| Term | Definition |
|---|---|
| Access Control | Techniques that restrict access to resources based on user identity and permissions. |
| Access Control List (ACL) | A list of rules used to control network traffic and reduce network attacks. |
| Access Management | The process of managing user identities and their access to systems and data. |
| Advanced Encryption Standard (AES) | A symmetric encryption algorithm widely used across the globe. |
| Air Gap | A security measure that involves isolating a computer or network to prevent external access. |
| Antivirus Software | Programs designed to detect and eliminate malicious software. |
| Application Security | Practices to improve the security of software applications. |
| Asset Management | Process of tracking and managing IT assets throughout their lifecycle. |
| Attack Surface | All the points where an unauthorized user can try to enter or extract data. |
| Audit Trail | A record showing who accessed what data and when. |
| Authentication | The process of verifying the identity of a user, device, or system. |
| Authorization | Granting an authenticated user permission to access specific resources. |
| Term | Definition |
|---|---|
| BYOD (Bring Your Own Device) | A policy allowing employees to use personal devices for work purposes. |
| Backup | The practice of copying and storing data to prevent loss. |
| Behavioral Analytics | Using machine learning to detect anomalies in user behavior. |
| Black Hat | A hacker who violates computer security for personal gain or malicious intent. |
| Blue Team | A group responsible for defending an organization’s information systems. |
| Botnet | A network of compromised computers controlled remotely. |
| Brute Force Attack | A method of cracking passwords through exhaustive trial-and-error attempts. |
| Business Continuity Plan (BCP) | A plan to ensure critical operations continue during a disruption. |
| Term | Definition |
|---|---|
| CMMC | Cybersecurity Maturity Model Certification – required for DoD contractors. |
| Certificate Authority (CA) | An entity that issues digital certificates to verify identities online. |
| Clickjacking | An attack where a user is tricked into clicking something different than intended. |
| Cloud Security | Protecting cloud-based systems and data from unauthorized access. |
| Command and Control (C2) | Servers or systems used by attackers to maintain communications with compromised devices. |
| Compliance | Adherence to regulations, laws, and guidelines in cybersecurity. |
| Configuration Management | Maintaining computer systems in a consistent, secure state. |
| Cryptography | The use of mathematical algorithms to encrypt and secure data. |
| Cyber Hygiene | Routine practices to ensure the safe handling of data and systems. |
| Cybersecurity | The practice of protecting systems, networks, and programs from digital attacks. |
| Term | Definition |
|---|---|
| DDoS Attack | Distributed Denial-of-Service attack – floods systems to make them unavailable. |
| Data Breach | An incident where sensitive information is accessed without authorization. |
| Data Encryption | Converting data into a coded format to prevent unauthorized access. |
| Data Exfiltration | Unauthorized transfer of data from a computer or network. |
| Data Integrity | Ensuring information is accurate and unaltered during processing or transit. |
| Deep Packet Inspection | A form of network packet filtering that examines the data part of a packet. |
| Demilitarized Zone (DMZ) | A physical or logical subnetwork that contains and exposes external services to the internet. |
| Digital Forensics | Recovering and investigating data related to cybercrime. |
| Digital Signature | A mathematical technique used to validate the authenticity and integrity of a message. |
| Drive-by Download | Malicious software that automatically downloads to a user’s system without consent. |
| Term | Definition |
|---|---|
| Email Spoofing | Faking the sender address in an email to trick recipients. |
| Endpoint Security | Protection of devices like laptops and smartphones from threats. |
| Exploit | Code or commands that take advantage of vulnerabilities in systems. |
| Exploit Kit | A toolkit used to exploit security holes found in software applications. |
| Term | Definition |
|---|---|
| Fileless Malware | Malware that operates without leaving traditional files behind. |
| Firewall | A security device that monitors and filters incoming and outgoing traffic. |
| Term | Definition |
|---|---|
| GRC | Governance, Risk Management, and Compliance – framework for managing enterprise security. |
| Gray Hat | A hacker who may violate ethical standards but not for personal gain. |
| Term | Definition |
|---|---|
| HIPAA | Health Insurance Portability and Accountability Act – governs health data privacy. |
| Honeypot | A decoy system used to lure attackers and analyze their techniques. |
| Term | Definition |
|---|---|
| IP Spoofing | Impersonating another computer using its IP address. |
| ISO 27001 | International standard for information security management systems. |
| Incident Response | Actions taken to address and manage a cybersecurity breach. |
| Insider Threat | A threat to security from within the organization. |
| Intrusion Detection System (IDS) | Tool used to monitor networks for suspicious activity. |
| Term | Definition |
|---|
| Term | Definition |
|---|---|
| Key Management | Handling cryptographic keys in a secure and efficient manner. |
| Keylogger | A type of surveillance software that records keystrokes made by a user. |
| Term | Definition |
|---|---|
| Least Privilege | Security principle of giving users the minimal level of access necessary. |
| Log Management | Collecting and analyzing log data for security insights. |
| Logic Bomb | Malicious code triggered by a specific event or condition in a system. |
| Term | Definition |
|---|---|
| MITM (Man-in-the-Middle) | An attack where the attacker secretly intercepts communication between two parties. |
| Malware | Malicious software designed to disrupt or damage systems. |
| Man-in-the-Middle Attack | Interception of communication between two parties without their knowledge. |
| Mantrap | A physical security device to prevent tailgating and unauthorized entry. |
| Mobile Device Management (MDM) | Tools to monitor and secure mobile devices. |
| Multi-Factor Authentication (MFA) | Authentication method requiring multiple verification forms. |
| Term | Definition |
|---|---|
| NIST | National Institute of Standards and Technology – provides cybersecurity frameworks. |
| Network Security | Measures to protect the integrity and usability of networks. |
| Network Segmentation | Dividing a network into smaller parts to improve security. |
| Term | Definition |
|---|
| Term | Definition |
|---|---|
| Password Cracking | The process of recovering passwords from data that has been stored or transmitted. |
| Password Policy | Rules for creating and managing secure passwords. |
| Patch Management | The process of updating software to fix vulnerabilities. |
| Payload | The part of malware that performs a malicious action. |
| Penetration Testing | Simulated cyberattack used to test system vulnerabilities. |
| Phishing | A social engineering attack where users are tricked into revealing sensitive info. |
| Public Key Infrastructure (PKI) | System for managing digital certificates and encryption. |
| Term | Definition |
|---|---|
| Quarantine | Isolating files suspected to be malicious from the rest of the system. |
| Term | Definition |
|---|---|
| Ransomware | Malware that encrypts data and demands payment to restore access. |
| Red Teaming | Simulated attacks by ethical hackers to test defenses. |
| Risk Assessment | Identifying and analyzing potential cybersecurity threats. |
| Term | Definition |
|---|---|
| SIEM | Security Information and Event Management – real-time monitoring of security events. |
| SOC 2 | A compliance framework focused on data security and privacy for service providers. |
| Sandboxing | Running programs in a separate environment to observe behavior without risk. |
| Secure Coding | Writing software code that guards against security vulnerabilities. |
| Security Awareness Training | Educating employees about cybersecurity risks and best practices. |
| Security Token | A physical device used to gain access to an electronically restricted resource. |
| Shadow IT | Use of unauthorized systems and software within an organization. |
| Single Sign-On (SSO) | Allows users to log in once and access multiple systems. |
| Smishing | Phishing using SMS or text messages to trick users. |
| Social Engineering | Manipulating people to divulge confidential information. |
| Spyware | Software that gathers information without consent and sends it to another entity. |
| Supply Chain Attack | Exploiting vulnerabilities in third-party services or software. |
| Term | Definition |
|---|---|
| Threat Actor | An individual or group responsible for a security incident. |
| Threat Intelligence | Information about threats that helps defend against cyberattacks. |
| Tokenization | Replacing sensitive data with non-sensitive substitutes. |
| Trojan Horse | A type of malware disguised as legitimate software. |
| Two-Factor Authentication (2FA) | Security process involving two methods of identity verification. |
| Term | Definition |
|---|---|
| UEBA (User and Entity Behavior Analytics) | Security process to detect threats through user behavior monitoring. |
| Term | Definition |
|---|---|
| VPN | Virtual Private Network – encrypts internet traffic for secure communication. |
| Vulnerability | A weakness in a system that could be exploited by threats. |
| Vulnerability Assessment | Identifying and prioritizing vulnerabilities in a system. |
| Term | Definition |
|---|---|
| Watering Hole Attack | A strategy where attackers infect websites likely to be visited by their target. |
| Web Application Firewall (WAF) | Filters and monitors HTTP traffic to and from a web service. |
| White Hat | An ethical hacker who uses skills to improve security. |
| Whitelisting | A security approach that only allows approved applications or users. |
| Wi-Fi Eavesdropping | Interception of data sent over unprotected wireless networks. |
| Worm | A self-replicating program that spreads through networks. |
| Term | Definition |
|---|
| Term | Definition |
|---|
| Term | Definition |
|---|---|
| Zero Trust Architecture | A model where no user or system is trusted by default. |
| Zero-Day Exploit | An attack that occurs on the same day a vulnerability is discovered. |
| Zombie | A compromised computer used to perform malicious tasks under remote direction. |