Glossary
Cybersecurity terms made simple.
Use this library to align your team on frameworks, services, and security operations terminology.
Coverage snapshot
Total terms
425
Categories
30
Top category
Compliance
425 terms found
Terms starting with 7
72-Hour Breach Notification
ComplianceRegulatory requirement in some jurisdictions to notify authorities within a strict post-breach timeframe.
Terms starting with A
AAA
IdentityAuthentication, Authorization, and Accounting controls user identity, permissions, and activity tracking.
Acceptable Use Policy (AUP)
GovernancePolicy defining allowed and prohibited use of company systems, networks, and data.
Access Control
IdentityMechanisms that enforce who or what can access systems, applications, and data.
Account Takeover (ATO)
ThreatsUnauthorized access to a legitimate user account, typically through stolen credentials or session theft.
Adversary-in-the-Middle (AiTM)
ThreatsAttack where an adversary intercepts and manipulates communications between two parties.
Advanced Persistent Threat (APT)
ThreatsSkilled, long-term attacker campaign that remains undetected while pursuing strategic objectives.
Air Gap
ArchitecturePhysical or logical isolation of a system from unsecured networks, especially the internet.
Allowlist
ControlsSecurity control that permits only pre-approved applications, IPs, users, or actions.
Anomaly Detection
DetectionTechnique for identifying behavior that deviates from expected baselines and may signal an attack.
Anti-Malware
Endpoint SecurityTools and controls designed to detect, block, and remove malicious software.
Application Security (AppSec)
Application SecurityPractice of integrating security throughout application design, development, testing, and operations.
Asset Inventory
OperationsAuthoritative list of hardware, software, cloud assets, and data stores requiring protection.
Attack Path
RiskLikely sequence of steps an attacker can take to move from initial access to key targets.
Attack Surface
RiskTotal set of reachable assets and entry points that adversaries can target.
Audit Log
OperationsTamper-resistant record of security-relevant events used for monitoring and investigations.
Authentication
IdentityProcess of verifying identity before granting access.
Authorization
IdentityProcess of determining which resources an authenticated identity can use.
Availability
ConceptsAssurance that systems and data remain accessible when needed.
Attribute-Based Access Control (ABAC)
IdentityAccess model that evaluates user, resource, and context attributes to make authorization decisions.
Account Provisioning
IdentityProcess of creating and configuring user accounts, entitlements, and access rights.
Account Deprovisioning
IdentityProcess of removing or disabling accounts and access when users change roles or leave.
Admission Controller
Cloud SecurityKubernetes control that intercepts API requests to enforce policy before objects are persisted.
API Security
Application SecurityProtection of APIs against abuse, unauthorized access, and data exposure.
API Gateway
Application SecurityEntry point that enforces authentication, rate limits, and routing for API traffic.
API Abuse
ThreatsMisuse of API endpoints to evade controls, scrape data, or disrupt services.
Act on the Protection of Personal Information (APPI)
ComplianceJapan privacy law governing the handling of personal data by businesses.
Australian Privacy Act 1988
ComplianceAustralia federal privacy law establishing obligations for handling personal information.
Terms starting with B
Backdoor
MalwareHidden method of bypassing normal authentication or controls for persistent unauthorized access.
Backup
ResilienceProtected copy of data or systems used for recovery after incidents or failures.
Bastion Host
Network SecurityHardened system exposed to untrusted networks to broker controlled administrative access.
Behavior Analytics
DetectionAnalysis of user and entity behavior patterns to detect suspicious deviations.
Blue Team
OperationsDefensive security team focused on prevention, detection, and response.
Botnet
ThreatsNetwork of compromised devices remotely controlled by an attacker.
Business Continuity Plan (BCP)
ResiliencePlan to sustain critical operations during and after disruptive events.
Business Email Compromise (BEC)
ThreatsFraud technique where attackers impersonate trusted contacts to steal money or data.
BYOD
GovernanceBring Your Own Device policy model that allows personal devices for business use.
Bring Your Own Key (BYOK)
CryptographyModel where customers provide encryption keys for use by cloud services.
Beaconing
ThreatsPeriodic outbound communication from compromised hosts to command-and-control infrastructure.
Broken Access Control
Application SecurityApplication flaw that allows users to perform actions outside intended permissions.
Business Impact Analysis (BIA)
ResilienceAssessment that identifies critical business functions and acceptable disruption thresholds.
Business Continuity and Disaster Recovery (BCDR)
ResilienceIntegrated strategy for maintaining operations and restoring technology services after incidents.
Breach Notification
ComplianceLegal obligation to notify affected parties and regulators after qualifying data breaches.
Binding Corporate Rules (BCRs)
PrivacyInternal data transfer rules approved by regulators for multinational organizations.
Terms starting with C
CASB
Cloud SecurityCloud Access Security Broker enforcing visibility and policy across cloud applications.
Certificate Authority (CA)
CryptographyTrusted entity that issues and validates digital certificates.
Certificate Pinning
CryptographyTechnique that restricts trust to specific certificates or public keys to prevent interception.
Chain of Custody
Incident ResponseDocumented handling history of digital evidence to preserve integrity and admissibility.
Chief Information Security Officer (CISO)
GovernanceExecutive responsible for enterprise security strategy, governance, and risk outcomes.
CIA Triad
ConceptsConfidentiality, Integrity, and Availability principles used to frame security objectives.
CIS Controls
FrameworksPrioritized security best practices published by the Center for Internet Security.
CNAPP
Cloud SecurityCloud-Native Application Protection Platform combining cloud posture and workload protection.
COBIT
FrameworksGovernance framework for enterprise IT management, risk, and control alignment.
Command and Control (C2)
ThreatsInfrastructure and communications channel used by attackers to control compromised systems.
Compliance
ComplianceAdherence to regulatory, legal, and contractual security requirements.
Confidentiality
ConceptsProtection of data from unauthorized access or disclosure.
Configuration Drift
OperationsUnplanned deviation of system configuration from the approved secure baseline.
Container Escape
Cloud SecurityExploit that breaks out of a container to access the host or other workloads.
Credential Stuffing
ThreatsAutomated login attempts using leaked username-password pairs from other breaches.
Critical Infrastructure
GovernanceEssential systems whose disruption would significantly impact safety, economy, or national security.
Cross-Site Request Forgery (CSRF)
Application SecurityAttack that tricks a logged-in user browser into submitting unwanted authenticated actions.
Cross-Site Scripting (XSS)
Application SecurityInjection attack where malicious scripts execute in a victim browser context.
Crown Jewels
RiskMost business-critical assets or data sets that require highest protection priority.
Cryptography
CryptographyUse of mathematical methods to secure confidentiality, integrity, and authenticity of information.
CSPM
Cloud SecurityCloud Security Posture Management for continuous misconfiguration detection in cloud environments.
CVE
Vulnerability ManagementCommon Vulnerabilities and Exposures identifier assigned to publicly disclosed vulnerabilities.
CVSS
Vulnerability ManagementCommon Vulnerability Scoring System for rating technical severity of vulnerabilities.
CWE
Application SecurityCommon Weakness Enumeration catalog of software weakness types.
Cyber Kill Chain
FrameworksModel describing phases of an attack from reconnaissance to actions on objectives.
Cyber Threat Intelligence (CTI)
Threat IntelligenceEvidence-based insights about threats, actors, and tactics to inform security decisions.
Cybersecurity Maturity Model Certification (CMMC)
ComplianceUS Department of Defense cybersecurity certification model for defense contractors.
Conditional Access
IdentityPolicy-based access control that evaluates context such as location, device posture, and risk.
Cloud-Native Security
Cloud SecuritySecurity practices designed for dynamic, distributed cloud-native applications and infrastructure.
Container Runtime
Cloud SecuritySoftware component responsible for starting and managing container execution on a host.
Container Image
Cloud SecurityPortable package containing application code, runtime, libraries, and configuration.
Container Image Scanning
Cloud SecurityAutomated analysis of container images for vulnerabilities, malware, and policy violations.
Container Registry
Cloud SecurityRepository service for storing, signing, and distributing container images.
Cosign
Cloud SecurityTool for signing and verifying container images and related supply chain artifacts.
Cloud Workload Protection Platform (CWPP)
Cloud SecuritySecurity tooling focused on protecting hosts, containers, and serverless workloads at runtime.
Customer-Managed Key (CMK)
CryptographyEncryption key administered by the customer rather than the cloud provider.
Cloud Security Alliance (CSA)
FrameworksIndustry organization that develops guidance and best practices for cloud security.
Cobalt Strike
ThreatsLegitimate adversary simulation framework frequently abused in real-world intrusions.
Credential Dumping
ThreatsExtraction of password hashes or credentials from systems and memory.
California Consumer Privacy Act (CCPA)
ComplianceCalifornia law granting consumers rights over personal information collection and sharing.
California Privacy Rights Act (CPRA)
ComplianceCalifornia law that amended and expanded CCPA privacy obligations and enforcement.
Chief Privacy Officer (CPO)
GovernanceExecutive responsible for privacy governance, legal compliance, and data protection strategy.
Cloud Controls Matrix (CCM)
FrameworksCloud Security Alliance control framework for assessing cloud provider security practices.
Common Criteria (ISO/IEC 15408)
ComplianceInternational standard for evaluating and certifying security properties of IT products.
Confidential Computing
CryptographyHardware-based protection that secures data while in use within trusted execution environments.
Connecticut Data Privacy Act (CTDPA)
ComplianceConnecticut privacy law defining consumer rights and controller obligations for personal data.
Consent Management
PrivacyProcesses and tooling used to capture, store, and enforce user consent choices.
Controlled Unclassified Information (CUI)
ComplianceUS government information category requiring safeguarding controls but not classified handling.
Controller-Processor Model
PrivacyPrivacy governance model that separates entities deciding data purpose from those processing on instruction.
COSO
FrameworksInternal control framework commonly used for governance, financial controls, and assurance alignment.
Cross-Border Data Transfer
PrivacyMovement of personal data between countries under legal transfer safeguards.
Cyber Essentials
ComplianceUK government-backed baseline certification for fundamental cybersecurity controls.
Cyber Essentials Plus
ComplianceAdvanced Cyber Essentials certification with independent technical verification testing.
Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA)
ComplianceUS law creating federal cyber incident reporting requirements for covered critical infrastructure entities.
Cybersecurity and Infrastructure Security Agency (CISA)
GovernanceUS agency responsible for national cyber defense coordination and critical infrastructure resilience.
Cybersecurity Performance Goals (CPGs)
FrameworksPractical baseline cybersecurity actions published to improve resilience in critical infrastructure sectors.
Terms starting with D
Data Classification
Data SecurityLabeling data by sensitivity and business impact to guide handling controls.
Data Exfiltration
ThreatsUnauthorized transfer of data outside a trusted environment.
Data Loss Prevention (DLP)
Data SecurityControls for discovering sensitive data and preventing unauthorized exposure.
Data Minimization
PrivacyPrinciple of collecting and retaining only the data necessary for intended purposes.
Data Residency
PrivacyRequirement for storing and processing data within specific geographic boundaries.
Data Sovereignty
PrivacyConcept that data is subject to laws of the country where it is stored or processed.
Deception Technology
DetectionUse of decoys and traps to mislead attackers and generate high-confidence alerts.
Defense in Depth
ArchitectureLayered security strategy where multiple controls mitigate a single risk.
Denial of Service (DoS)
ThreatsAttack that disrupts availability of a system or service.
Detection Engineering
DetectionDesigning, testing, and maintaining detections for attack behaviors.
Digital Forensics
Incident ResponseCollection and analysis of digital evidence to investigate incidents.
Digital Signature
CryptographyCryptographic proof that data came from a trusted signer and was not altered.
Distributed Denial of Service (DDoS)
ThreatsDoS attack using many compromised systems to overwhelm a target.
DMARC
Email SecurityEmail authentication policy standard that builds on SPF and DKIM to reduce spoofing.
DNS Filtering
Network SecurityBlocking malicious domains through domain name resolution controls.
DNSSEC
Network SecurityDNS Security Extensions adding cryptographic integrity validation to DNS responses.
Domain Generation Algorithm (DGA)
MalwareMalware technique for creating rotating domains used for command and control.
Dynamic Application Security Testing (DAST)
Application SecurityTesting running applications from the outside to detect exploitable vulnerabilities.
Digital Identity
IdentityElectronic representation of a user, device, or workload used for authentication and authorization.
DNP3
OT SecurityIndustrial protocol widely used in electric utility and critical infrastructure environments.
Drift Detection
Cloud SecurityIdentification of deviations between deployed infrastructure and approved configurations.
DLL Sideloading
ThreatsExecution technique that abuses application DLL search order to load malicious libraries.
Dropper
MalwareMalware component whose primary purpose is delivering additional malicious payloads.
Dependency Confusion
Application SecuritySupply chain attack that tricks build systems into pulling malicious packages.
DKIM
Email SecurityDomainKeys Identified Mail standard that signs email to validate message authenticity.
Deep Packet Inspection (DPI)
Network SecurityTraffic analysis method that inspects packet payloads for policy and threat enforcement.
Disaster Recovery Plan (DRP)
ResiliencePlan for restoring IT systems and services after disruptive events.
Data Processing Agreement (DPA)
PrivacyContract defining responsibilities and safeguards when one party processes personal data for another.
Data Protection Authority (DPA)
ComplianceRegulatory body that enforces privacy and data protection laws in a jurisdiction.
Data Protection Impact Assessment (DPIA)
PrivacyStructured assessment of privacy risks for high-risk personal data processing activities.
Data Protection Officer (DPO)
GovernanceRole tasked with advising on and monitoring privacy compliance obligations.
Data Retention Policy
GovernanceRules defining how long data is stored and when it must be deleted.
Data Subject Access Request (DSAR)
PrivacyFormal request from an individual to access and receive copies of personal data.
Data Transfer Impact Assessment (DTIA)
PrivacyAssessment evaluating legal and practical risks of international personal data transfers.
Defense Federal Acquisition Regulation Supplement (DFARS)
ComplianceUS defense contracting regulations that include cybersecurity and incident reporting requirements.
Digital Operational Resilience Act (DORA)
ComplianceEU regulation requiring financial entities to manage ICT risk, resilience testing, and incident reporting.
Terms starting with E
EDR
Endpoint SecurityEndpoint Detection and Response for monitoring endpoints and containing suspicious activity.
Encryption
CryptographyConversion of plaintext into ciphertext using keys to protect data confidentiality.
Endpoint Protection Platform (EPP)
Endpoint SecurityEndpoint security suite focused on prevention controls like antivirus and policy enforcement.
Escalation Path
Incident ResponseDefined chain of technical and management contacts for incident handling decisions.
Exploit
ThreatsCode or technique that takes advantage of a vulnerability.
Exploit Chain
ThreatsSequence of vulnerabilities and techniques combined to achieve attacker objectives.
Exposure Management
RiskContinuous process of identifying, prioritizing, and reducing exploitable security gaps.
External Attack Surface Management (EASM)
RiskDiscovery and monitoring of internet-facing assets and exposures.
Engineering Workstation
OT SecurityPrivileged OT workstation used to configure controllers and manage industrial system logic.
etcd
Cloud SecurityDistributed key-value store that persists Kubernetes cluster state and configuration.
eBPF
Cloud SecurityLinux kernel technology that enables efficient runtime observability and security enforcement.
East-West Traffic
Network SecurityLateral network traffic that moves between internal systems and workloads.
EU Cyber Resilience Act (CRA)
ComplianceEU legislation establishing cybersecurity requirements for connected products and software.
eIDAS
ComplianceEU framework governing electronic identification, trust services, and digital signatures.
ePrivacy Directive
ComplianceEU legal framework for electronic communications privacy, including cookies and marketing communications.
Export Administration Regulations (EAR)
ComplianceUS export controls governing dual-use items, including some cybersecurity technologies.
Terms starting with F
False Positive
DetectionAlert that incorrectly flags benign activity as malicious.
FedRAMP
ComplianceUS government program standardizing security assessment and authorization for cloud services.
File Integrity Monitoring (FIM)
DetectionDetection of unauthorized file or configuration changes on critical systems.
Firewall
Network SecurityControl point that filters network traffic based on security rules.
Forensic Readiness
Incident ResponsePreparedness to collect and preserve evidence efficiently during incidents.
Fuzzing
Application SecurityAutomated testing that feeds unexpected inputs to uncover crashes and vulnerabilities.
Federation
IdentityTrust relationship that allows identity assertions to be accepted across separate organizations or systems.
Federation Metadata
IdentityConfiguration data exchanged between identity providers and service providers to establish trust.
FIDO2
IdentityOpen authentication standard enabling phishing-resistant, passwordless sign-in with cryptographic authenticators.
Function as a Service (FaaS)
Cloud SecurityCloud execution model where code runs in managed functions triggered by events.
FAIR
FrameworksFactor Analysis of Information Risk framework for quantifying cyber risk in financial terms.
Family Educational Rights and Privacy Act (FERPA)
ComplianceUS law protecting student education records and related privacy rights.
Federal Information Security Modernization Act (FISMA)
ComplianceUS law requiring federal agencies to implement risk-based information security programs.
Federal Trade Commission Safeguards Rule
ComplianceUS rule requiring financial institutions to implement a written information security program.
FIPS 140-3
ComplianceUS and Canada standard for validating cryptographic module security requirements.
Terms starting with G
GDPR
ComplianceGeneral Data Protection Regulation governing personal data privacy in the European Union.
Governance, Risk, and Compliance (GRC)
GovernanceIntegrated discipline for policy oversight, risk management, and compliance assurance.
General Data Protection Law (LGPD)
ComplianceBrazil national privacy law governing processing of personal data.
Gramm-Leach-Bliley Act (GLBA)
ComplianceUS law requiring financial institutions to protect customer financial information.
Terms starting with H
Hardened Baseline
ControlsSecure default configuration standard for systems and services.
Hashing
CryptographyOne-way transformation used for integrity checks and secure password storage workflows.
HIPAA
ComplianceUS healthcare security and privacy requirements for protected health information.
Honeypot
DetectionDecoy system intended to attract and observe attacker behavior.
Host Intrusion Detection System (HIDS)
Endpoint SecurityHost-based monitoring for suspicious activity on servers or endpoints.
Host Intrusion Prevention System (HIPS)
Endpoint SecurityHost-based control that detects and blocks suspicious behavior in real time.
Human-Machine Interface (HMI)
OT SecurityOperator interface used to visualize and control industrial processes.
Historian
OT SecuritySystem that stores time-series industrial process data for monitoring and analysis.
HITRUST
ComplianceAssurance framework and certification program often used in healthcare and regulated sectors.
Terms starting with I
IAM
IdentityIdentity and Access Management controls digital identities and access lifecycles.
Immutable Backup
ResilienceBackup that cannot be altered or deleted during a defined retention period.
Incident Response
Incident ResponseProcess for preparing for, detecting, containing, eradicating, and recovering from incidents.
Indicator of Attack (IOA)
Threat IntelligenceBehavioral pattern suggesting malicious activity before clear compromise evidence exists.
Indicator of Compromise (IOC)
Threat IntelligenceObservable artifact that indicates a system may have been compromised.
Industrial Control System (ICS)
OT SecurityOperational technology environment used to monitor and control industrial processes.
Information Security Management System (ISMS)
GovernanceStructured set of policies, processes, and controls for managing information security risk.
Insider Threat
ThreatsRisk posed by internal users who intentionally or accidentally harm the organization.
Integrity
ConceptsAssurance that data is accurate, complete, and not altered without authorization.
Intrusion Detection System (IDS)
DetectionMonitoring system that identifies suspicious or malicious network and host activity.
Intrusion Prevention System (IPS)
Network SecurityControl that can automatically block malicious activity detected in traffic streams.
ISO 27001
ComplianceInternational standard for establishing and maintaining an information security management system.
Identity Governance and Administration (IGA)
IdentityDiscipline for managing identity lifecycle, access requests, certifications, and separation-of-duties policies.
Identity Proofing
IdentityVerification process that establishes confidence a digital identity belongs to a real person.
Industrial Internet of Things (IIoT)
OT SecurityConnected sensors and devices used in industrial operations and telemetry collection.
IEC 62443
FrameworksInternational standards series for securing industrial automation and control systems.
Image Signing
Cloud SecurityCryptographic signing of artifacts to verify software provenance and integrity.
Infrastructure as Code (IaC)
Cloud SecurityManaging infrastructure with declarative code and automated deployment workflows.
Infrastructure as Code Security
Cloud SecurityPractices and tooling to detect security misconfigurations in infrastructure templates before deployment.
Insecure Direct Object Reference (IDOR)
Application SecurityAccess control flaw exposing direct object identifiers without proper authorization checks.
Insecure Deserialization
Application SecurityVulnerability where unsafe object deserialization enables code execution or logic abuse.
Interactive Application Security Testing (IAST)
Application SecurityRuntime-assisted testing approach that detects vulnerabilities with instrumentation inside the application.
India Digital Personal Data Protection Act (DPDP Act)
ComplianceIndia national privacy law establishing obligations for handling digital personal data.
International Traffic in Arms Regulations (ITAR)
ComplianceUS export control regulations governing defense-related articles, services, and technical data.
ISO 22301
ComplianceInternational standard for business continuity management systems.
ISO 27017
ComplianceInternational code of practice for cloud security controls.
ISO 27018
ComplianceInternational standard for protecting personal data in public cloud services.
ISO 27701
CompliancePrivacy information management extension to ISO 27001 and ISO 27002.
Terms starting with J
Just-in-Time Access (JIT)
IdentityModel that grants elevated privileges only when needed and only for a limited duration.
Just-Enough Administration (JEA)
IdentityPrinciple and implementation approach that limits administrative sessions to the minimum required actions.
Terms starting with K
Key Management
CryptographyLifecycle management of cryptographic keys including generation, storage, rotation, and retirement.
Kubernetes
Cloud SecurityContainer orchestration platform used to deploy, scale, and manage containerized workloads.
Kubernetes API Server
Cloud SecurityControl-plane component that validates and processes cluster API requests.
Kubelet
Cloud SecurityNode agent that ensures containers are running according to Kubernetes pod specifications.
Kubernetes NetworkPolicy
Cloud SecurityKubernetes resource that controls pod-to-pod network communication flows.
Kubernetes RBAC
Cloud SecurityRole-based access control model for Kubernetes API permissions.
Kubernetes Secrets
Cloud SecurityKubernetes object type for storing sensitive configuration data used by workloads.
Kubernetes Security Posture Management (KSPM)
Cloud SecurityContinuous assessment of Kubernetes configurations against security best practices.
Key Management Service (KMS)
CryptographyManaged service for creating, storing, rotating, and controlling access to encryption keys.
Keylogger
MalwareMalware or tool that records keystrokes to capture credentials and sensitive data.
Terms starting with L
Lateral Movement
ThreatsAttacker movement across internal systems after initial compromise.
Least Privilege
IdentityPrinciple of granting only the minimum access required for a task.
Log Correlation
DetectionCombining events from multiple sources to identify meaningful attack patterns.
Log Retention
GovernancePolicy and practice of storing logs for defined durations to support monitoring and compliance.
Landing Zone
Cloud SecurityPreconfigured cloud environment with baseline identity, networking, and security controls.
Living off the Land (LotL)
ThreatsAttacker tactic that uses legitimate system tools to avoid detection.
LOLBAS
Threat IntelligenceLiving Off the Land Binaries and Scripts catalog of dual-use Windows utilities often abused by attackers.
Loader
MalwareMalicious program that retrieves and executes secondary payloads in memory.
Legal Hold
GovernanceProcess to preserve potentially relevant records for legal proceedings and investigations.
Lei Geral de Protecao de Dados (LGPD)
CompliancePortuguese name for Brazil privacy law governing personal data processing.
Terms starting with M
Malicious Insider
ThreatsInsider who intentionally abuses authorized access for theft, sabotage, or fraud.
Malware
MalwareMalicious software designed to disrupt operations, steal data, or gain unauthorized control.
MDR
ServicesManaged Detection and Response combining monitoring, threat hunting, and active response services.
Mean Time to Detect (MTTD)
MetricsAverage time between incident occurrence and detection.
Mean Time to Respond (MTTR)
MetricsAverage time required to contain or remediate a detected incident.
Microsegmentation
Network SecurityFine-grained network policy enforcement to limit east-west movement.
MITRE ATT&CK
FrameworksKnowledge base of real-world adversary tactics and techniques used for detection and defense.
MSSP
ServicesManaged Security Service Provider delivering outsourced security monitoring and operations.
Multi-Factor Authentication (MFA)
IdentityAuthentication requiring two or more distinct verification factors.
Modbus
OT SecurityLegacy industrial communications protocol commonly used between PLCs and supervisory systems.
Malware Static Analysis
MalwareExamination of malware binaries without execution to identify structure, indicators, and capabilities.
Malware Dynamic Analysis
MalwareExecuting malware in a controlled environment to observe runtime behavior and artifacts.
Malware Family
MalwareGroup of related malware samples sharing code, behavior, or operational techniques.
Malware Sandbox
MalwareIsolated environment used to safely detonate and analyze malicious files.
Mean Time to Contain (MTTC)
MetricsAverage time required to stop attacker activity after detection.
Material Cybersecurity Incident
ComplianceIncident significant enough to influence investor decisions and trigger disclosure obligations in some regimes.
Terms starting with N
NAC
Network SecurityNetwork Access Control enforcing device and user access policies before network admission.
National Vulnerability Database (NVD)
Vulnerability ManagementUS repository that enriches CVE records with vulnerability metadata and severity data.
NDR
DetectionNetwork Detection and Response focused on detecting malicious network behaviors and intrusions.
Network Segmentation
Network SecurityDivision of networks into isolated zones to reduce blast radius and control access.
NIS2
ComplianceEuropean cybersecurity directive establishing stronger security and incident reporting obligations.
NIST
FrameworksUS standards body publishing widely adopted cybersecurity guidance and controls.
NIST Cybersecurity Framework (NIST CSF)
FrameworksFramework organizing cybersecurity outcomes around governance, identify, protect, detect, respond, and recover.
NIST SP 800-53
FrameworksCatalog of security and privacy controls for information systems and organizations.
Non-Repudiation
CryptographyAbility to prove an action occurred so participants cannot credibly deny it.
NetFlow
Network SecurityNetwork metadata records used for traffic visibility, anomaly detection, and forensics.
North-South Traffic
Network SecurityNetwork traffic flowing between internal environments and external networks.
NERC CIP
ComplianceNorth American electric sector cybersecurity standards for bulk electric system reliability.
NIST Privacy Framework
FrameworksFramework for managing privacy risk through governance and data processing outcomes.
Notifiable Data Breaches (NDB) Scheme
ComplianceAustralia regime requiring notification of eligible data breaches.
NYDFS Part 500
ComplianceNew York cybersecurity regulation for covered financial services institutions.
Terms starting with O
OAuth 2.0
IdentityAuthorization framework allowing applications to obtain limited delegated access.
Object Lock
Data SecurityStorage setting that prevents object deletion or modification for defined retention periods.
Open Web Application Security Project (OWASP)
FrameworksCommunity-driven organization providing application security guidance and standards.
OWASP Top 10
Application SecurityWidely used ranking of critical web application security risks.
OpenID Connect (OIDC)
IdentityIdentity layer on top of OAuth 2.0 that provides standardized user authentication claims.
Operational Technology (OT)
OT SecuritySystems and devices that monitor or control physical processes in industrial environments.
OPC UA
OT SecurityIndustrial interoperability standard that supports secure, structured machine-to-machine communication.
OT Asset Discovery
OT SecurityProcess of identifying industrial devices, protocols, and communications with minimal operational disruption.
Obfuscation
MalwareDeliberate transformation of code or scripts to hinder analysis and detection.
Office for Civil Rights (OCR)
GovernanceUS HHS office that enforces HIPAA privacy and security requirements.
Terms starting with P
Patch Management
Vulnerability ManagementProcess for evaluating, prioritizing, testing, and deploying software updates securely.
PCI DSS
CompliancePayment Card Industry Data Security Standard for protecting cardholder data.
Penetration Testing
Offensive SecurityAuthorized simulation of attacker techniques to validate security controls.
Personal Identifiable Information (PII)
PrivacyData that can identify a specific individual directly or indirectly.
Phishing
ThreatsDeceptive communication used to steal credentials, data, or money.
Playbook
Incident ResponseStep-by-step procedure for handling recurring security scenarios and incidents.
Posture Assessment
RiskEvaluation of current security controls, configurations, and risk exposure.
Privileged Access Management (PAM)
IdentityControls and workflows for securing high-privilege accounts and sessions.
Privilege Escalation
ThreatsTechnique used to gain higher access rights than originally granted.
Public Key Infrastructure (PKI)
CryptographySystem of certificates, keys, and policies used to enable trusted encryption and signing.
Purple Team
OperationsCollaborative practice where red and blue teams improve defenses together.
Passkey
IdentityPhishing-resistant credential based on public-key cryptography used for passwordless authentication.
Passwordless Authentication
IdentityAuthentication approach that replaces passwords with stronger factors like device-bound keys or biometrics.
Policy-Based Access Control (PBAC)
IdentityAuthorization approach using centralized policies to evaluate access conditions at request time.
Privileged Identity Management (PIM)
IdentityIdentity controls that govern privileged role assignment, activation, and review.
Programmable Logic Controller (PLC)
OT SecurityIndustrial control computer used to automate mechanical and process operations.
Purdue Model
OT SecurityReference architecture that segments industrial networks into hierarchical control layers.
Pod Security Standards
Cloud SecurityKubernetes policy profiles defining baseline and restricted pod security requirements.
Packers
MalwareTools or techniques that compress or encrypt binaries to obscure malicious code.
Process Injection
ThreatsTechnique that runs malicious code within another process to evade defenses.
Process Hollowing
ThreatsTechnique that replaces legitimate process code with malicious payloads at runtime.
Packet Capture (PCAP)
Network SecurityRaw network packet recording used for troubleshooting and incident investigation.
Personal Data Protection Act (PDPA)
CompliancePrivacy law title used in multiple jurisdictions, including Singapore and Thailand.
Personal Information Protection and Electronic Documents Act (PIPEDA)
ComplianceCanada federal privacy law for private-sector personal information handling.
Personal Information Protection Law (PIPL)
ComplianceChina national privacy law governing processing of personal information.
Privacy by Design
PrivacyApproach that embeds privacy requirements into systems and processes from the start.
Privacy Impact Assessment (PIA)
PrivacyAssessment process used to identify and mitigate privacy risks in systems and projects.
Protection of Personal Information Act (POPIA)
ComplianceSouth Africa privacy law governing lawful processing of personal information.
Pseudonymization
PrivacyTechnique that reduces identifiability of personal data by replacing direct identifiers.
Terms starting with Q
Quishing
ThreatsPhishing attack that uses malicious QR codes to redirect victims to fraudulent destinations.
Terms starting with R
Ransomware
MalwareMalware that encrypts or steals data and extorts payment.
Recovery Point Objective (RPO)
ResilienceMaximum acceptable amount of data loss measured in time.
Recovery Time Objective (RTO)
ResilienceMaximum acceptable downtime before service restoration.
Red Team
Offensive SecurityOffensive team emulating realistic adversary behavior to test defenses.
Remote Code Execution (RCE)
ThreatsVulnerability allowing an attacker to run arbitrary code on a target system.
Resilience
ConceptsAbility to prepare for, withstand, recover from, and adapt after cyber incidents.
Risk Appetite
RiskAmount and type of risk an organization is willing to accept.
Risk Register
RiskDocumented inventory of risks, ratings, owners, and treatment plans.
Root Cause Analysis (RCA)
OperationsMethod for identifying underlying factors that caused a security event or control failure.
Root of Trust
ArchitectureFoundational hardware or software component implicitly trusted for security operations.
Rootkit
MalwareStealth malware designed to hide malicious activity and maintain privileged persistence.
Runbook
OperationsDetailed operational guide for executing specific security procedures consistently.
Runtime Application Self-Protection (RASP)
Application SecurityApplication-embedded defense that detects and blocks attacks during execution.
Role-Based Access Control (RBAC)
IdentityAuthorization model that assigns permissions to roles rather than individual users.
Remote Terminal Unit (RTU)
OT SecurityIndustrial field device that gathers telemetry and executes supervisory control commands.
Runtime Threat Detection
DetectionDetection of suspicious behavior while workloads are actively running.
Reverse Engineering
MalwareTechnical process of understanding software internals to uncover behavior and vulnerabilities.
Ransomware as a Service (RaaS)
ThreatsCybercrime business model where operators rent ransomware infrastructure to affiliates.
Records of Processing Activities (RoPA)
PrivacyRequired documentation of personal data processing operations under certain privacy regulations.
Right to Erasure
PrivacyPrivacy right allowing individuals to request deletion of personal data under qualifying conditions.
Right to Rectification
PrivacyPrivacy right allowing individuals to request correction of inaccurate personal data.
Right to Restrict Processing
PrivacyPrivacy right allowing individuals to limit how their personal data is used.
Right to Data Portability
PrivacyPrivacy right allowing individuals to receive personal data in a transferable format.
Risk and Control Self-Assessment (RCSA)
GovernanceStructured process for teams to evaluate control effectiveness and operational risk exposure.
Terms starting with S
Sandboxing
ControlsExecuting code in an isolated environment to limit potential damage.
SCADA
OT SecuritySupervisory Control and Data Acquisition systems used for industrial process control.
Secure Access Service Edge (SASE)
ArchitectureArchitecture combining networking and security services delivered from the cloud edge.
Secure Boot
Endpoint SecurityStartup security feature that permits only trusted, signed code during boot.
Secure by Design
GovernanceApproach that builds security requirements into products from initial architecture onward.
Secure Development Lifecycle (SDLC)
Application SecuritySoftware lifecycle model that integrates security activities into each development phase.
Secure Email Gateway (SEG)
Email SecurityEmail security control for filtering phishing, malware, and spoofed messages.
Secure Shell (SSH)
CryptographyEncrypted network protocol for secure remote administration and file transfer.
Security Baseline
ControlsMinimum required control and configuration standard for systems.
Security Information and Event Management (SIEM)
ToolsPlatform that aggregates, normalizes, correlates, and alerts on security telemetry.
Security Operations Center (SOC)
OperationsCentralized team and function for continuous monitoring, triage, and incident response.
Security Orchestration, Automation, and Response (SOAR)
AutomationPlatform that automates security workflows and incident response playbooks.
Segregation of Duties (SoD)
GovernanceControl that separates critical tasks across roles to reduce fraud and abuse risk.
Service Level Agreement (SLA)
GovernanceContractually defined performance targets such as response and resolution times.
Session Hijacking
ThreatsTakeover of a valid user session token to impersonate that user.
Single Sign-On (SSO)
IdentityAuthentication model where one login grants access to multiple applications.
Social Engineering
ThreatsPsychological manipulation used to trick people into insecure actions.
SOC 2
ComplianceAudit framework evaluating controls for security, availability, and confidentiality.
Software Bill of Materials (SBOM)
Application SecurityInventory of software components and dependencies used in an application.
Software Composition Analysis (SCA)
Application SecurityAutomated detection of open-source components and known vulnerabilities in codebases.
Spam
Email SecurityUnsolicited bulk messaging, often used to distribute phishing and malware.
Spear Phishing
ThreatsTargeted phishing attack tailored to a specific person, team, or organization.
SQL Injection
Application SecurityInjection attack that manipulates backend database queries through unsanitized input.
SSL/TLS
CryptographyProtocols for securing data in transit over networks.
Supply Chain Attack
ThreatsCompromise of trusted vendors, software, or dependencies to reach downstream targets.
SAML
IdentitySecurity Assertion Markup Language standard for exchanging authentication and authorization data.
SCIM
IdentitySystem for Cross-domain Identity Management standard for automating account provisioning and deprovisioning.
Step-Up Authentication
IdentityRequirement for stronger authentication when a user performs higher-risk actions.
Safety Instrumented System (SIS)
OT SecurityIndependent protection system designed to place industrial processes into a safe state.
Service Mesh
Cloud SecurityInfrastructure layer that manages service-to-service communication, security, and observability.
Sidecar Proxy
Cloud SecurityCompanion container that provides networking or security capabilities to an application workload.
Sigstore
Cloud SecurityOpen source ecosystem for signing, verifying, and transparency logging of software artifacts.
Software Supply Chain Security
Application SecurityPractices that protect software build, dependency, and release pipelines from tampering.
Serverless Security
Cloud SecuritySecurity controls tailored for event-driven, function-based cloud workloads.
Shared Responsibility Model
Cloud SecurityCloud principle defining which security responsibilities belong to provider versus customer.
Secure Web Gateway (SWG)
Network SecuritySecurity service that filters web traffic to enforce policy and block malicious destinations.
Security Service Edge (SSE)
ArchitectureCloud-delivered security stack that commonly includes SWG, CASB, and ZTNA capabilities.
Sandbox Evasion
MalwareMalware behavior designed to detect analysis environments and hide malicious actions.
Spyware
MalwareMalware designed to secretly monitor activity and exfiltrate sensitive information.
Server-Side Request Forgery (SSRF)
Application SecurityVulnerability that lets attackers coerce servers into making unintended network requests.
Secrets Management
ControlsSecure storage, distribution, and rotation of credentials, tokens, and encryption keys.
Secret Scanning
Application SecurityAutomated discovery of exposed credentials and sensitive tokens in code and repositories.
Static Application Security Testing (SAST)
Application SecurityCode analysis technique that identifies vulnerabilities without executing the application.
SPF
Email SecuritySender Policy Framework standard that authorizes email senders for a domain.
Sinkhole
Network SecuritySecurity control that redirects malicious traffic to controlled infrastructure for blocking or analysis.
Sarbanes-Oxley Act (SOX)
ComplianceUS law requiring internal control and financial reporting assurances for public companies.
Schrems II
ComplianceEuropean court ruling that tightened requirements for transferring personal data outside the EU.
SEC Cybersecurity Disclosure Rules
ComplianceUS SEC requirements for public companies to disclose material cyber incidents and governance practices.
Service Organization Control 1 (SOC 1)
ComplianceAudit report focusing on controls relevant to financial reporting.
Service Organization Control 3 (SOC 3)
ComplianceGeneral-use trust services report derived from SOC 2 examination results.
StateRAMP
ComplianceUS program that standardizes cloud security assessments for state and local governments.
Standard Contractual Clauses (SCCs)
PrivacyPre-approved contractual terms used to legitimize international personal data transfers.
Supply Chain Levels for Software Artifacts (SLSA)
FrameworksSecurity framework for improving software supply chain integrity and provenance assurance.
System and Organization Controls
ComplianceAICPA attestation framework family including SOC 1, SOC 2, and SOC 3 reports.
Terms starting with T
Tabletop Exercise
Incident ResponseDiscussion-based simulation used to rehearse incident response and decision-making.
Tactics, Techniques, and Procedures (TTPs)
Threat IntelligencePatterns describing how threat actors plan and execute operations.
Threat Actor
ThreatsIndividual or group conducting malicious cyber activity.
Threat Hunting
DetectionProactive search for hidden adversary activity not detected by automated controls.
Threat Intelligence Platform (TIP)
Threat IntelligencePlatform that ingests, enriches, and operationalizes threat intelligence feeds.
Tokenization
Data SecurityReplacing sensitive data with non-sensitive tokens while keeping data utility.
Transport Layer Security (TLS)
CryptographyModern cryptographic protocol used to protect data in transit.
Triaging
OperationsPrioritizing and routing alerts or incidents based on severity and business impact.
Terraform
Cloud SecurityInfrastructure as code tool used to provision and manage cloud infrastructure resources.
Trojan
MalwareMalware disguised as legitimate software to trick users into execution.
Typosquatting
ThreatsMalicious registration of lookalike package or domain names to trick users and systems.
Third-Party Risk Management (TPRM)
RiskProgram for assessing and monitoring security risks introduced by vendors and partners.
TISAX
ComplianceTrusted Information Security Assessment Exchange standard used in the automotive industry.
Transparency Report
GovernancePublic report disclosing security incidents, law enforcement requests, and governance practices.
Terms starting with U
Unified Endpoint Management (UEM)
Endpoint SecurityPlatform for centrally managing security and configuration across endpoint device types.
User and Entity Behavior Analytics (UEBA)
DetectionAnalytics for identifying anomalous user and system behavior associated with threats.
Unidirectional Gateway
OT SecurityHardware-enforced one-way network communication device used to protect critical OT environments.
UK GDPR
ComplianceUnited Kingdom data protection regime derived from EU GDPR and domestic law.
UK NIS Regulations
ComplianceUnited Kingdom regulations imposing cyber resilience requirements on essential services and digital providers.
Utah Consumer Privacy Act (UCPA)
ComplianceUtah privacy law defining baseline rights and obligations for personal data handling.
Terms starting with V
vCISO
ServicesVirtual Chief Information Security Officer service providing fractional security leadership.
Vishing
ThreatsVoice phishing attack using phone calls to trick victims into revealing sensitive data.
VPN
Network SecurityVirtual Private Network creating encrypted tunnels across untrusted networks.
Vulnerability Assessment
Vulnerability ManagementSystematic identification and evaluation of security weaknesses.
Vulnerability Disclosure Program (VDP)
Vulnerability ManagementFormal channel for external researchers to report vulnerabilities safely and responsibly.
Vulnerability Management
Vulnerability ManagementContinuous process of finding, prioritizing, remediating, and validating vulnerabilities.
Vulnerability Scanner
Vulnerability ManagementAutomated tool that detects known vulnerabilities and misconfigurations.
Vendor Risk Assessment
RiskEvaluation of supplier security controls, posture, and contractual risk obligations.
Virginia Consumer Data Protection Act (VCDPA)
ComplianceVirginia privacy law granting rights and imposing data processing obligations on covered entities.
Terms starting with W
Watering Hole Attack
ThreatsCompromising a website frequented by targets to infect visitors.
Web Application Firewall (WAF)
Application SecurityControl that inspects and filters malicious HTTP and HTTPS traffic to web apps.
Whaling
ThreatsHighly targeted phishing aimed at executives or high-value decision-makers.
Windows Event Forwarding (WEF)
OperationsNative Windows mechanism for centralizing event logs from endpoints and servers.
Worm
MalwareSelf-replicating malware that spreads automatically across systems or networks.
WebAuthn
IdentityW3C web standard enabling strong authentication with public-key credentials.
Workload Identity
Cloud SecurityIdentity model that assigns cryptographically verifiable identities to applications and services.
Workload Security
Cloud SecurityProtection of cloud and container workloads across build, deploy, and runtime phases.
Wiper Malware
MalwareDestructive malware intended to erase data or render systems inoperable.
Terms starting with X
XML External Entity (XXE)
Application SecurityXML parser vulnerability that can expose data, trigger SSRF, or execute unintended actions.
XDR
ToolsExtended Detection and Response unifying detection and response across endpoint, network, and cloud.
Terms starting with Y
YARA
Threat IntelligenceRule-based pattern matching language used to identify malware families and artifacts.
Terms starting with Z
Zero-Day
ThreatsPreviously unknown vulnerability exploited before a patch is available.
Zero Trust
FrameworksSecurity model that continuously verifies identity, device posture, and context for every request.
Zombie Bot
ThreatsCompromised device controlled remotely as part of a botnet.
Zone and Conduit Model
OT SecurityIEC 62443 segmentation approach that organizes assets into zones and controlled communication conduits.
Zero Trust Network Access (ZTNA)
Network SecurityAccess model that grants application access based on identity and context instead of network location.
Step 1
Search by term or acronym to align language across teams.
Step 2
Browse categories to explore frameworks, tools, and threat concepts.
Step 3
Open linked pages for deeper guidance and provider matching.
Browse by category
Definitions organized by theme.
Compliance
62 terms
Threats
39 terms
Cloud Security
36 terms
Identity
32 terms
Application Security
25 terms
Privacy
21 terms
Malware
20 terms
Governance
18 terms
Network Security
17 terms
Frameworks
17 terms
OT Security
17 terms
Cryptography
16 terms
Detection
13 terms
Operations
10 terms
Risk
10 terms
Resilience
8 terms
Vulnerability Management
8 terms
Endpoint Security
7 terms
Incident Response
7 terms
Threat Intelligence
7 terms
Architecture
5 terms
Controls
5 terms
Concepts
5 terms
Email Security
5 terms
Data Security
4 terms
Services
3 terms
Metrics
3 terms
Offensive Security
2 terms
Tools
2 terms
Automation
1 terms
Ready to move fast
Get matched with cybersecurity providers in hours, not weeks.
Submit your request once. Our AI qualifies, enriches, and routes the lead to the best MSP and MSSP partners for your stack, industry, and timeline.
Optimized for faster qualification and stronger provider fit.
What you get
- AI-qualified leads scored for budget, urgency, and compliance.
- Provider shortlists with verified certifications and references.
- Scheduling workflows with smart reminders and follow-up.
- Live conversion analytics and quality trend insights.
Need cybersecurity support now?
Submit your requirements and get a vetted provider shortlist in hours.
Growing your provider pipeline?
Join the marketplace and access higher-intent demand with stronger fit signals.
Explore next