Cybersecurity terms

Cybersecurity Terms and Definitions

Explore our glossary of cyber words and terms

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 

A

Antivirus software
Authentication
Advanced Persistent Threat (APT)
Advanced Threat Protection (ATP)
Adware
Anti-Botnet
Anti-Malware
Anti-Phishing
Attack Vector

B

Botnet
Black Hat Hacker
Backdoor
Banker Trojan
Blacklist, Blocklist, Denylist
Brute Force Attack
Business Continuity Plan
Business Disruption
BYOC (Bring Your Own Computer)
BYOD (Bring Your Own Device)
BYOL (Bring Your Own Laptop)

 

C

Clickjacking
Cloud
Cyber Attack
Captcha
Clientless
COTS (Commercial off-the Shelf)
Critical Infrastructure
Cryptojacking
Cyberbullying
Cybersecurity

D

Data Breach
DDoS Attack
Deepfake
Domain
Dark Web
Data Integrity
Data LossPrevention (DLP)
Data Theft
Decryption
Detection and Response
Digital Forensics
Digital Transformation
Domain Name Systems (DNS) Exfiltration
Drive-By Download Attack

E

Encryption
Ethical Hacking
Exploit
Endpoint Protection
Endpoint Detection and Response (EDR)

F

Fast Identity Online (FIDO)
Fileless Malware
Firewall

G

Greylist

H

Hacker
Honeypot

I

Internet of Things
IP Address
Identity and Access Management (IAM)
Identity
Indicators of Compromise (IOC)
In-line Network Device
Insider Threat
Intrusion Prevention System (IPS)
IoT

J

K

Keylogger

L

M

Malware
Man in the Middle Attack
Multi-Factor Authentication
Malvertising
MITRE ATT&CK™ Framework

N

Network Security

O

P

Pen Testing
Phishing
Parental Controls
Patch
PII
Process Hollowing

Q

R

Ransomware
Rootkit
Process Hollowing
Remote Desktop Protocol (RDP)
Risktool

S

Social Engineering
Software
Spoofing
Spyware
Sandbox(ing)
Scareware
SECaaS
Secure Socket Layer (SSL)
Security Incident Response
Security Operations Center (SOC)
Security Perimeter
SIEM (Security Information and Event Management)
SIM Swapping
Sniffing
SOAR (Security Orchestration, Automation and Response)
Spam
Spear Phishing

T

Trojan Horse
Threat Assessment
Threat Hunting
Threat Intelligence
Two-factor Authentification (2FA)
Two-step Authentification

U

User Authentication

V

Virus
VPN
Vulnerability

W

Worm
White Hat Hacker

X

Y

Z

Zero Day Vulnerability

Zero-touch Provisioning or Deployment