Glossary
We have compiled an extensive list of terms which we hope you will find useful. If there are any additions you’d like to see, please contact us with the details.
ActiveX
Adaptive Technology
Adware
AES
Agile Development
AI (Artificial Intelligence)
Anti-Botnet
Anti-Malware
Anti-Phishing
Anti-Virus
API (Application Programming Interface)
APT (Advanced Persistent Threat)
AR (Augmented Reality)
ATP (Advanced Threat Protection)
Attack Vector
Authentication
Backdoor
Baiting
Banker Trojan
BEC (Business Email Compromise)
Big Data
Biometric Authentication
Black Hat
Blacklist
Blockchain
Blue Team
Botnet
Brute Force Attack
Buffer Overflow
Business Continuity Plan
Business Disruption
BYOC
BYOD
C.I.A
CAPTCHA
CASB
CERT (Computer Emergency Response Team)
CIA Triad
Clickjacking
Clientless
Code Injection
COTS (Commercial off-the Shelf)
Critical Infrastructure
Cross Site Scripting
Crowdsourcing
Crypto jacking
CSP (Cloud Service Provider)
CVE (Common Vulnerabilities and Exposures)
CVSS (Common Vulnerability Scoring System)
Cyberbullying
Cybersecurity
Dark Web
Data Breach
Data Centre
Data Integrity
Data Mining
Data Theft
Decryption
Deepfake
Defence in Depth
Detection and Response
DevOps
DHCP
Digital Forensics
Digital Transformation
DLP (Data Loss Prevention)
DMARC
DMZ
DNS (Domain Name System)
Domain Controller
DoS
Drive-By Download Attack
EDR (Endpoint Detection and Response)
Encryption
Endpoint Protection
Exploit
FIDO (Fast Identity Online)
Fileless Malware
FIPS
Firewall
Freeware
FTP
Green Technology
Greylist
GUI
Hacker
HCI (Hyperconverged Infrastructure)
Honeypot
HTML
HTTP
HTTPS
Hypervisor
IaaS
IAM (Identity and Access Management)
IDaaS
Identity Theft
IDS (Intrusion Detection System)
IMAP (Internet Message Access Protocol)
In-line Network Device
Initial Access Brokers
Insider Threat
IOC (Indicators of Compromise)
IoT (Internet of Things)
IP address
IP Spoofing
IPS (Intrusion Prevention System)
IRC (Internet Relay Chat)
Jailbreak
Java
Kerberos
Keylogger
Kill Chain
LAN
Least privilege
LINUX
Logic Bomb
MAC Address
Machine Learning
Malware
Man-in-the Middle Attack
MDM
MDR
MFA (Multi-Factor Authentication)
MITRE ATT&CK™ Framework
MSSP (Managed Security Service Provider)
NaaS (Network as a Service)
NAC (Network Access Control)
NAT (Network Address Translation)
OWASP
PaaS
Packet Sniffer
Parental Controls
Patch
Penetration Testing
Phishing
PII (Personally Identifiable Information)
Ping
PKI (Public Key Infrastructure)
Polymorphism
Process Hollowing
Protocol – TCP, UDP, ICMP, etc
Proxy
Pwned
QoS
Ransomware
RDP (Remote Desktop Protocol)
Red Team
RMM (Remote Monitoring and Management)
Rootkit
SaaS (Software as a Service)
SAML (Simple Authentication Markup Language)
SAN (Storage Area Network)
Sandbox
Scareware
Screen Scraper
Script Kiddie
SD-WAN
SECaaS (Security as a Service)
Security Incident Response
Security Perimeter
Shadow IT
Shareware
Shelfware
Shoulder Surfing
SIEM (Security Information and Event Management)
SIM Swapping
Smishing
SMTP
SOAR (Security Orchestration, Automation and Response)
SOC (Security Operations Centre)
Social Engineering
Spam
Spear Phishing
SPF (Sender Policy Framework)
Spoofing
Spyware
SQL Injection
SSID
SSL (Secure Socket Layer)
SSO (Single Sign-On)
Steganography
System Hardening
Tailgating
TCP/IP
Threat Assessment
Threat Hunting
Threat Intelligence
Trojan
Two-factor Authentication (2FA)
Two-step Authentication
UEBA
URL
UTM (Unified Threat Management)
Vapourware
VDI
Virtualisation
Virus
Vishing
VLAN
VM (Virtual Machine)
VoIP
VPN
VR (Virtual Reality)
Vulnerability
Vulnerability Assessment
WAF
WAN
WAP
Warez
Wearables
WEP
Whaling
White Hat
Whitelist
WLAN
Worm
WPA
XDR
Zero-day Exploit
Zero-touch Provisioning or Deployment
ZTNA (Zero trust network access)
- a
- b
- c
- d
- e
- f
- g
- h
- i
- j
- k
- l
- m
- n
- o
- p
- q
- r
- s
- t
- u
- v
- w
- x
- y
- z