Cybersecurity Glossary

5
  • 5G
a
  • Access Management
  • AI
  • API
  • Application Security
  • ARP Poisoning 
  • Authentication
  • Authorization
  • Automated Facial Recognition
b
  • Biometric Authentication
  • Blockchain Technology 
  • Business Email Compromise (BEC)
  • Business Logic
c
  • CCPA
  • Chief Information Security Officer (CISO)
  • CIAM
  • Cloud Access Security Broker (CASB)
  • Cloud Security
  • Cloud-Native Application Protection Platforms (CNAPPs)
  • Command Injection
  • Cookie
  • Credential Theft
  • Critical Infrastructure
  • Cross-Site Scripting (XSS)
  • Cryptography
  • Cyberattack
  • Cybersecurity Framework
  • Cybersecurity Groups
d
  • Data Breach
  • Data Detection and Response (DDR)
  • Data Lakes
  • Data Loss Awareness
  • Data Loss Prevention (DLP)
  • Data Privacy
  • Data Protection
  • Data Security Platform (DSP)
  • Data Security Posture Management (DSPM)
  • Denial-of-Service (DoS) Attack
  • DevOps
  • Digital Rights Management (DRM)
  • Digital Transformation
  • Distributed Denial of Service (DDoS) Attack
  • DNS
  • Double-Extortion
  • Dynamic Application Security Testing (DAST)
e
  • Encryption
  • Endpoint Detection and Response (EDR)
  • Exfiltration
  • Extended Detection and Response (XDR)
  • Extract, Load, Transform (ELT)
f
  • FIDO
  • Formjacking
  • Full Disk Encryption
g
  • GDPR
  • Generative AI
h
  • HIPAA
i
  • IAM
  • Identity Governance and Administration (IGA)
  • Identity Theft
  • Insider Threat
  • Intellectual Property (IP)
  • Intellectual Property Theft
  • Interactive Application Security Testing (IAST)
  • IoT
m
  • Machine Learning
  • Malware
  • Man-in-the-Middle
  • MFA
n
  • Natural Language Processing
o
  • OAuth 2.0
  • Online Fraud Prevention (OFP)
  • Open Web Application Security Project (OWASP)
  • Original Equipment Manufacturer (OEM) 
p
  • PCI DSS
  • Penetration Test
  • Personally Identifiable Information (PII)
  • Phishing
  • Phishing-Resistant MFA
  • Protected Health Information (PHI)
q
  • Qishing
  • Quantum Computing
r
  • Ransomware
  • Ransomware as a Service (RaaS)
  • Regulatory Compliance
  • Runtime Application Self-Protection (RASP)
s
  • Secure File Transfer (SFT)
  • Secure Sockets Layer (SSL)
  • Security Strategy
  • Skimming Devices
  • Social Engineering
  • Spoofing
  • SQL and NoSQL
  • Static Application Security Testing (SAST)
t
  • Threat Intelligence
  • Tokenization
  • Transport Layer Security (TLS)
u
  • Undetected Privilege Escalation
  • User and Entity Behavior Analytics (UEBA)
v
  • Vendor-Neutral
  • Vulnerability Management
z
  • Zero Trust
Scroll to top