Name
|
Definition
|
| Access
Control |
The process of
regulating who or what can access resources in a computing environment. |
| Accounting |
Logging and
monitoring user activities to track and analyze system access. |
| Adware |
Unwanted software
that displays advertising on a computer. |
| Antivirus
(AV) |
Software designed to
detect and remove malicious software (malware) from a computer. |
| Audit Trail |
A record of events in
a system to facilitate analysis and investigation. |
| Authentication |
Verifying the
identity of a user, system, or entity. |
| Authorization |
Granting or denying
access rights and permissions based on the authenticated identity. |
| Availability |
Ensuring that
information and systems are accessible and usable when needed. |
| Backdoor |
A hidden method of
bypassing normal authentication or encryption in a computer system. |
| Biometric
Authentication |
Using physical or
behavioral characteristics (e.g., fingerprints, retina scans) to verify
identity. |
| Botnet |
A network of
compromised computers controlled by a single entity for malicious purposes. |
| Brute Force
Attack |
A method of trying
all possible combinations to crack a password or encryption key. |
| Business
Impact Analysis |
A process that
identifies and assesses the potential effects of disruptions to critical
business operations. |
| Chain of
Custody |
The chronological
documentation and control of evidence to maintain its integrity in legal
proceedings. |
| Clean Desk
Policy |
A security measure
that requires employees to keep desks clear of sensitive information when not
in use. |
| Cloud
Security |
Measures to protect
data, applications, and infrastructure in cloud computing environments. |
| Confidentiality |
Ensuring that
information is only accessible to those who have the proper authorization. |
| Cross-Site
Request Forgery (CSRF) |
A type of attack
where a user is tricked into performing an action they did not intend. |
| Cross-Site
Scripting (XSS) |
Injecting malicious
scripts into web pages viewed by other users. |
| Cryptographic
Hash Function |
A mathematical
algorithm that converts data into a fixed-size string of characters, often
used for data integrity verification. |
| Cryptography |
Involves mathematical
and computational techniques to secure information and enable secure
communication between parties. |
| Cybersecurity
Framework |
A set of best
practices and guidelines to manage and improve an organization's
cybersecurity posture. |
| Data Breach |
Unauthorized access,
acquisition, or disclosure of sensitive information. |
| Data
Classification |
Categorizing data
based on sensitivity and importance to apply appropriate security controls. |
| Decryption |
Reversing the
encryption process to access the original data. |
| Denial of
Service (DoS) Attack |
Overloading a system
with traffic to make it unavailable to users. |
| Digital
Forensics |
Investigation and
analysis of digital evidence to identify and respond to cyber incidents. |
| Digital
Signature |
A cryptographic
technique to validate the origin and integrity of a message or document. |
| Distributed
Denial of Service (DDoS) Attack |
Overwhelming a system
with traffic from multiple sources to make it unavailable. |
| DNS (Domain
Name System) Spoofing |
Manipulating the DNS
to redirect users to malicious websites. |
| Domain Name
System (DNS) |
A system translating
domain names into IP addresses. |
| Eavesdropping |
Unauthorized
interception of private communication. |
| Edge
Computing Security |
Securing devices and
data at the edge of a network. |
| Egress
Filtering |
Controlling outbound
network traffic to prevent data leaks. |
| Encryption |
The process of
converting information into a code to prevent unauthorized access. |
| Endpoint
Security |
Protecting devices
(endpoints) such as computers and smartphones from security threats. |
| Exploit |
Taking advantage of a
vulnerability to compromise a system. |
| File
Integrity Monitoring (FIM) |
Monitoring changes to
files to detect unauthorized modifications. |
| Firewall |
A network security
device that monitors and controls incoming and outgoing network traffic. |
| Firmware |
Software embedded in
hardware, often used in device control. |
| Full Disk
Encryption (FDE) |
Encrypting the entire
contents of a disk drive. |
| Gray Hat
Hacker |
Individuals who may
perform hacking activities without malicious intent but without proper
authorization. |
| Hacker |
An individual with
advanced computer skills who explores and exploits vulnerabilities. |
| Hashing |
Converting data into
a fixed-size string of characters (hash) for verification. |
| Honeypot |
A system designed to
attract and detect attackers by simulating vulnerabilities. |
| Hypervisor |
Software that enables
multiple operating systems to run on a single host. |
| Incident
Response |
The process of
managing and mitigating the impact of a security incident. |
| Incident
Response Plan (IRP) |
A documented plan
outlining the steps to take in response to a security incident. |
| Information
Security |
The practice of
protecting information from unauthorized access, disclosure, disruption,
modification, or destruction. |
| Insider
Threat |
Security risk posed
by individuals within an organization. |
| Integrity |
Maintaining the
accuracy and reliability of information and systems. |
| Intrusion
Detection System (IDS) |
Monitors network or
system activities for signs of malicious behavior. |
| Intrusion
Prevention System (IPS) |
Takes action to block
or prevent detected malicious activities. |
| IP Spoofing |
Faking an IP address
to disguise the source of network traffic. |
| IT Security
Policy |
Documented guidelines
for securing an organization's information technology. |
| Kerberos |
A network
authentication protocol for securing communications. |
| Keylogger |
Malicious software
that records keystrokes on a computer. |
| Least Common
Mechanism |
A security principle
that suggests minimizing shared resources to reduce the risk of unauthorized
access. |
| Least
Privilege |
Granting the minimum
level of access necessary for a user or system to perform its functions. |
| Logical
Access Controls |
Controls restricting
access to computer systems based on user credentials. |
| MAC Address
(Media Access Control) |
A unique identifier
assigned to a network interface for communication. |
| Malware |
Malicious software
designed to harm or exploit computers or networks. |
| Man-in-the-Middle
(MitM) Attack |
Intercepting and
possibly altering communication between two parties. |
| Managed
Security Service Provider (MSSP) |
A company providing
outsourced security services. |
| Mobile Device
Management (MDM) |
Securing and managing
mobile devices in an organization. |
| Multi-Factor
Authentication (MFA) |
Using more than one
method of authentication for enhanced security. |
| Network
Address Translation (NAT) |
A technique that
modifies network address information in packet headers while in transit. |
| Network
Security |
Measures to protect
the integrity and confidentiality of data during transmission. |
| Network
Segmentation |
Dividing a network
into segments to enhance security. |
| Non-Repudiation |
The ability to prove
the origin of a message or transaction. |
| Packet
Filtering |
Examining packets of
data and deciding whether to forward or discard them. |
| Packet
Sniffing |
Intercepting and
examining data packets on a network. |
| Patch |
A software update
designed to fix vulnerabilities or improve functionality. |
| Payload |
The malicious part of
code or data delivered by an exploit. |
| Penetration
Testing |
Simulating cyber
attacks to identify and fix vulnerabilities in a system. |
| Perimeter
Security |
Controls protecting
the boundary of a network. |
| Personal
Identification Number (PIN) |
A numeric code used
for authentication. |
| Pharming |
Redirecting website
traffic to a fraudulent site through DNS manipulation. |
| Phishing |
A fraudulent attempt
to obtain sensitive information by pretending to be a trustworthy entity. |
| Ping Sweep |
Scanning a range of
IP addresses to discover live hosts. |
| Port Scanning |
Probing a system for
open ports to identify potential vulnerabilities. |
| Port Security |
Measures to control
access to network ports. |
| Privacy
Impact Assessment (PIA) |
Assessing the impact
of a system on individual privacy. |
| Protocol |
A set of rules
governing the exchange of data in a network. |
| Proxy Server |
An intermediary
server that acts as a gateway between a user and the internet. |
| Public Key
Infrastructure (PKI) |
A system for managing
digital keys and certificates. |
| Quarantine |
Isolating potentially
malicious files or systems to prevent further spread. |
| Rainbow Table |
A precomputed table
used for cracking password hashes. |
| Ransomware |
Malware that encrypts
files and demands payment for their release. |
| Red Team |
Security
professionals who simulate attacks to test an organization's defenses. |
| Remote
Desktop Protocol (RDP) |
A protocol for
accessing the desktop of a remote computer. |
| Risk
Assessment |
Identifying and
evaluating potential security risks to an organization. |
| Root Cause
Analysis |
Investigating the
underlying cause of a security incident. |
| Rootkit |
A type of malware
that grants unauthorized access to a computer and often masks its existence |
| Router |
A device connecting
different networks and directing data traffic. |
| Secure File
Transfer Protocol (SFTP) |
A secure version of
the File Transfer Protocol (FTP) that encrypts data. |
| Secure
Sockets Layer (SSL) |
A deprecated
cryptographic protocol for secure communication. |
| Security
Architecture |
The design and
structure of an organization's security measures. |
| Security
Assessment and Testing |
Evaluating the
effectiveness of security controls through various methods like vulnerability
assessments and penetration testing. |
| Security
Awareness Training |
Education for users
to recognize and avoid security threats. |
| Security
Baseline |
The minimum level of
security measures to protect a system. |
| Security
Certificate |
A digital document
verifying the identity of a website or entity. |
| Security
Controls |
Measures to manage,
prevent, detect, or correct security risks. |
| Security
Governance |
The framework that
guides and oversees an organization's security efforts. |
| Security
Incident |
A violation or
imminent threat of violation of computer security policies. |
| Security
Information and Event Management (SIEM) |
Collects and analyzes
security data from multiple sources to detect and respond to threats. |
| Security
Metrics |
Quantitative and
qualitative measurements used to assess the effectiveness of security
measures. |
| Security
Model |
A framework that
defines how security is implemented in a system or organization. |
| Security
Operations Center (SOC) |
A centralized team
responsible for monitoring and responding to security incidents. |
| Security
Policy |
A set of rules and
practices that define how an organization protects its information assets. |
| Security
Token |
A physical or virtual
device that provides an additional layer of authentication. |
| Security
Token Service (STS) |
A service that issues
security tokens for authentication and authorization. |
| Session
Hijacking |
Unauthorized
interception of an active session to gain access. |
| Single Point
of Failure (SPOF) |
A component that, if
it fails, will cause the entire system to fail. |
| Single
Sign-On (SSO) |
Allowing a user to
access multiple systems with a single set of credentials. |
| Smishing |
Phishing attacks
conducted through SMS or text messages. |
| Social
Engineering |
Manipulating
individuals to divulge confidential information or perform actions. |
| Software as a
Service (SaaS) |
Cloud-based software
delivery model. |
| Software
Development Life Cycle (SDLC) |
The process of
developing software from planning to maintenance. |
| Spear
Phishing |
Targeted phishing
attacks directed at specific individuals. |
| Spoofing |
Faking the source of
an email, website, or network traffic to deceive users. |
| SQL Injection |
Exploiting
vulnerabilities in SQL databases to manipulate data. |
| SSL/TLS
Encryption |
Protocols for secure
communication over the internet. |
| Symmetric
Encryption |
Using the same key
for both encryption and decryption. |
| System
Hardening |
Configuring a system
to reduce its vulnerability to security threats. |
| Threat Actor |
An individual or
group carrying out a cyber attack. |
| Threat
Intelligence |
Information about
potential and current threats to help organizations defend against them. |
| Threat
Modeling |
Identifying and
assessing potential threats to a system or organization. |
| Time-Based
One-Time Password (TOTP) |
A password that
changes at regular intervals. |
| Tokenization |
Replacing sensitive
data with a token to enhance security. |
| Trojan Horse |
Malware disguised as
legitimate software to deceive users. |
| Trusted
Platform Module (TPM) |
A hardware-based
security feature for storing cryptographic keys. |
| Virtual
Private Network (VPN) |
Establishes a secure
connection over the internet to protect data in transit. |
| Virtualization
Security |
Securing virtualized
environments to prevent attacks on virtual machines. |
| Virus |
A type of malware
that attaches itself to a file and spreads when the file is executed. |
| Vulnerability |
Weakness in a system
that can be exploited to compromise security. |
| Vulnerability
Management |
The continuous
process of identifying, assessing, prioritizing, and mitigating
vulnerabilities in a system. |
| War Driving |
Searching for and
exploiting vulnerable wireless networks. |
| Web
Application Firewall (WAF) |
Protects web
applications from various security threats. |
| White Hat
Hacker |
Ethical hackers who
use their skills to identify and fix security vulnerabilities. |
| Worm |
A self-replicating
type of malware that spreads across a network without human intervention. |
| WPA/WPA2
(Wi-Fi Protected Access) |
Security protocols
for wireless networks. |
| Zero Trust
Security Model |
A security approach
that assumes no trust, even inside the network, and requires verification
from everyone. |
| Zero-Day
Vulnerability |
A security flaw in
software that is exploited before the developer releases a fix. |