| Name |                            Definition | 
 
  | Access
  Control | The process of
  regulating who or what can access resources in a computing environment. | 
 
  | Accounting | Logging and
  monitoring user activities to track and analyze system access. | 
 
  | Adware | Unwanted software
  that displays advertising on a computer. | 
 
  | Antivirus
  (AV) | Software designed to
  detect and remove malicious software (malware) from a computer. | 
 
  | Audit Trail | A record of events in
  a system to facilitate analysis and investigation. | 
 
  | Authentication | Verifying the
  identity of a user, system, or entity. | 
 
  | Authorization | Granting or denying
  access rights and permissions based on the authenticated identity. | 
 
  | Availability | Ensuring that
  information and systems are accessible and usable when needed. | 
 
  | Backdoor | A hidden method of
  bypassing normal authentication or encryption in a computer system. | 
 
  | Biometric
  Authentication | Using physical or
  behavioral characteristics (e.g., fingerprints, retina scans) to verify
  identity. | 
 
  | Botnet | A network of
  compromised computers controlled by a single entity for malicious purposes. | 
 
  | Brute Force
  Attack | A method of trying
  all possible combinations to crack a password or encryption key. | 
 
  | Business
  Impact Analysis | A process that
  identifies and assesses the potential effects of disruptions to critical
  business operations. | 
 
  | Chain of
  Custody | The chronological
  documentation and control of evidence to maintain its integrity in legal
  proceedings. | 
 
  | Clean Desk
  Policy | A security measure
  that requires employees to keep desks clear of sensitive information when not
  in use. | 
 
  | Cloud
  Security | Measures to protect
  data, applications, and infrastructure in cloud computing environments. | 
 
  | Confidentiality | Ensuring that
  information is only accessible to those who have the proper authorization. | 
 
  | Cross-Site
  Request Forgery (CSRF) | A type of attack
  where a user is tricked into performing an action they did not intend. | 
 
  | Cross-Site
  Scripting (XSS) | Injecting malicious
  scripts into web pages viewed by other users. | 
 
  | Cryptographic
  Hash Function | A mathematical
  algorithm that converts data into a fixed-size string of characters, often
  used for data integrity verification. | 
 
  | Cryptography | Involves mathematical
  and computational techniques to secure information and enable secure
  communication between parties. | 
 
  | Cybersecurity
  Framework | A set of best
  practices and guidelines to manage and improve an organization's
  cybersecurity posture. | 
 
  | Data Breach | Unauthorized access,
  acquisition, or disclosure of sensitive information. | 
 
  | Data
  Classification | Categorizing data
  based on sensitivity and importance to apply appropriate security controls. | 
 
  | Decryption | Reversing the
  encryption process to access the original data. | 
 
  | Denial of
  Service (DoS) Attack | Overloading a system
  with traffic to make it unavailable to users. | 
 
  | Digital
  Forensics | Investigation and
  analysis of digital evidence to identify and respond to cyber incidents. | 
 
  | Digital
  Signature | A cryptographic
  technique to validate the origin and integrity of a message or document. | 
 
  | Distributed
  Denial of Service (DDoS) Attack | Overwhelming a system
  with traffic from multiple sources to make it unavailable. | 
 
  | DNS (Domain
  Name System) Spoofing | Manipulating the DNS
  to redirect users to malicious websites. | 
 
  | Domain Name
  System (DNS) | A system translating
  domain names into IP addresses. | 
 
  | Eavesdropping | Unauthorized
  interception of private communication. | 
 
  | Edge
  Computing Security | Securing devices and
  data at the edge of a network. | 
 
  | Egress
  Filtering | Controlling outbound
  network traffic to prevent data leaks. | 
 
  | Encryption | The process of
  converting information into a code to prevent unauthorized access. | 
 
  | Endpoint
  Security | Protecting devices
  (endpoints) such as computers and smartphones from security threats. | 
 
  | Exploit | Taking advantage of a
  vulnerability to compromise a system. | 
 
  | File
  Integrity Monitoring (FIM) | Monitoring changes to
  files to detect unauthorized modifications. | 
 
  | Firewall | A network security
  device that monitors and controls incoming and outgoing network traffic. | 
 
  | Firmware | Software embedded in
  hardware, often used in device control. | 
 
  | Full Disk
  Encryption (FDE) | Encrypting the entire
  contents of a disk drive. | 
 
  | Gray Hat
  Hacker | Individuals who may
  perform hacking activities without malicious intent but without proper
  authorization. | 
 
  | Hacker | An individual with
  advanced computer skills who explores and exploits vulnerabilities. | 
 
  | Hashing | Converting data into
  a fixed-size string of characters (hash) for verification. | 
 
  | Honeypot | A system designed to
  attract and detect attackers by simulating vulnerabilities. | 
 
  | Hypervisor | Software that enables
  multiple operating systems to run on a single host. | 
 
  | Incident
  Response | The process of
  managing and mitigating the impact of a security incident. | 
 
  | Incident
  Response Plan (IRP) | A documented plan
  outlining the steps to take in response to a security incident. | 
 
  | Information
  Security | The practice of
  protecting information from unauthorized access, disclosure, disruption,
  modification, or destruction. | 
 
  | Insider
  Threat | Security risk posed
  by individuals within an organization. | 
 
  | Integrity | Maintaining the
  accuracy and reliability of information and systems. | 
 
  | Intrusion
  Detection System (IDS) | Monitors network or
  system activities for signs of malicious behavior. | 
 
  | Intrusion
  Prevention System (IPS) | Takes action to block
  or prevent detected malicious activities. | 
 
  | IP Spoofing | Faking an IP address
  to disguise the source of network traffic. | 
 
  | IT Security
  Policy | Documented guidelines
  for securing an organization's information technology. | 
 
  | Kerberos | A network
  authentication protocol for securing communications. | 
 
  | Keylogger | Malicious software
  that records keystrokes on a computer. | 
 
  | Least Common
  Mechanism | A security principle
  that suggests minimizing shared resources to reduce the risk of unauthorized
  access. | 
 
  | Least
  Privilege | Granting the minimum
  level of access necessary for a user or system to perform its functions. | 
 
  | Logical
  Access Controls | Controls restricting
  access to computer systems based on user credentials. | 
 
  | MAC Address
  (Media Access Control) | A unique identifier
  assigned to a network interface for communication. | 
 
  | Malware | Malicious software
  designed to harm or exploit computers or networks. | 
 
  | Man-in-the-Middle
  (MitM) Attack | Intercepting and
  possibly altering communication between two parties. | 
 
  | Managed
  Security Service Provider (MSSP) | A company providing
  outsourced security services. | 
 
  | Mobile Device
  Management (MDM) | Securing and managing
  mobile devices in an organization. | 
 
  | Multi-Factor
  Authentication (MFA) | Using more than one
  method of authentication for enhanced security. | 
 
  | Network
  Address Translation (NAT) | A technique that
  modifies network address information in packet headers while in transit. | 
 
  | Network
  Security | Measures to protect
  the integrity and confidentiality of data during transmission. | 
 
  | Network
  Segmentation | Dividing a network
  into segments to enhance security. | 
 
  | Non-Repudiation | The ability to prove
  the origin of a message or transaction. | 
 
  | Packet
  Filtering | Examining packets of
  data and deciding whether to forward or discard them. | 
 
  | Packet
  Sniffing | Intercepting and
  examining data packets on a network. | 
 
  | Patch | A software update
  designed to fix vulnerabilities or improve functionality. | 
 
  | Payload | The malicious part of
  code or data delivered by an exploit. | 
 
  | Penetration
  Testing | Simulating cyber
  attacks to identify and fix vulnerabilities in a system. | 
 
  | Perimeter
  Security | Controls protecting
  the boundary of a network. | 
 
  | Personal
  Identification Number (PIN) | A numeric code used
  for authentication. | 
 
  | Pharming | Redirecting website
  traffic to a fraudulent site through DNS manipulation. | 
 
  | Phishing | A fraudulent attempt
  to obtain sensitive information by pretending to be a trustworthy entity. | 
 
  | Ping Sweep | Scanning a range of
  IP addresses to discover live hosts. | 
 
  | Port Scanning | Probing a system for
  open ports to identify potential vulnerabilities. | 
 
  | Port Security | Measures to control
  access to network ports. | 
 
  | Privacy
  Impact Assessment (PIA) | Assessing the impact
  of a system on individual privacy. | 
 
  | Protocol | A set of rules
  governing the exchange of data in a network. | 
 
  | Proxy Server | An intermediary
  server that acts as a gateway between a user and the internet. | 
 
  | Public Key
  Infrastructure (PKI) | A system for managing
  digital keys and certificates. | 
 
  | Quarantine | Isolating potentially
  malicious files or systems to prevent further spread. | 
 
  | Rainbow Table | A precomputed table
  used for cracking password hashes. | 
 
  | Ransomware | Malware that encrypts
  files and demands payment for their release. | 
 
  | Red Team | Security
  professionals who simulate attacks to test an organization's defenses. | 
 
  | Remote
  Desktop Protocol (RDP) | A protocol for
  accessing the desktop of a remote computer. | 
 
  | Risk
  Assessment | Identifying and
  evaluating potential security risks to an organization. | 
 
  | Root Cause
  Analysis | Investigating the
  underlying cause of a security incident. | 
 
  | Rootkit | A type of malware
  that grants unauthorized access to a computer and often masks its existence | 
 
  | Router | A device connecting
  different networks and directing data traffic. | 
 
  | Secure File
  Transfer Protocol (SFTP) | A secure version of
  the File Transfer Protocol (FTP) that encrypts data. | 
 
  | Secure
  Sockets Layer (SSL) | A deprecated
  cryptographic protocol for secure communication. | 
 
  | Security
  Architecture | The design and
  structure of an organization's security measures. | 
 
  | Security
  Assessment and Testing | Evaluating the
  effectiveness of security controls through various methods like vulnerability
  assessments and penetration testing. | 
 
  | Security
  Awareness Training | Education for users
  to recognize and avoid security threats. | 
 
  | Security
  Baseline | The minimum level of
  security measures to protect a system. | 
 
  | Security
  Certificate | A digital document
  verifying the identity of a website or entity. | 
 
  | Security
  Controls | Measures to manage,
  prevent, detect, or correct security risks. | 
 
  | Security
  Governance | The framework that
  guides and oversees an organization's security efforts. | 
 
  | Security
  Incident | A violation or
  imminent threat of violation of computer security policies. | 
 
  | Security
  Information and Event Management (SIEM) | Collects and analyzes
  security data from multiple sources to detect and respond to threats. | 
 
  | Security
  Metrics | Quantitative and
  qualitative measurements used to assess the effectiveness of security
  measures. | 
 
  | Security
  Model | A framework that
  defines how security is implemented in a system or organization. | 
 
  | Security
  Operations Center (SOC) | A centralized team
  responsible for monitoring and responding to security incidents. | 
 
  | Security
  Policy | A set of rules and
  practices that define how an organization protects its information assets. | 
 
  | Security
  Token | A physical or virtual
  device that provides an additional layer of authentication. | 
 
  | Security
  Token Service (STS) | A service that issues
  security tokens for authentication and authorization. | 
 
  | Session
  Hijacking | Unauthorized
  interception of an active session to gain access. | 
 
  | Single Point
  of Failure (SPOF) | A component that, if
  it fails, will cause the entire system to fail. | 
 
  | Single
  Sign-On (SSO) | Allowing a user to
  access multiple systems with a single set of credentials. | 
 
  | Smishing | Phishing attacks
  conducted through SMS or text messages. | 
 
  | Social
  Engineering | Manipulating
  individuals to divulge confidential information or perform actions. | 
 
  | Software as a
  Service (SaaS) | Cloud-based software
  delivery model. | 
 
  | Software
  Development Life Cycle (SDLC) | The process of
  developing software from planning to maintenance. | 
 
  | Spear
  Phishing | Targeted phishing
  attacks directed at specific individuals. | 
 
  | Spoofing | Faking the source of
  an email, website, or network traffic to deceive users. | 
 
  | SQL Injection | Exploiting
  vulnerabilities in SQL databases to manipulate data. | 
 
  | SSL/TLS
  Encryption | Protocols for secure
  communication over the internet. | 
 
  | Symmetric
  Encryption | Using the same key
  for both encryption and decryption. | 
 
  | System
  Hardening | Configuring a system
  to reduce its vulnerability to security threats. | 
 
  | Threat Actor | An individual or
  group carrying out a cyber attack. | 
 
  | Threat
  Intelligence | Information about
  potential and current threats to help organizations defend against them. | 
 
  | Threat
  Modeling | Identifying and
  assessing potential threats to a system or organization. | 
 
  | Time-Based
  One-Time Password (TOTP) | A password that
  changes at regular intervals. | 
 
  | Tokenization | Replacing sensitive
  data with a token to enhance security. | 
 
  | Trojan Horse | Malware disguised as
  legitimate software to deceive users. | 
 
  | Trusted
  Platform Module (TPM) | A hardware-based
  security feature for storing cryptographic keys. | 
 
  | Virtual
  Private Network (VPN) | Establishes a secure
  connection over the internet to protect data in transit. | 
 
  | Virtualization
  Security | Securing virtualized
  environments to prevent attacks on virtual machines. | 
 
  | Virus | A type of malware
  that attaches itself to a file and spreads when the file is executed. | 
 
  | Vulnerability | Weakness in a system
  that can be exploited to compromise security. | 
 
  | Vulnerability
  Management | The continuous
  process of identifying, assessing, prioritizing, and mitigating
  vulnerabilities in a system. | 
 
  | War Driving | Searching for and
  exploiting vulnerable wireless networks. | 
 
  | Web
  Application Firewall (WAF) | Protects web
  applications from various security threats. | 
 
  | White Hat
  Hacker | Ethical hackers who
  use their skills to identify and fix security vulnerabilities. | 
 
  | Worm | A self-replicating
  type of malware that spreads across a network without human intervention. | 
 
  | WPA/WPA2
  (Wi-Fi Protected Access) | Security protocols
  for wireless networks. | 
 
  | Zero Trust
  Security Model | A security approach
  that assumes no trust, even inside the network, and requires verification
  from everyone. | 
 
  | Zero-Day
  Vulnerability | A security flaw in
  software that is exploited before the developer releases a fix. |