Glossary

We have compiled an extensive list of terms which we hope you will find useful. If there are any additions you’d like to see, please contact us with the details. 

Access Point

ActiveX

Adaptive Technology

Adware

AES

Agile Development

AI (Artificial Intelligence)

Anti-Botnet

Anti-Malware

Anti-Phishing

Anti-Virus

API (Application Programming Interface)

APT (Advanced Persistent Threat)

AR (Augmented Reality)

ATP (Advanced Threat Protection)

Attack Vector

Authentication

Backdoor

Baiting

Banker Trojan

BEC (Business Email Compromise)

Big Data

Biometric Authentication

Black Hat

Blacklist

Blockchain

Blue Team

Botnet

Brute Force Attack

Buffer Overflow

Business Continuity Plan

Business Disruption

BYOC

BYOD

C.I.A

CAPTCHA

CASB

CERT (Computer Emergency Response Team)

CIA Triad

Clickjacking

Clientless

Code Injection

COTS (Commercial off-the Shelf)

Critical Infrastructure

Cross Site Scripting

Crowdsourcing

Crypto jacking

CSP (Cloud Service Provider)

CVE (Common Vulnerabilities and Exposures)

CVSS (Common Vulnerability Scoring System)

Cyberbullying

Cybersecurity

Dark Web

Data Breach

Data Centre

Data Integrity

Data Mining

Data Theft

Decryption

Deepfake

Defence in Depth

Detection and Response

DevOps

DHCP

Digital Forensics

Digital Transformation

DLP (Data Loss Prevention)

DMARC

DMZ

DNS (Domain Name System)

Domain Controller

DoS

Drive-By Download Attack

EDR (Endpoint Detection and Response)

Encryption

Endpoint Protection

Exploit

FIDO (Fast Identity Online)

Fileless Malware

FIPS

Firewall

Freeware

FTP

Green Technology

Greylist

GUI

Hacker

HCI (Hyperconverged Infrastructure)

Honeypot

HTML

HTTP

HTTPS

Hypervisor

IaaS

IAM (Identity and Access Management)

IDaaS

Identity Theft

IDS (Intrusion Detection System)

IMAP (Internet Message Access Protocol)

In-line Network Device

Initial Access Brokers

Insider Threat

IOC (Indicators of Compromise)

IoT (Internet of Things)

IP address

IP Spoofing

IPS (Intrusion Prevention System)

IRC (Internet Relay Chat)

Jailbreak

Java

Kerberos

Keylogger

Kill Chain

LAN

Least privilege

LINUX

Logic Bomb

MAC Address

Machine Learning

Malware

Man-in-the Middle Attack

MDM

MDR

MFA (Multi-Factor Authentication)

MITRE ATT&CK™ Framework

MSSP (Managed Security Service Provider)

NaaS (Network as a Service)

NAC (Network Access Control)

NAT (Network Address Translation)

OWASP

PaaS

Packet Sniffer

Parental Controls

Patch

Penetration Testing

Phishing

PII (Personally Identifiable Information)

Ping

PKI (Public Key Infrastructure)

Polymorphism

Process Hollowing

Protocol – TCP, UDP, ICMP, etc

Proxy

Pwned

QoS

Ransomware

RDP (Remote Desktop Protocol)

Red Team

RMM (Remote Monitoring and Management)

Rootkit

SaaS (Software as a Service)

SAML (Simple Authentication Markup Language)

SAN (Storage Area Network)

Sandbox

Scareware

Screen Scraper

Script Kiddie

SD-WAN

SECaaS (Security as a Service)

Security Incident Response

Security Perimeter

Shadow IT

Shareware

Shelfware

Shoulder Surfing

SIEM (Security Information and Event Management)

SIM Swapping

Smishing

SMTP

SOAR (Security Orchestration, Automation and Response)

SOC (Security Operations Centre)

Social Engineering

Spam

Spear Phishing

SPF (Sender Policy Framework)

Spoofing

Spyware

SQL Injection

SSID

SSL (Secure Socket Layer)

SSO (Single Sign-On)

Steganography

System Hardening

Tailgating

TCP/IP

Threat Assessment

Threat Hunting

Threat Intelligence

Trojan

Two-factor Authentication (2FA)

Two-step Authentication

UEBA

URL

UTM (Unified Threat Management)

Vapourware

VDI

Virtualisation

Virus

Vishing

VLAN

VM (Virtual Machine)

VoIP

VPN

VR (Virtual Reality)

Vulnerability

Vulnerability Assessment

WAF

WAN

WAP

Warez

Wearables

WEP

Whaling

White Hat

Whitelist

WLAN

Worm

WPA

XDR

Zero-day Exploit

Zero-touch Provisioning or Deployment

ZTNA (Zero trust network access)

  • a
  • b
  • c
  • d
  • e
  • f
  • g
  • h
  • i
  • j
  • k
  • l
  • m
  • n
  • o
  • p
  • q
  • r
  • s
  • t
  • u
  • v
  • w
  • x
  • y
  • z