Security Glossary

A comprehensive glossary of cybersecurity and security awareness terms. Browse over 200 terms with clear definitions.

202 terms

A
B

Backdoor

malware

A hidden method of bypassing normal authentication or security controls to gain remote access to a system. Backdoors can...

Backup

data-protection

The process of creating copies of data to protect against loss from hardware failure, ransomware, accidental deletion, o...

Baiting

social-engineering

A social engineering attack that uses a tempting offer or item to lure victims. This can involve leaving infected USB dr...

BGP Hijacking

network-security

An attack where malicious actors announce illegitimate BGP routes to redirect internet traffic through their infrastruct...

Biometrics

authentication

Authentication methods that use unique physical or behavioral characteristics such as fingerprints, facial recognition,...

Blue Team

general

The defensive security team responsible for detecting, preventing, and responding to attacks. Blue teams monitor systems...

Botnet

malware

A network of compromised computers (bots or zombies) controlled remotely by an attacker. Botnets are used for DDoS attac...

Breach Notification

incident-response

The legal requirement to inform affected individuals and regulatory authorities about a data breach within specified tim...

Brute Force Attack

authentication

An attack method that systematically tries every possible combination of characters to crack passwords or encryption key...

Business Continuity Plan (BCP)

compliance

A documented plan outlining how an organization will continue operating during and after a disruptive event. BCPs cover...

Business Email Compromise (BEC)

phishing

A sophisticated scam targeting businesses that regularly perform wire transfers or handle sensitive data. Attackers comp...

Business Identity Theft

social-engineering

The fraudulent use of a company's identity to obtain credit, goods, or services. Attackers may file fake documents, crea...

C

Callback Phishing

phishing

A phishing technique where the email contains no malicious links or attachments but instead includes a phone number for...

CCPA

compliance

California Consumer Privacy Act. A privacy law giving California residents rights over their personal data, including th...

Chain of Custody

incident-response

The documented process of tracking digital evidence from collection through analysis and presentation, maintaining its i...

CIA Triad

general

The three fundamental principles of information security: Confidentiality (preventing unauthorized access), Integrity (e...

Clone Phishing

phishing

An attack where a legitimate, previously delivered email is copied and resent with malicious modifications. The cloned e...

Cloud Access Security Broker (CASB)

cloud-security

A security solution that sits between cloud users and cloud applications to enforce security policies, monitor activity,...

Cloud Encryption

cloud-security

The process of encrypting data before it is transferred to and stored in the cloud. Cloud encryption ensures data confid...

Cloud Misconfiguration

cloud-security

Incorrect or insecure settings in cloud services that expose data or resources to unauthorized access. Common misconfigu...

Cloud Security Posture Management (CSPM)

cloud-security

A category of tools that continuously monitor cloud infrastructure for misconfigurations, compliance violations, and sec...

Cloud Workload Protection

cloud-security

Security solutions designed to protect workloads running in cloud environments, including virtual machines, containers,...

Cloud-Native Security

cloud-security

Security approaches designed specifically for cloud-native architectures including microservices, containers, and orches...

Compliance

compliance

The practice of adhering to laws, regulations, industry standards, and internal policies related to information security...

Consent Phishing

phishing

An attack where victims are tricked into granting OAuth permissions to a malicious application. Instead of stealing pass...

Container Security

cloud-security

Security practices and tools for protecting containerized applications throughout their lifecycle, from image building t...

Credential Harvesting

phishing

The process of collecting usernames, passwords, and other authentication credentials through fake login pages, keylogger...

Credential Stuffing

authentication

An automated attack that uses stolen username-password pairs from data breaches to attempt login on other services. This...

Cryptojacking

malware

The unauthorized use of someone's computing resources to mine cryptocurrency. Cryptojacking malware runs silently in the...

Cyber Hygiene

general

The basic practices and steps that users and organizations take on a regular basis to maintain system health and improve...

Cyber Insurance

compliance

Insurance policies designed to cover financial losses from cyber incidents such as data breaches, ransomware attacks, an...

Cyber Kill Chain

general

A framework developed by Lockheed Martin that describes the stages of a cyberattack: reconnaissance, weaponization, deli...

Cyber Resilience

general

An organization's ability to continuously deliver intended outcomes despite adverse cyber events. Cyber resilience combi...

Cyber Triage

incident-response

The process of rapidly assessing and prioritizing security alerts and incidents based on severity, scope, and potential...

D

Data Breach

data-protection

An incident where sensitive, protected, or confidential data is accessed, disclosed, or stolen by unauthorized individua...

Data Classification

data-protection

The process of categorizing data based on its sensitivity level and the impact of unauthorized disclosure. Common classi...

Data Exfiltration

general

The unauthorized transfer of data from within an organization to an external destination controlled by a threat actor. E...

Data Loss Prevention (DLP)

data-protection

Technologies and strategies that detect and prevent unauthorized transmission of sensitive data outside the organization...

Data Masking

data-protection

The process of replacing sensitive data with realistic but fictitious data to protect it during development, testing, or...

Data Minimization

data-protection

A privacy principle requiring organizations to collect and process only the minimum amount of personal data necessary fo...

Data Retention

data-protection

Policies and practices governing how long data is stored before it is securely deleted. Data retention schedules must ba...

Data Sovereignty

data-protection

The concept that data is subject to the laws and regulations of the country where it is stored or processed. Data sovere...

Deception Technology

general

Advanced security solutions that deploy decoys, lures, and traps throughout the network to detect and misdirect attacker...

Deepfake

social-engineering

AI-generated synthetic media where a person's likeness is convincingly replaced with someone else's. Deepfakes are incre...

Defense in Depth

general

A layered security strategy that uses multiple defensive mechanisms so that if one control fails, others continue to pro...

Denial of Service (DoS)

network-security

An attack designed to make a system, network, or service unavailable by overwhelming it with traffic or exploiting vulne...

Dictionary Attack

authentication

A password-cracking technique that uses a precompiled list of common words, phrases, and known passwords to attempt auth...

Digital Certificate

general

An electronic document issued by a certificate authority that proves the ownership of a public key. Digital certificates...

Digital Forensics

incident-response

The process of collecting, preserving, analyzing, and presenting digital evidence from computers, networks, and storage...

Digital Rights Management (DRM)

data-protection

Technologies that control access to and usage of digital content and devices after sale. DRM restricts copying, sharing,...

Disaster Recovery

compliance

The process and strategies for restoring IT systems, data, and operations after a major disruption such as a cyberattack...

Distributed Denial of Service (DDoS)

network-security

An attack that overwhelms a target system or network with traffic from multiple sources, making it unavailable to legiti...

DMARC

phishing

Domain-based Message Authentication, Reporting, and Conformance. An email authentication policy built on SPF and DKIM th...

DNS over HTTPS (DoH)

network-security

A protocol that encrypts DNS queries by sending them over HTTPS connections. DoH prevents eavesdropping and manipulation...

DNS Tunneling

network-security

A technique that encodes data within DNS queries and responses to create a covert communication channel. Attackers use D...

Domain Name System (DNS)

network-security

The internet's system for translating human-readable domain names into IP addresses. DNS is a critical infrastructure co...

DomainKeys Identified Mail (DKIM)

phishing

An email authentication method that uses cryptographic signatures to verify that an email was sent by an authorized serv...

Dropper

malware

A type of malware designed to deliver and install other malicious payloads onto a target system. Droppers often evade de...

Dumpster Diving

social-engineering

The practice of searching through trash or recycling to find sensitive information such as discarded documents, printout...

E
F
G
H
I

Identity and Access Management (IAM)

authentication

A framework of policies and technologies for managing digital identities and controlling access to resources. IAM ensure...

Identity Federation

cloud-security

A system that allows users to use the same credentials to access resources across multiple organizations or cloud servic...

Impersonation

social-engineering

The act of pretending to be another person to deceive victims into trusting the attacker. In cybersecurity, impersonatio...

Incident Response Plan

incident-response

A documented set of procedures for detecting, responding to, and recovering from security incidents. An effective plan i...

Indicators of Compromise (IOC)

incident-response

Observable artifacts or evidence that indicate a system has been compromised or is under attack. IOCs include unusual ne...

Influence Operations

social-engineering

Coordinated efforts to manipulate public opinion, decision-making, or behavior using disinformation, propaganda, and soc...

Infostealer

malware

Malware specifically designed to extract sensitive information such as login credentials, browser cookies, credit card n...

Infrastructure as Code Security

cloud-security

Security practices for scanning and validating infrastructure definitions (Terraform, CloudFormation, Ansible) before de...

Insider Threat

social-engineering

A security risk that originates from within the organization, including current or former employees, contractors, or bus...

Intrusion Detection/Prevention System (IDS/IPS)

network-security

Network security tools that monitor traffic for suspicious activity. IDS detects and alerts on potential threats, while...

Invoice Fraud

phishing

A scam where attackers send fake invoices or modify legitimate ones to redirect payments to their accounts. Often combin...

ISO 27001

compliance

An international standard for information security management systems (ISMS). ISO 27001 provides a systematic approach t...

K
L
M

Macro Malware

malware

Malware embedded in document macros, typically in Microsoft Office files. When the user enables macros, the malicious co...

Malware

malware

Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. Malware includes viruse...

Malware Analysis

incident-response

The process of studying malware to understand its functionality, origin, and impact. Static analysis examines code witho...

Man-in-the-Middle Attack (MITM)

network-security

An attack where the attacker secretly intercepts and potentially alters communications between two parties who believe t...

Mean Time to Detect (MTTD)

incident-response

A key metric measuring the average time it takes to discover a security incident or breach after it occurs. Lower MTTD v...

Mean Time to Respond (MTTR)

incident-response

A metric measuring the average time from detecting a security incident to fully containing and remediating it. MTTR is a...

MFA Fatigue Attack

phishing

An attack where the adversary repeatedly triggers MFA push notifications to the target's device, hoping the user will ev...

MITRE ATT&CK

general

A globally accessible knowledge base of adversary tactics, techniques, and procedures based on real-world observations....

Multi-Cloud Security

cloud-security

Security strategies and tools for consistently protecting workloads, data, and identities across multiple cloud service...

Multi-Factor Authentication (MFA)

authentication

A security mechanism requiring two or more independent forms of verification to confirm identity. Factors include someth...

N
O
P

Packet Sniffing

network-security

The practice of capturing and analyzing network packets as they travel across a network. While legitimate for network tr...

Pass-the-Hash

authentication

An attack technique where an attacker captures a password hash and uses it directly to authenticate without knowing the...

Password Manager

authentication

Software that securely stores and manages passwords in an encrypted vault. Password managers generate strong unique pass...

Passwordless Authentication

authentication

Authentication methods that verify user identity without traditional passwords, using methods like biometrics, security...

Patch Management

general

The process of acquiring, testing, and deploying software updates (patches) to fix vulnerabilities and improve functiona...

PCI DSS

compliance

Payment Card Industry Data Security Standard. A set of security requirements for organizations that handle credit card d...

Penetration Testing

compliance

An authorized simulated cyberattack performed to evaluate the security of a system by actively exploiting vulnerabilitie...

Pharming

phishing

A cyberattack that redirects website traffic from legitimate sites to fraudulent ones by poisoning DNS records or modify...

Phishing

phishing

A cyberattack that uses fraudulent emails, text messages, or websites to trick people into revealing sensitive informati...

Phishing Simulation

general

A security training exercise that sends simulated phishing emails to employees to test their ability to recognize and re...

Piggybacking

social-engineering

Similar to tailgating but with the authorized person's knowledge and consent. An unauthorized individual follows an empl...

Polymorphic Malware

malware

Malware that changes its code or signature each time it replicates, making it difficult to detect with signature-based a...

Port Scanning

network-security

The process of probing a server or host for open ports to identify available services and potential vulnerabilities. Whi...

Post-Incident Review

incident-response

A structured analysis conducted after a security incident to identify root causes, evaluate response effectiveness, docu...

Pretexting

social-engineering

A social engineering technique where the attacker creates a fabricated scenario (pretext) to manipulate the victim into...

Principle of Least Privilege

general

A security principle stating that users and systems should only be granted the minimum permissions necessary to perform...

Privacy by Design

data-protection

An approach that integrates privacy considerations into the design and development of systems, processes, and products f...

Privileged Access Management (PAM)

authentication

A set of strategies and technologies for controlling, monitoring, and securing elevated access rights to critical system...

Proxy Server

network-security

An intermediary server that sits between a client and destination server, forwarding requests on behalf of the client. P...

Pseudonymization

data-protection

A data protection technique that replaces identifying information with artificial identifiers (pseudonyms) while maintai...

Public Key Infrastructure (PKI)

general

A framework of policies, hardware, software, and procedures for creating, managing, distributing, and revoking digital c...

Purple Team

general

A collaborative approach where red team (offense) and blue team (defense) work together to improve an organization's sec...

Q
R
S

SAML

authentication

Security Assertion Markup Language. An XML-based standard for exchanging authentication and authorization data between i...

Sandboxing

general

A security technique that isolates untrusted programs or code in a restricted environment (sandbox) to observe their beh...

Scareware

malware

Software that uses fear tactics to trick users into purchasing unnecessary or harmful software. Common examples include...

Search Engine Poisoning

phishing

Manipulating search engine results to place malicious websites at the top of search results for popular queries. Victims...

Secrets Management

cloud-security

The practice of securely storing, accessing, and managing sensitive credentials such as API keys, tokens, passwords, and...

Secure Access Service Edge (SASE)

cloud-security

A cloud-delivered framework that converges network and security functions including SD-WAN, CASB, firewall-as-a-service,...

Security Audit

compliance

A systematic evaluation of an organization's information security controls, policies, and procedures to assess their eff...

Security Awareness

general

The knowledge and attitude employees possess regarding the protection of organizational assets from cyber threats. Secur...

Security Awareness Training

general

Structured educational programs designed to teach employees about cybersecurity threats and safe practices. Effective pr...

Security by Design

general

An approach to software and systems development that integrates security considerations at every stage of the design and...

Security Information and Event Management (SIEM)

incident-response

A solution that aggregates and analyzes security log data from across an organization's IT infrastructure to detect thre...

Security Operations (SecOps)

general

The practice of combining security and IT operations teams to improve collaboration and reduce risks. SecOps integrates...

Security Operations Center (SOC)

incident-response

A centralized unit that monitors, detects, investigates, and responds to cybersecurity incidents around the clock. SOC t...

Security Orchestration, Automation and Response (SOAR)

incident-response

A platform that combines security orchestration, automation, and incident response to help security teams manage and res...

Security Policy

compliance

A formal document that defines an organization's approach to information security, including acceptable use, access cont...

Sender Policy Framework (SPF)

phishing

An email authentication protocol that allows domain owners to specify which mail servers are authorized to send emails o...

Serverless Security

cloud-security

Security considerations and practices specific to serverless computing environments like AWS Lambda, Azure Functions, an...

Session Hijacking

authentication

An attack where an attacker takes over a valid user session by stealing or predicting the session token. This allows the...

Shadow IT

general

IT systems, software, or cloud services used within an organization without explicit approval from the IT department. Sh...

Shared Responsibility Model

cloud-security

A framework defining security responsibilities between a cloud service provider and its customers. The provider secures...

Shoulder Surfing

social-engineering

The practice of spying on someone's screen, keyboard, or documents to obtain sensitive information such as passwords, PI...

Single Sign-On (SSO)

authentication

An authentication method that allows users to access multiple applications with a single set of credentials. SSO reduces...

Smishing

phishing

SMS phishing that uses text messages to lure victims into clicking malicious links or providing sensitive information. M...

SOC 2

compliance

A compliance framework developed by AICPA that evaluates an organization's controls related to security, availability, p...

Social Engineering

social-engineering

The psychological manipulation of people into performing actions or divulging confidential information. Social engineeri...

Spear Phishing

phishing

A targeted phishing attack directed at specific individuals or organizations. Unlike generic phishing, spear phishing us...

Spyware

malware

Software that secretly monitors user activity and collects information without consent. Spyware can capture keystrokes,...

SSL Stripping

network-security

A man-in-the-middle attack that downgrades a secure HTTPS connection to unencrypted HTTP, allowing the attacker to inter...

Supply Chain Attack

general

An attack that targets an organization by compromising a trusted third-party vendor, supplier, or software component in...

T

Tabletop Exercise

incident-response

A discussion-based exercise where key personnel walk through a simulated security incident scenario without actually act...

Tailgating

social-engineering

A physical security breach where an unauthorized person follows an authorized individual through a secured entrance with...

Third-Party Risk Management

compliance

The process of identifying, assessing, and mitigating security risks posed by vendors, suppliers, and partners who have...

Threat Actor

general

An individual, group, or nation-state that conducts cyberattacks. Threat actors are categorized by motivation: cybercrim...

Threat Hunting

incident-response

The proactive process of searching for cyber threats that have evaded existing security controls. Threat hunters use hyp...

Threat Intelligence

incident-response

Evidence-based knowledge about existing or emerging cyber threats, including context, mechanisms, indicators, and action...

Threat Modeling

general

A structured process for identifying potential threats, vulnerabilities, and attack vectors in a system, and determining...

TLS/SSL

network-security

Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL) are cryptographic protocols that provide s...

Tokenization

data-protection

The process of replacing sensitive data with non-sensitive tokens that map back to the original data through a secure to...

Trojan

malware

Malware disguised as legitimate software that appears harmless but performs malicious actions when executed. Trojans oft...

Two-Factor Authentication (2FA)

authentication

A subset of multi-factor authentication that requires exactly two different authentication factors to verify identity. C...

Typosquatting

phishing

Registering domain names that are common misspellings of popular websites to capture traffic from users who mistype URLs...

V
W
Z