Security Glossary
A comprehensive glossary of cybersecurity and security awareness terms. Browse over 200 terms with clear definitions.
202 terms
Adware
malwareSoftware that automatically displays or downloads advertising material, often without the user's consent. While not alwa...
AI-Powered Phishing
phishingPhishing attacks that leverage artificial intelligence and large language models to generate highly convincing, personal...
Air Gap
generalA security measure that physically isolates a computer or network from unsecured networks, including the internet. Air-g...
Angler Phishing
phishingA social media-based phishing attack where criminals create fake customer support accounts to intercept complaints or in...
API Security
cloud-securityPractices and technologies for protecting application programming interfaces from abuse, data leaks, and attacks. API se...
ARP Spoofing
network-securityAn attack where an attacker sends falsified ARP messages to link their MAC address with the IP address of a legitimate d...
Attack Surface
generalThe total number of possible entry points where an unauthorized user can attempt to enter or extract data from a system....
Backdoor
malwareA hidden method of bypassing normal authentication or security controls to gain remote access to a system. Backdoors can...
Backup
data-protectionThe process of creating copies of data to protect against loss from hardware failure, ransomware, accidental deletion, o...
Baiting
social-engineeringA social engineering attack that uses a tempting offer or item to lure victims. This can involve leaving infected USB dr...
BGP Hijacking
network-securityAn attack where malicious actors announce illegitimate BGP routes to redirect internet traffic through their infrastruct...
Biometrics
authenticationAuthentication methods that use unique physical or behavioral characteristics such as fingerprints, facial recognition,...
Blue Team
generalThe defensive security team responsible for detecting, preventing, and responding to attacks. Blue teams monitor systems...
Botnet
malwareA network of compromised computers (bots or zombies) controlled remotely by an attacker. Botnets are used for DDoS attac...
Breach Notification
incident-responseThe legal requirement to inform affected individuals and regulatory authorities about a data breach within specified tim...
Brute Force Attack
authenticationAn attack method that systematically tries every possible combination of characters to crack passwords or encryption key...
Business Continuity Plan (BCP)
complianceA documented plan outlining how an organization will continue operating during and after a disruptive event. BCPs cover...
Business Email Compromise (BEC)
phishingA sophisticated scam targeting businesses that regularly perform wire transfers or handle sensitive data. Attackers comp...
Business Identity Theft
social-engineeringThe fraudulent use of a company's identity to obtain credit, goods, or services. Attackers may file fake documents, crea...
Callback Phishing
phishingA phishing technique where the email contains no malicious links or attachments but instead includes a phone number for...
CCPA
complianceCalifornia Consumer Privacy Act. A privacy law giving California residents rights over their personal data, including th...
Chain of Custody
incident-responseThe documented process of tracking digital evidence from collection through analysis and presentation, maintaining its i...
CIA Triad
generalThe three fundamental principles of information security: Confidentiality (preventing unauthorized access), Integrity (e...
Clone Phishing
phishingAn attack where a legitimate, previously delivered email is copied and resent with malicious modifications. The cloned e...
Cloud Access Security Broker (CASB)
cloud-securityA security solution that sits between cloud users and cloud applications to enforce security policies, monitor activity,...
Cloud Encryption
cloud-securityThe process of encrypting data before it is transferred to and stored in the cloud. Cloud encryption ensures data confid...
Cloud Misconfiguration
cloud-securityIncorrect or insecure settings in cloud services that expose data or resources to unauthorized access. Common misconfigu...
Cloud Security Posture Management (CSPM)
cloud-securityA category of tools that continuously monitor cloud infrastructure for misconfigurations, compliance violations, and sec...
Cloud Workload Protection
cloud-securitySecurity solutions designed to protect workloads running in cloud environments, including virtual machines, containers,...
Cloud-Native Security
cloud-securitySecurity approaches designed specifically for cloud-native architectures including microservices, containers, and orches...
Compliance
complianceThe practice of adhering to laws, regulations, industry standards, and internal policies related to information security...
Consent Phishing
phishingAn attack where victims are tricked into granting OAuth permissions to a malicious application. Instead of stealing pass...
Container Security
cloud-securitySecurity practices and tools for protecting containerized applications throughout their lifecycle, from image building t...
Credential Harvesting
phishingThe process of collecting usernames, passwords, and other authentication credentials through fake login pages, keylogger...
Credential Stuffing
authenticationAn automated attack that uses stolen username-password pairs from data breaches to attempt login on other services. This...
Cryptojacking
malwareThe unauthorized use of someone's computing resources to mine cryptocurrency. Cryptojacking malware runs silently in the...
Cyber Hygiene
generalThe basic practices and steps that users and organizations take on a regular basis to maintain system health and improve...
Cyber Insurance
complianceInsurance policies designed to cover financial losses from cyber incidents such as data breaches, ransomware attacks, an...
Cyber Kill Chain
generalA framework developed by Lockheed Martin that describes the stages of a cyberattack: reconnaissance, weaponization, deli...
Cyber Resilience
generalAn organization's ability to continuously deliver intended outcomes despite adverse cyber events. Cyber resilience combi...
Cyber Triage
incident-responseThe process of rapidly assessing and prioritizing security alerts and incidents based on severity, scope, and potential...
Data Breach
data-protectionAn incident where sensitive, protected, or confidential data is accessed, disclosed, or stolen by unauthorized individua...
Data Classification
data-protectionThe process of categorizing data based on its sensitivity level and the impact of unauthorized disclosure. Common classi...
Data Exfiltration
generalThe unauthorized transfer of data from within an organization to an external destination controlled by a threat actor. E...
Data Loss Prevention (DLP)
data-protectionTechnologies and strategies that detect and prevent unauthorized transmission of sensitive data outside the organization...
Data Masking
data-protectionThe process of replacing sensitive data with realistic but fictitious data to protect it during development, testing, or...
Data Minimization
data-protectionA privacy principle requiring organizations to collect and process only the minimum amount of personal data necessary fo...
Data Retention
data-protectionPolicies and practices governing how long data is stored before it is securely deleted. Data retention schedules must ba...
Data Sovereignty
data-protectionThe concept that data is subject to the laws and regulations of the country where it is stored or processed. Data sovere...
Deception Technology
generalAdvanced security solutions that deploy decoys, lures, and traps throughout the network to detect and misdirect attacker...
Deepfake
social-engineeringAI-generated synthetic media where a person's likeness is convincingly replaced with someone else's. Deepfakes are incre...
Defense in Depth
generalA layered security strategy that uses multiple defensive mechanisms so that if one control fails, others continue to pro...
Denial of Service (DoS)
network-securityAn attack designed to make a system, network, or service unavailable by overwhelming it with traffic or exploiting vulne...
Dictionary Attack
authenticationA password-cracking technique that uses a precompiled list of common words, phrases, and known passwords to attempt auth...
Digital Certificate
generalAn electronic document issued by a certificate authority that proves the ownership of a public key. Digital certificates...
Digital Forensics
incident-responseThe process of collecting, preserving, analyzing, and presenting digital evidence from computers, networks, and storage...
Digital Rights Management (DRM)
data-protectionTechnologies that control access to and usage of digital content and devices after sale. DRM restricts copying, sharing,...
Disaster Recovery
complianceThe process and strategies for restoring IT systems, data, and operations after a major disruption such as a cyberattack...
Distributed Denial of Service (DDoS)
network-securityAn attack that overwhelms a target system or network with traffic from multiple sources, making it unavailable to legiti...
DMARC
phishingDomain-based Message Authentication, Reporting, and Conformance. An email authentication policy built on SPF and DKIM th...
DNS over HTTPS (DoH)
network-securityA protocol that encrypts DNS queries by sending them over HTTPS connections. DoH prevents eavesdropping and manipulation...
DNS Tunneling
network-securityA technique that encodes data within DNS queries and responses to create a covert communication channel. Attackers use D...
Domain Name System (DNS)
network-securityThe internet's system for translating human-readable domain names into IP addresses. DNS is a critical infrastructure co...
DomainKeys Identified Mail (DKIM)
phishingAn email authentication method that uses cryptographic signatures to verify that an email was sent by an authorized serv...
Dropper
malwareA type of malware designed to deliver and install other malicious payloads onto a target system. Droppers often evade de...
Dumpster Diving
social-engineeringThe practice of searching through trash or recycling to find sensitive information such as discarded documents, printout...
Email Spoofing
phishingThe forgery of an email header so the message appears to originate from a trusted source. Email spoofing is used in phis...
Encryption
data-protectionThe process of converting plaintext data into an unreadable format (ciphertext) using mathematical algorithms and keys....
End-to-End Encryption (E2EE)
data-protectionA communication system where only the communicating parties can read the messages. Data is encrypted on the sender's dev...
Endpoint Detection and Response (EDR)
generalSecurity solutions that continuously monitor endpoint devices for suspicious activity, detect threats, and provide autom...
Evil Twin Attack
network-securityA rogue Wi-Fi access point that mimics a legitimate network to trick users into connecting. Once connected, the attacker...
Exploit
generalA piece of code, technique, or method that takes advantage of a vulnerability to compromise a system. Exploits can be de...
FIDO2
authenticationAn open authentication standard enabling passwordless and phishing-resistant login using hardware security keys or platf...
Fileless Malware
malwareMalware that operates entirely in memory without writing files to disk, making it harder to detect with traditional anti...
Firewall
network-securityA network security system that monitors and controls incoming and outgoing network traffic based on predetermined securi...
Hashing
data-protectionA one-way function that converts input data into a fixed-length string of characters. Unlike encryption, hashing cannot...
HIPAA
complianceHealth Insurance Portability and Accountability Act. A US law that establishes data protection standards for healthcare...
Homograph Attack
phishingA technique where attackers register domain names using characters from different scripts that look visually similar to...
Honey Trap
social-engineeringA social engineering technique where an attacker uses a romantic or attractive persona to lure a target into revealing c...
Honeypot
generalA decoy system designed to attract and detect attackers by mimicking real systems or services. Honeypots provide early w...
HTTPS
network-securityHypertext Transfer Protocol Secure. The encrypted version of HTTP that uses TLS to secure communications between web bro...
Identity and Access Management (IAM)
authenticationA framework of policies and technologies for managing digital identities and controlling access to resources. IAM ensure...
Identity Federation
cloud-securityA system that allows users to use the same credentials to access resources across multiple organizations or cloud servic...
Impersonation
social-engineeringThe act of pretending to be another person to deceive victims into trusting the attacker. In cybersecurity, impersonatio...
Incident Response Plan
incident-responseA documented set of procedures for detecting, responding to, and recovering from security incidents. An effective plan i...
Indicators of Compromise (IOC)
incident-responseObservable artifacts or evidence that indicate a system has been compromised or is under attack. IOCs include unusual ne...
Influence Operations
social-engineeringCoordinated efforts to manipulate public opinion, decision-making, or behavior using disinformation, propaganda, and soc...
Infostealer
malwareMalware specifically designed to extract sensitive information such as login credentials, browser cookies, credit card n...
Infrastructure as Code Security
cloud-securitySecurity practices for scanning and validating infrastructure definitions (Terraform, CloudFormation, Ansible) before de...
Insider Threat
social-engineeringA security risk that originates from within the organization, including current or former employees, contractors, or bus...
Intrusion Detection/Prevention System (IDS/IPS)
network-securityNetwork security tools that monitor traffic for suspicious activity. IDS detects and alerts on potential threats, while...
Invoice Fraud
phishingA scam where attackers send fake invoices or modify legitimate ones to redirect payments to their accounts. Often combin...
ISO 27001
complianceAn international standard for information security management systems (ISMS). ISO 27001 provides a systematic approach t...
Macro Malware
malwareMalware embedded in document macros, typically in Microsoft Office files. When the user enables macros, the malicious co...
Malware
malwareMalicious software designed to damage, disrupt, or gain unauthorized access to computer systems. Malware includes viruse...
Malware Analysis
incident-responseThe process of studying malware to understand its functionality, origin, and impact. Static analysis examines code witho...
Man-in-the-Middle Attack (MITM)
network-securityAn attack where the attacker secretly intercepts and potentially alters communications between two parties who believe t...
Mean Time to Detect (MTTD)
incident-responseA key metric measuring the average time it takes to discover a security incident or breach after it occurs. Lower MTTD v...
Mean Time to Respond (MTTR)
incident-responseA metric measuring the average time from detecting a security incident to fully containing and remediating it. MTTR is a...
MFA Fatigue Attack
phishingAn attack where the adversary repeatedly triggers MFA push notifications to the target's device, hoping the user will ev...
MITRE ATT&CK
generalA globally accessible knowledge base of adversary tactics, techniques, and procedures based on real-world observations....
Multi-Cloud Security
cloud-securitySecurity strategies and tools for consistently protecting workloads, data, and identities across multiple cloud service...
Multi-Factor Authentication (MFA)
authenticationA security mechanism requiring two or more independent forms of verification to confirm identity. Factors include someth...
Network Access Control (NAC)
network-securityA security solution that enforces policies for devices connecting to a network by checking compliance with security requ...
Network Segmentation
network-securityThe practice of dividing a network into smaller, isolated segments to limit the spread of attacks and control access bet...
NIS2 Directive
complianceThe updated EU directive on Network and Information Security establishing cybersecurity requirements for essential and i...
NIST Cybersecurity Framework
complianceA voluntary framework published by the National Institute of Standards and Technology providing guidelines for organizat...
Packet Sniffing
network-securityThe practice of capturing and analyzing network packets as they travel across a network. While legitimate for network tr...
Pass-the-Hash
authenticationAn attack technique where an attacker captures a password hash and uses it directly to authenticate without knowing the...
Password Manager
authenticationSoftware that securely stores and manages passwords in an encrypted vault. Password managers generate strong unique pass...
Passwordless Authentication
authenticationAuthentication methods that verify user identity without traditional passwords, using methods like biometrics, security...
Patch Management
generalThe process of acquiring, testing, and deploying software updates (patches) to fix vulnerabilities and improve functiona...
PCI DSS
compliancePayment Card Industry Data Security Standard. A set of security requirements for organizations that handle credit card d...
Penetration Testing
complianceAn authorized simulated cyberattack performed to evaluate the security of a system by actively exploiting vulnerabilitie...
Pharming
phishingA cyberattack that redirects website traffic from legitimate sites to fraudulent ones by poisoning DNS records or modify...
Phishing
phishingA cyberattack that uses fraudulent emails, text messages, or websites to trick people into revealing sensitive informati...
Phishing Simulation
generalA security training exercise that sends simulated phishing emails to employees to test their ability to recognize and re...
Piggybacking
social-engineeringSimilar to tailgating but with the authorized person's knowledge and consent. An unauthorized individual follows an empl...
Polymorphic Malware
malwareMalware that changes its code or signature each time it replicates, making it difficult to detect with signature-based a...
Port Scanning
network-securityThe process of probing a server or host for open ports to identify available services and potential vulnerabilities. Whi...
Post-Incident Review
incident-responseA structured analysis conducted after a security incident to identify root causes, evaluate response effectiveness, docu...
Pretexting
social-engineeringA social engineering technique where the attacker creates a fabricated scenario (pretext) to manipulate the victim into...
Principle of Least Privilege
generalA security principle stating that users and systems should only be granted the minimum permissions necessary to perform...
Privacy by Design
data-protectionAn approach that integrates privacy considerations into the design and development of systems, processes, and products f...
Privileged Access Management (PAM)
authenticationA set of strategies and technologies for controlling, monitoring, and securing elevated access rights to critical system...
Proxy Server
network-securityAn intermediary server that sits between a client and destination server, forwarding requests on behalf of the client. P...
Pseudonymization
data-protectionA data protection technique that replaces identifying information with artificial identifiers (pseudonyms) while maintai...
Public Key Infrastructure (PKI)
generalA framework of policies, hardware, software, and procedures for creating, managing, distributing, and revoking digital c...
Purple Team
generalA collaborative approach where red team (offense) and blue team (defense) work together to improve an organization's sec...
QR Code Phishing (Quishing)
phishingA phishing technique that uses QR codes to direct victims to malicious websites. QR codes in emails bypass link-scanning...
Quid Pro Quo
social-engineeringA social engineering attack where the attacker offers something in exchange for information or access. Common examples i...
Rainbow Table
authenticationA precomputed table of password hashes used to reverse hash functions and recover plaintext passwords. Rainbow tables tr...
Ransomware
malwareMalware that encrypts victim files or locks systems and demands a ransom payment for decryption. Modern ransomware group...
Ransomware-as-a-Service (RaaS)
malwareA business model where ransomware developers sell or lease their malware toolkits to affiliates who carry out attacks. R...
Red Team
generalA group of security professionals who simulate real-world attacks against an organization to test its security defenses....
Remote Access Trojan (RAT)
malwareMalware that provides an attacker with full remote control over a victim's computer. RATs can capture screenshots, recor...
Reverse Social Engineering
social-engineeringA technique where the attacker creates a situation that causes the victim to seek help, then positions themselves as the...
Right to be Forgotten
data-protectionA GDPR right allowing individuals to request the deletion of their personal data when it is no longer necessary for its...
Risk Assessment
complianceThe systematic process of identifying, analyzing, and evaluating security risks to an organization's assets. Risk assess...
Rootkit
malwareA collection of tools that provides privileged access to a computer while hiding its presence from the operating system...
SAML
authenticationSecurity Assertion Markup Language. An XML-based standard for exchanging authentication and authorization data between i...
Sandboxing
generalA security technique that isolates untrusted programs or code in a restricted environment (sandbox) to observe their beh...
Scareware
malwareSoftware that uses fear tactics to trick users into purchasing unnecessary or harmful software. Common examples include...
Search Engine Poisoning
phishingManipulating search engine results to place malicious websites at the top of search results for popular queries. Victims...
Secrets Management
cloud-securityThe practice of securely storing, accessing, and managing sensitive credentials such as API keys, tokens, passwords, and...
Secure Access Service Edge (SASE)
cloud-securityA cloud-delivered framework that converges network and security functions including SD-WAN, CASB, firewall-as-a-service,...
Security Audit
complianceA systematic evaluation of an organization's information security controls, policies, and procedures to assess their eff...
Security Awareness
generalThe knowledge and attitude employees possess regarding the protection of organizational assets from cyber threats. Secur...
Security Awareness Training
generalStructured educational programs designed to teach employees about cybersecurity threats and safe practices. Effective pr...
Security by Design
generalAn approach to software and systems development that integrates security considerations at every stage of the design and...
Security Information and Event Management (SIEM)
incident-responseA solution that aggregates and analyzes security log data from across an organization's IT infrastructure to detect thre...
Security Operations (SecOps)
generalThe practice of combining security and IT operations teams to improve collaboration and reduce risks. SecOps integrates...
Security Operations Center (SOC)
incident-responseA centralized unit that monitors, detects, investigates, and responds to cybersecurity incidents around the clock. SOC t...
Security Orchestration, Automation and Response (SOAR)
incident-responseA platform that combines security orchestration, automation, and incident response to help security teams manage and res...
Security Policy
complianceA formal document that defines an organization's approach to information security, including acceptable use, access cont...
Sender Policy Framework (SPF)
phishingAn email authentication protocol that allows domain owners to specify which mail servers are authorized to send emails o...
Serverless Security
cloud-securitySecurity considerations and practices specific to serverless computing environments like AWS Lambda, Azure Functions, an...
Session Hijacking
authenticationAn attack where an attacker takes over a valid user session by stealing or predicting the session token. This allows the...
Shadow IT
generalIT systems, software, or cloud services used within an organization without explicit approval from the IT department. Sh...
Shared Responsibility Model
cloud-securityA framework defining security responsibilities between a cloud service provider and its customers. The provider secures...
Shoulder Surfing
social-engineeringThe practice of spying on someone's screen, keyboard, or documents to obtain sensitive information such as passwords, PI...
Single Sign-On (SSO)
authenticationAn authentication method that allows users to access multiple applications with a single set of credentials. SSO reduces...
Smishing
phishingSMS phishing that uses text messages to lure victims into clicking malicious links or providing sensitive information. M...
SOC 2
complianceA compliance framework developed by AICPA that evaluates an organization's controls related to security, availability, p...
Social Engineering
social-engineeringThe psychological manipulation of people into performing actions or divulging confidential information. Social engineeri...
Spear Phishing
phishingA targeted phishing attack directed at specific individuals or organizations. Unlike generic phishing, spear phishing us...
Spyware
malwareSoftware that secretly monitors user activity and collects information without consent. Spyware can capture keystrokes,...
SSL Stripping
network-securityA man-in-the-middle attack that downgrades a secure HTTPS connection to unencrypted HTTP, allowing the attacker to inter...
Supply Chain Attack
generalAn attack that targets an organization by compromising a trusted third-party vendor, supplier, or software component in...
Tabletop Exercise
incident-responseA discussion-based exercise where key personnel walk through a simulated security incident scenario without actually act...
Tailgating
social-engineeringA physical security breach where an unauthorized person follows an authorized individual through a secured entrance with...
Third-Party Risk Management
complianceThe process of identifying, assessing, and mitigating security risks posed by vendors, suppliers, and partners who have...
Threat Actor
generalAn individual, group, or nation-state that conducts cyberattacks. Threat actors are categorized by motivation: cybercrim...
Threat Hunting
incident-responseThe proactive process of searching for cyber threats that have evaded existing security controls. Threat hunters use hyp...
Threat Intelligence
incident-responseEvidence-based knowledge about existing or emerging cyber threats, including context, mechanisms, indicators, and action...
Threat Modeling
generalA structured process for identifying potential threats, vulnerabilities, and attack vectors in a system, and determining...
TLS/SSL
network-securityTransport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL) are cryptographic protocols that provide s...
Tokenization
data-protectionThe process of replacing sensitive data with non-sensitive tokens that map back to the original data through a secure to...
Trojan
malwareMalware disguised as legitimate software that appears harmless but performs malicious actions when executed. Trojans oft...
Two-Factor Authentication (2FA)
authenticationA subset of multi-factor authentication that requires exactly two different authentication factors to verify identity. C...
Typosquatting
phishingRegistering domain names that are common misspellings of popular websites to capture traffic from users who mistype URLs...
Virtual Private Network (VPN)
network-securityA technology that creates an encrypted tunnel between a device and a network, protecting data in transit from intercepti...
Virus
malwareA type of malware that attaches itself to legitimate programs or files and replicates when the infected program is execu...
Vishing
phishingVoice phishing conducted over phone calls or voice messages. Attackers impersonate banks, government agencies, or tech s...
Voice Cloning
social-engineeringThe use of AI to create a synthetic replica of a person's voice from audio samples. Voice cloning is increasingly used i...
Vulnerability
generalA weakness in a system, application, or process that can be exploited by a threat actor to gain unauthorized access or c...
Vulnerability Assessment
complianceA systematic review of security weaknesses in a system or network. Unlike penetration testing, vulnerability assessments...
Vulnerability Disclosure
incident-responseThe process of reporting discovered security vulnerabilities to the affected vendor or organization. Responsible disclos...
War Room
incident-responseA dedicated physical or virtual space where the incident response team assembles during an active security incident for...
Watering Hole Attack
social-engineeringAn attack strategy where attackers compromise websites frequently visited by a specific target group. When group members...
Whaling
phishingA spear phishing attack specifically targeting high-ranking executives such as CEOs, CFOs, or board members. These attac...
Wiper Malware
malwareDestructive malware designed to permanently erase or corrupt data on target systems, rendering them inoperable. Unlike r...
Worm
malwareSelf-replicating malware that spreads across networks without requiring user interaction or a host program. Worms exploi...
Zero Trust
authenticationA security model based on the principle of never trust, always verify. Zero trust requires strict identity verification...
Zero Trust Network Access (ZTNA)
cloud-securityA security framework that provides remote access to applications based on defined access control policies without placin...
Zero-Day
generalA previously unknown vulnerability that is exploited before the software vendor is aware of it or has released a patch....