Factor Authentication (MFA) | Authentication method requiring multiple verification forms. |
Term | Definition |
---|---|
NIST | National Institute of Standards and Technology – provides cybersecurity frameworks. |
Network Security | Measures to protect the integrity and usability of networks. |
Network Segmentation | Dividing a network into smaller parts to improve security. |
Term | Definition |
---|
Term | Definition |
---|---|
Password Cracking | The process of recovering passwords from data that has been stored or transmitted. |
Password Policy | Rules for creating and managing secure passwords. |
Patch Management | The process of updating software to fix vulnerabilities. |
Payload | The part of malware that performs a malicious action. |
Penetration Testing | Simulated cyberattack used to test system vulnerabilities. |
Phishing | A social engineering attack where users are tricked into revealing sensitive info. |
Public Key Infrastructure (PKI) | System for managing digital certificates and encryption. |
Term | Definition |
---|---|
Quarantine | Isolating files suspected to be malicious from the rest of the system. |
Term | Definition |
---|---|
Ransomware | Malware that encrypts data and demands payment to restore access. |
Red Teaming | Simulated attacks by ethical hackers to test defenses. |
Risk Assessment | Identifying and analyzing potential cybersecurity threats. |
Term | Definition |
---|---|
SIEM | Security Information and Event Management – real-time monitoring of security events. |
SOC 2 | A compliance framework focused on data security and privacy for service providers. |
Sandboxing | Running programs in a separate environment to observe behavior without risk. |
Secure Coding | Writing software code that guards against security vulnerabilities. |
Security Awareness Training | Educating employees about cybersecurity risks and best practices. |
Security Token | A physical device used to gain access to an electronically restricted resource. |
Shadow IT | Use of unauthorized systems and software within an organization. |
Single Sign-On (SSO) | Allows users to log in once and access multiple systems. |
Smishing | Phishing using SMS or text messages to trick users. |
Social Engineering | Manipulating people to divulge confidential information. |
Spyware | Software that gathers information without consent and sends it to another entity. |
Supply Chain Attack | Exploiting vulnerabilities in third-party services or software. |
Term | Definition |
---|---|
Threat Actor | An individual or group responsible for a security incident. |
Threat Intelligence | Information about threats that helps defend against cyberattacks. |
Tokenization | Replacing sensitive data with non-sensitive substitutes. |
Trojan Horse | A type of malware disguised as legitimate software. |
Two-Factor Authentication (2FA) | Security process involving two methods of identity verification. |
Term | Definition |
---|---|
UEBA (User and Entity Behavior Analytics) | Security process to detect threats through user behavior monitoring. |
Term | Definition |
---|---|
VPN | Virtual Private Network – encrypts internet traffic for secure communication. |
Vulnerability | A weakness in a system that could be exploited by threats. |
Vulnerability Assessment | Identifying and prioritizing vulnerabilities in a system. |
Term | Definition |
---|---|
Watering Hole Attack | A strategy where attackers infect websites likely to be visited by their target. |
Web Application Firewall (WAF) | Filters and monitors HTTP traffic to and from a web service. |
White Hat | An ethical hacker who uses skills to improve security. |
Whitelisting | A security approach that only allows approved applications or users. |
Wi-Fi Eavesdropping | Interception of data sent over unprotected wireless networks. |
Worm | A self-replicating program that spreads through networks. |
Term | Definition |
---|
Term | Definition |
---|
Term | Definition |
---|---|
Zero Trust Architecture | A model where no user or system is trusted by default. |
Zero-Day Exploit | An attack that occurs on the same day a vulnerability is discovered. |
Zombie | A compromised computer used to perform malicious tasks under remote direction. |