Cybersecurity Glossary of Terms and Definitions

Learn about all the terms and definitions related to cybersecurity and cybersecurity compliance.

Cybersecurity Glossary

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

A

Term Definition
Access Control Techniques that restrict access to resources based on user identity and permissions.
Access Control List (ACL) A list of rules used to control network traffic and reduce network attacks.
Access Management The process of managing user identities and their access to systems and data.
Advanced Encryption Standard (AES) A symmetric encryption algorithm widely used across the globe.
Air Gap A security measure that involves isolating a computer or network to prevent external access.
Antivirus Software Programs designed to detect and eliminate malicious software.
Application Security Practices to improve the security of software applications.
Asset Management Process of tracking and managing IT assets throughout their lifecycle.
Attack Surface All the points where an unauthorized user can try to enter or extract data.
Audit Trail A record showing who accessed what data and when.
Authentication The process of verifying the identity of a user, device, or system.
Authorization Granting an authenticated user permission to access specific resources.

B

Term Definition
BYOD (Bring Your Own Device) A policy allowing employees to use personal devices for work purposes.
Backup The practice of copying and storing data to prevent loss.
Behavioral Analytics Using machine learning to detect anomalies in user behavior.
Black Hat A hacker who violates computer security for personal gain or malicious intent.
Blue Team A group responsible for defending an organization’s information systems.
Botnet A network of compromised computers controlled remotely.
Brute Force Attack A method of cracking passwords through exhaustive trial-and-error attempts.
Business Continuity Plan (BCP) A plan to ensure critical operations continue during a disruption.

C

Term Definition
CMMC Cybersecurity Maturity Model Certification – required for DoD contractors.
Certificate Authority (CA) An entity that issues digital certificates to verify identities online.
Clickjacking An attack where a user is tricked into clicking something different than intended.
Cloud Security Protecting cloud-based systems and data from unauthorized access.
Command and Control (C2) Servers or systems used by attackers to maintain communications with compromised devices.
Compliance Adherence to regulations, laws, and guidelines in cybersecurity.
Configuration Management Maintaining computer systems in a consistent, secure state.
Cryptography The use of mathematical algorithms to encrypt and secure data.
Cyber Hygiene Routine practices to ensure the safe handling of data and systems.
Cybersecurity The practice of protecting systems, networks, and programs from digital attacks.

D

Term Definition
DDoS Attack Distributed Denial-of-Service attack – floods systems to make them unavailable.
Data Breach An incident where sensitive information is accessed without authorization.
Data Encryption Converting data into a coded format to prevent unauthorized access.
Data Exfiltration Unauthorized transfer of data from a computer or network.
Data Integrity Ensuring information is accurate and unaltered during processing or transit.
Deep Packet Inspection A form of network packet filtering that examines the data part of a packet.
Demilitarized Zone (DMZ) A physical or logical subnetwork that contains and exposes external services to the internet.
Digital Forensics Recovering and investigating data related to cybercrime.
Digital Signature A mathematical technique used to validate the authenticity and integrity of a message.
Drive-by Download Malicious software that automatically downloads to a user’s system without consent.

E

TermDefinition
Email SpoofingFaking the sender address in an email to trick recipients.
Endpoint SecurityProtection of devices like laptops and smartphones from threats.
ExploitCode or commands that take advantage of vulnerabilities in systems.
Exploit KitA toolkit used to exploit security holes found in software applications.

F

Term Definition
Fileless Malware Malware that operates without leaving traditional files behind.
Firewall A security device that monitors and filters incoming and outgoing traffic.

G

TermDefinition
GRCGovernance, Risk Management, and Compliance – framework for managing enterprise security.
Gray HatA hacker who may violate ethical standards but not for personal gain.

H

Term Definition
HIPAA Health Insurance Portability and Accountability Act – governs health data privacy.
Honeypot A decoy system used to lure attackers and analyze their techniques.

I

Term Definition
IP Spoofing Impersonating another computer using its IP address.
ISO 27001 International standard for information security management systems.
Incident Response Actions taken to address and manage a cybersecurity breach.
Insider Threat A threat to security from within the organization.
Intrusion Detection System (IDS) Tool used to monitor networks for suspicious activity.

J

TermDefinition

K

Term Definition
Key Management Handling cryptographic keys in a secure and efficient manner.
Keylogger A type of surveillance software that records keystrokes made by a user.

L

Term Definition
Least Privilege Security principle of giving users the minimal level of access necessary.
Log Management Collecting and analyzing log data for security insights.
Logic Bomb Malicious code triggered by a specific event or condition in a system.

M

TermDefinition
MITM (Man-in-the-Middle)An attack where the attacker secretly intercepts communication between two parties.
MalwareMalicious software designed to disrupt or damage systems.
Man-in-the-Middle AttackInterception of communication between two parties without their knowledge.
MantrapA physical security device to prevent tailgating and unauthorized entry.
Mobile Device Management (MDM)Tools to monitor and secure mobile devices.
Multi-Factor Authentication (MFA)Authentication method requiring multiple verification forms.

N

Term Definition
NIST National Institute of Standards and Technology – provides cybersecurity frameworks.
Network Security Measures to protect the integrity and usability of networks.
Network Segmentation Dividing a network into smaller parts to improve security.

O

Term Definition

P

Term Definition
Password Cracking The process of recovering passwords from data that has been stored or transmitted.
Password Policy Rules for creating and managing secure passwords.
Patch Management The process of updating software to fix vulnerabilities.
Payload The part of malware that performs a malicious action.
Penetration Testing Simulated cyberattack used to test system vulnerabilities.
Phishing A social engineering attack where users are tricked into revealing sensitive info.
Public Key Infrastructure (PKI) System for managing digital certificates and encryption.

Q

Term Definition
Quarantine Isolating files suspected to be malicious from the rest of the system.

R

Term Definition
Ransomware Malware that encrypts data and demands payment to restore access.
Red Teaming Simulated attacks by ethical hackers to test defenses.
Risk Assessment Identifying and analyzing potential cybersecurity threats.

S

Term Definition
SIEM Security Information and Event Management – real-time monitoring of security events.
SOC 2 A compliance framework focused on data security and privacy for service providers.
Sandboxing Running programs in a separate environment to observe behavior without risk.
Secure Coding Writing software code that guards against security vulnerabilities.
Security Awareness Training Educating employees about cybersecurity risks and best practices.
Security Token A physical device used to gain access to an electronically restricted resource.
Shadow IT Use of unauthorized systems and software within an organization.
Single Sign-On (SSO) Allows users to log in once and access multiple systems.
Smishing Phishing using SMS or text messages to trick users.
Social Engineering Manipulating people to divulge confidential information.
Spyware Software that gathers information without consent and sends it to another entity.
Supply Chain Attack Exploiting vulnerabilities in third-party services or software.

T

Term Definition
Threat Actor An individual or group responsible for a security incident.
Threat Intelligence Information about threats that helps defend against cyberattacks.
Tokenization Replacing sensitive data with non-sensitive substitutes.
Trojan Horse A type of malware disguised as legitimate software.
Two-Factor Authentication (2FA) Security process involving two methods of identity verification.

U

Term Definition
UEBA (User and Entity Behavior Analytics) Security process to detect threats through user behavior monitoring.

V

Term Definition
VPN Virtual Private Network – encrypts internet traffic for secure communication.
Vulnerability A weakness in a system that could be exploited by threats.
Vulnerability Assessment Identifying and prioritizing vulnerabilities in a system.

W

Term Definition
Watering Hole Attack A strategy where attackers infect websites likely to be visited by their target.
Web Application Firewall (WAF) Filters and monitors HTTP traffic to and from a web service.
White Hat An ethical hacker who uses skills to improve security.
Whitelisting A security approach that only allows approved applications or users.
Wi-Fi Eavesdropping Interception of data sent over unprotected wireless networks.
Worm A self-replicating program that spreads through networks.

X

Term Definition

Y

Term Definition

Z

Term Definition
Zero Trust Architecture A model where no user or system is trusted by default.
Zero-Day Exploit An attack that occurs on the same day a vulnerability is discovered.
Zombie A compromised computer used to perform malicious tasks under remote direction.