Name
|
Definition
|
Access
Control |
The process of
regulating who or what can access resources in a computing environment. |
Accounting |
Logging and
monitoring user activities to track and analyze system access. |
Adware |
Unwanted software
that displays advertising on a computer. |
Antivirus
(AV) |
Software designed to
detect and remove malicious software (malware) from a computer. |
Audit Trail |
A record of events in
a system to facilitate analysis and investigation. |
Authentication |
Verifying the
identity of a user, system, or entity. |
Authorization |
Granting or denying
access rights and permissions based on the authenticated identity. |
Availability |
Ensuring that
information and systems are accessible and usable when needed. |
Backdoor |
A hidden method of
bypassing normal authentication or encryption in a computer system. |
Biometric
Authentication |
Using physical or
behavioral characteristics (e.g., fingerprints, retina scans) to verify
identity. |
Botnet |
A network of
compromised computers controlled by a single entity for malicious purposes. |
Brute Force
Attack |
A method of trying
all possible combinations to crack a password or encryption key. |
Business
Impact Analysis |
A process that
identifies and assesses the potential effects of disruptions to critical
business operations. |
Chain of
Custody |
The chronological
documentation and control of evidence to maintain its integrity in legal
proceedings. |
Clean Desk
Policy |
A security measure
that requires employees to keep desks clear of sensitive information when not
in use. |
Cloud
Security |
Measures to protect
data, applications, and infrastructure in cloud computing environments. |
Confidentiality |
Ensuring that
information is only accessible to those who have the proper authorization. |
Cross-Site
Request Forgery (CSRF) |
A type of attack
where a user is tricked into performing an action they did not intend. |
Cross-Site
Scripting (XSS) |
Injecting malicious
scripts into web pages viewed by other users. |
Cryptographic
Hash Function |
A mathematical
algorithm that converts data into a fixed-size string of characters, often
used for data integrity verification. |
Cryptography |
Involves mathematical
and computational techniques to secure information and enable secure
communication between parties. |
Cybersecurity
Framework |
A set of best
practices and guidelines to manage and improve an organization's
cybersecurity posture. |
Data Breach |
Unauthorized access,
acquisition, or disclosure of sensitive information. |
Data
Classification |
Categorizing data
based on sensitivity and importance to apply appropriate security controls. |
Decryption |
Reversing the
encryption process to access the original data. |
Denial of
Service (DoS) Attack |
Overloading a system
with traffic to make it unavailable to users. |
Digital
Forensics |
Investigation and
analysis of digital evidence to identify and respond to cyber incidents. |
Digital
Signature |
A cryptographic
technique to validate the origin and integrity of a message or document. |
Distributed
Denial of Service (DDoS) Attack |
Overwhelming a system
with traffic from multiple sources to make it unavailable. |
DNS (Domain
Name System) Spoofing |
Manipulating the DNS
to redirect users to malicious websites. |
Domain Name
System (DNS) |
A system translating
domain names into IP addresses. |
Eavesdropping |
Unauthorized
interception of private communication. |
Edge
Computing Security |
Securing devices and
data at the edge of a network. |
Egress
Filtering |
Controlling outbound
network traffic to prevent data leaks. |
Encryption |
The process of
converting information into a code to prevent unauthorized access. |
Endpoint
Security |
Protecting devices
(endpoints) such as computers and smartphones from security threats. |
Exploit |
Taking advantage of a
vulnerability to compromise a system. |
File
Integrity Monitoring (FIM) |
Monitoring changes to
files to detect unauthorized modifications. |
Firewall |
A network security
device that monitors and controls incoming and outgoing network traffic. |
Firmware |
Software embedded in
hardware, often used in device control. |
Full Disk
Encryption (FDE) |
Encrypting the entire
contents of a disk drive. |
Gray Hat
Hacker |
Individuals who may
perform hacking activities without malicious intent but without proper
authorization. |
Hacker |
An individual with
advanced computer skills who explores and exploits vulnerabilities. |
Hashing |
Converting data into
a fixed-size string of characters (hash) for verification. |
Honeypot |
A system designed to
attract and detect attackers by simulating vulnerabilities. |
Hypervisor |
Software that enables
multiple operating systems to run on a single host. |
Incident
Response |
The process of
managing and mitigating the impact of a security incident. |
Incident
Response Plan (IRP) |
A documented plan
outlining the steps to take in response to a security incident. |
Information
Security |
The practice of
protecting information from unauthorized access, disclosure, disruption,
modification, or destruction. |
Insider
Threat |
Security risk posed
by individuals within an organization. |
Integrity |
Maintaining the
accuracy and reliability of information and systems. |
Intrusion
Detection System (IDS) |
Monitors network or
system activities for signs of malicious behavior. |
Intrusion
Prevention System (IPS) |
Takes action to block
or prevent detected malicious activities. |
IP Spoofing |
Faking an IP address
to disguise the source of network traffic. |
IT Security
Policy |
Documented guidelines
for securing an organization's information technology. |
Kerberos |
A network
authentication protocol for securing communications. |
Keylogger |
Malicious software
that records keystrokes on a computer. |
Least Common
Mechanism |
A security principle
that suggests minimizing shared resources to reduce the risk of unauthorized
access. |
Least
Privilege |
Granting the minimum
level of access necessary for a user or system to perform its functions. |
Logical
Access Controls |
Controls restricting
access to computer systems based on user credentials. |
MAC Address
(Media Access Control) |
A unique identifier
assigned to a network interface for communication. |
Malware |
Malicious software
designed to harm or exploit computers or networks. |
Man-in-the-Middle
(MitM) Attack |
Intercepting and
possibly altering communication between two parties. |
Managed
Security Service Provider (MSSP) |
A company providing
outsourced security services. |
Mobile Device
Management (MDM) |
Securing and managing
mobile devices in an organization. |
Multi-Factor
Authentication (MFA) |
Using more than one
method of authentication for enhanced security. |
Network
Address Translation (NAT) |
A technique that
modifies network address information in packet headers while in transit. |
Network
Security |
Measures to protect
the integrity and confidentiality of data during transmission. |
Network
Segmentation |
Dividing a network
into segments to enhance security. |
Non-Repudiation |
The ability to prove
the origin of a message or transaction. |
Packet
Filtering |
Examining packets of
data and deciding whether to forward or discard them. |
Packet
Sniffing |
Intercepting and
examining data packets on a network. |
Patch |
A software update
designed to fix vulnerabilities or improve functionality. |
Payload |
The malicious part of
code or data delivered by an exploit. |
Penetration
Testing |
Simulating cyber
attacks to identify and fix vulnerabilities in a system. |
Perimeter
Security |
Controls protecting
the boundary of a network. |
Personal
Identification Number (PIN) |
A numeric code used
for authentication. |
Pharming |
Redirecting website
traffic to a fraudulent site through DNS manipulation. |
Phishing |
A fraudulent attempt
to obtain sensitive information by pretending to be a trustworthy entity. |
Ping Sweep |
Scanning a range of
IP addresses to discover live hosts. |
Port Scanning |
Probing a system for
open ports to identify potential vulnerabilities. |
Port Security |
Measures to control
access to network ports. |
Privacy
Impact Assessment (PIA) |
Assessing the impact
of a system on individual privacy. |
Protocol |
A set of rules
governing the exchange of data in a network. |
Proxy Server |
An intermediary
server that acts as a gateway between a user and the internet. |
Public Key
Infrastructure (PKI) |
A system for managing
digital keys and certificates. |
Quarantine |
Isolating potentially
malicious files or systems to prevent further spread. |
Rainbow Table |
A precomputed table
used for cracking password hashes. |
Ransomware |
Malware that encrypts
files and demands payment for their release. |
Red Team |
Security
professionals who simulate attacks to test an organization's defenses. |
Remote
Desktop Protocol (RDP) |
A protocol for
accessing the desktop of a remote computer. |
Risk
Assessment |
Identifying and
evaluating potential security risks to an organization. |
Root Cause
Analysis |
Investigating the
underlying cause of a security incident. |
Rootkit |
A type of malware
that grants unauthorized access to a computer and often masks its existence |
Router |
A device connecting
different networks and directing data traffic. |
Secure File
Transfer Protocol (SFTP) |
A secure version of
the File Transfer Protocol (FTP) that encrypts data. |
Secure
Sockets Layer (SSL) |
A deprecated
cryptographic protocol for secure communication. |
Security
Architecture |
The design and
structure of an organization's security measures. |
Security
Assessment and Testing |
Evaluating the
effectiveness of security controls through various methods like vulnerability
assessments and penetration testing. |
Security
Awareness Training |
Education for users
to recognize and avoid security threats. |
Security
Baseline |
The minimum level of
security measures to protect a system. |
Security
Certificate |
A digital document
verifying the identity of a website or entity. |
Security
Controls |
Measures to manage,
prevent, detect, or correct security risks. |
Security
Governance |
The framework that
guides and oversees an organization's security efforts. |
Security
Incident |
A violation or
imminent threat of violation of computer security policies. |
Security
Information and Event Management (SIEM) |
Collects and analyzes
security data from multiple sources to detect and respond to threats. |
Security
Metrics |
Quantitative and
qualitative measurements used to assess the effectiveness of security
measures. |
Security
Model |
A framework that
defines how security is implemented in a system or organization. |
Security
Operations Center (SOC) |
A centralized team
responsible for monitoring and responding to security incidents. |
Security
Policy |
A set of rules and
practices that define how an organization protects its information assets. |
Security
Token |
A physical or virtual
device that provides an additional layer of authentication. |
Security
Token Service (STS) |
A service that issues
security tokens for authentication and authorization. |
Session
Hijacking |
Unauthorized
interception of an active session to gain access. |
Single Point
of Failure (SPOF) |
A component that, if
it fails, will cause the entire system to fail. |
Single
Sign-On (SSO) |
Allowing a user to
access multiple systems with a single set of credentials. |
Smishing |
Phishing attacks
conducted through SMS or text messages. |
Social
Engineering |
Manipulating
individuals to divulge confidential information or perform actions. |
Software as a
Service (SaaS) |
Cloud-based software
delivery model. |
Software
Development Life Cycle (SDLC) |
The process of
developing software from planning to maintenance. |
Spear
Phishing |
Targeted phishing
attacks directed at specific individuals. |
Spoofing |
Faking the source of
an email, website, or network traffic to deceive users. |
SQL Injection |
Exploiting
vulnerabilities in SQL databases to manipulate data. |
SSL/TLS
Encryption |
Protocols for secure
communication over the internet. |
Symmetric
Encryption |
Using the same key
for both encryption and decryption. |
System
Hardening |
Configuring a system
to reduce its vulnerability to security threats. |
Threat Actor |
An individual or
group carrying out a cyber attack. |
Threat
Intelligence |
Information about
potential and current threats to help organizations defend against them. |
Threat
Modeling |
Identifying and
assessing potential threats to a system or organization. |
Time-Based
One-Time Password (TOTP) |
A password that
changes at regular intervals. |
Tokenization |
Replacing sensitive
data with a token to enhance security. |
Trojan Horse |
Malware disguised as
legitimate software to deceive users. |
Trusted
Platform Module (TPM) |
A hardware-based
security feature for storing cryptographic keys. |
Virtual
Private Network (VPN) |
Establishes a secure
connection over the internet to protect data in transit. |
Virtualization
Security |
Securing virtualized
environments to prevent attacks on virtual machines. |
Virus |
A type of malware
that attaches itself to a file and spreads when the file is executed. |
Vulnerability |
Weakness in a system
that can be exploited to compromise security. |
Vulnerability
Management |
The continuous
process of identifying, assessing, prioritizing, and mitigating
vulnerabilities in a system. |
War Driving |
Searching for and
exploiting vulnerable wireless networks. |
Web
Application Firewall (WAF) |
Protects web
applications from various security threats. |
White Hat
Hacker |
Ethical hackers who
use their skills to identify and fix security vulnerabilities. |
Worm |
A self-replicating
type of malware that spreads across a network without human intervention. |
WPA/WPA2
(Wi-Fi Protected Access) |
Security protocols
for wireless networks. |
Zero Trust
Security Model |
A security approach
that assumes no trust, even inside the network, and requires verification
from everyone. |
Zero-Day
Vulnerability |
A security flaw in
software that is exploited before the developer releases a fix. |