- Access Control - Methods to ensure only authorized users can access resources.
- Authentication - Verifying the identity of a user or system.
- Authorization - Granting permission to access resources.
- Identity and Access Management (IAM) - Framework for managing digital identities.
- Multi-Factor Authentication (MFA) - Using multiple methods to verify identity.
- Single Sign-On (SSO) - Single authentication process for multiple applications.
- Zero Trust Security - Security model that assumes no implicit trust.
- Encryption - Converting data into a secure format.
- End-to-End Encryption - Encrypting data from sender to recipient.
- Data Encryption at Rest - Encrypting stored data.
- Data Encryption in Transit - Encrypting data while it is being transmitted.
- Key Management - Managing cryptographic keys.
- Public Key Infrastructure (PKI) - Framework for managing digital keys and certificates.
- Certificate Authority (CA) - Entity that issues digital certificates.
- Digital Certificate - Electronic document used to prove ownership of a public key.
- Transport Layer Security (TLS) - Protocol for securing communications over a computer network.
- Secure Sockets Layer (SSL) - Predecessor to TLS for securing communications.
- VPN (Virtual Private Network) - Creates a secure connection over the internet.
- Firewall - Network security system that monitors and controls incoming and outgoing network traffic.
- Intrusion Detection System (IDS) - Monitors network traffic for suspicious activity.
- Intrusion Prevention System (IPS) - Prevents detected threats.
- Security Information and Event Management (SIEM) - Aggregates and analyzes activity from different resources.
- Threat Intelligence - Information about threats and threat actors.
- Vulnerability Management - Identifying, evaluating, treating, and reporting vulnerabilities.
- Penetration Testing - Simulating cyber attacks to identify vulnerabilities.
- Security Assessment - Evaluation of the security posture of a system.
- Risk Assessment - Identifying and analyzing potential risks.
- Compliance - Adhering to regulations and standards.
- Regulatory Compliance - Following laws and regulations.
- Data Protection - Safeguarding personal data from unauthorized access.
- Privacy - Protecting personal information.
- General Data Protection Regulation (GDPR) - EU regulation for data protection and privacy.
- Health Insurance Portability and Accountability Act (HIPAA) - US law for protecting health information.
- Payment Card Industry Data Security Standard (PCI DSS) - Security standard for handling credit card information.
- Service Organization Control (SOC) Reports - Reports on internal controls over financial reporting.
- Cloud Security Alliance (CSA) - Organization promoting best practices for cloud security.
- Shared Responsibility Model - Divides security responsibilities between cloud provider and customer.
- Security as a Service (SECaaS) - Outsourcing security services to a third party.
- Cloud Access Security Broker (CASB) - Security policy enforcement point between cloud service users and providers.
- Data Loss Prevention (DLP) - Preventing data breaches and data leaks.
- Security Group - Virtual firewall for controlling inbound and outbound traffic.
- Network Access Control (NAC) - Managing access to network resources.
- Endpoint Security - Protecting endpoints such as computers and mobile devices.
- Anti-Malware - Software designed to detect and remove malware.
- Antivirus - Software designed to detect and destroy computer viruses.
- Spyware - Software that collects information about users without their knowledge.
- Ransomware - Malware that encrypts data and demands ransom for decryption.
- Phishing - Attempting to acquire sensitive information by masquerading as a trustworthy entity.
- Spear Phishing - Targeted phishing attacks.
- Social Engineering - Manipulating people to divulge confidential information.
- Denial of Service (DoS) - Attacks aimed at making a machine or network resource unavailable.
- Distributed Denial of Service (DDoS) - DoS attacks originating from multiple sources.
- Botnet - Network of compromised computers used for malicious purposes.
- Man-in-the-Middle (MitM) Attack - Intercepting and altering communications between two parties.
- Cross-Site Scripting (XSS) - Injecting malicious scripts into web pages.
- SQL Injection - Injecting malicious SQL queries into input fields.
- Zero-Day Exploit - Exploiting unknown vulnerabilities.
- Patch Management - Managing updates and patches for software.
- Software Update - Improving software with new features and fixes.
- Security Patch - Fixes for security vulnerabilities.
- Bug Bounty - Rewarding individuals for discovering vulnerabilities.
- Red Team - Group that simulates attacks to test defenses.
- Blue Team - Group that defends against simulated attacks.
- Purple Team - Collaboration between red and blue teams.
- Security Policy - Guidelines for maintaining security.
- Security Framework - Structured approach to managing security processes.
- NIST Cybersecurity Framework - US framework for improving cybersecurity.
- ISO/IEC 27001 - International standard for information security management.
- Control - Measures to mitigate risk.
- Audit - Examination of systems and processes for compliance.
- Log Management - Collecting and storing log data.
- Incident Response - Responding to security breaches.
- Forensics - Investigating and analyzing cyber incidents.
- Business Continuity Planning (BCP) - Ensuring critical business functions continue during a disaster.
- Disaster Recovery Planning (DRP) - Recovering IT infrastructure after a disaster.
- Data Residency - Legal or regulatory requirements regarding the location of data.
- Data Sovereignty - Concept that information is subject to the laws of the country in which it is located.
- Shadow IT - Use of IT systems and solutions without organizational approval.
- Tokenization - Replacing sensitive data with non-sensitive equivalents.
- Anonymization - Removing identifiable information from data.
- Obfuscation - Making data unintelligible without decryption.
- De-identification - Removing personal identifiers from data.
- SaaS Security Posture Management (SSPM) - Managing the security posture of SaaS applications.
- Workload Protection - Ensuring the security of workloads in the cloud.
- Runtime Application Self-Protection (RASP) - Security technology that runs within an application.
- Secure Software Development Life Cycle (SDLC) - Integrating security into the software development process.
- Security Testing - Testing to ensure software is secure.
- Threat Modeling - Identifying and evaluating potential threats.
- Vulnerability Scanning - Identifying vulnerabilities in systems.
- Penetration Testing - Simulating attacks to test security.
- Red Teaming - Simulating attacks to test defenses.
- Risk Management - Identifying and mitigating risks.
- Risk Assessment - Evaluating potential risks.
- Risk Mitigation - Reducing the impact of risks.
- Risk Acceptance - Accepting the potential impact of risks.
- Risk Transfer - Sharing or transferring risk to another party.
- Security Incident - Event that threatens security.
- Breach - Unauthorized access to data.
- Compromise - Violation of security.
- Insider Threat - Security threat originating from within the organization.
- Outsider Threat - Security threat originating from outside the organization.
- APT (Advanced Persistent Threat) - Prolonged and targeted cyber attack.
- Malware - Malicious software designed to harm systems.
- Adware - Software that automatically displays advertisements.
- Rootkit - Software designed to gain unauthorized access to a computer.
- Exploit - Code that takes advantage of a vulnerability.
- Payload - Part of malware that performs malicious action.
- RAT (Remote Access Trojan) - Malware that provides unauthorized remote access.
- Keylogger - Malware that records keystrokes.
- Worm - Self-replicating malware.
- Trojan Horse - Malware disguised as legitimate software.
- Virus - Malware that replicates and spreads.
- Phishing - Attempt to obtain sensitive information by masquerading as a trustworthy entity.
- Spear Phishing - Targeted phishing attacks.
- Smishing - Phishing via SMS.
- Vishing - Phishing via phone calls.
- Credential Stuffing - Using stolen credentials to gain unauthorized access.
- Brute Force Attack - Attempting all possible combinations to crack a password.
- Dictionary Attack - Using a dictionary of common passwords to crack a password.
- Password Cracking - Recovering passwords from stored data.
- Session Hijacking - Taking over a user session.
- DNS Spoofing - Redirecting traffic to malicious sites.
- IP Spoofing - Pretending to be a trusted IP address.
Terminology
Security Terminology
Read Security Terminology