Cybersecurity Terms and Glossary: Definitions and Explanations
Cyber security is the discipline of protecting computer systems, networks, devices, and data from malicious attacks. It covers identifying threats, isolating them, countering them with no or minimal data loss, and working towards threat prevention.
Everyone is affected by cybersecurity. We all share information online on a regular basis, whether for work or pleasure, via smartphones, tablets, or laptops, and with that comes a certain level of danger.
We should all have a basic awareness of how to protect our data — and what the threats are – as consumers and businesses. Nonetheless, it occasionally feels as if the content is purposefully obfuscated behind complex acronyms and technical jargon.
Even the most tech-savvy among us would find it difficult to keep up with all of the cybersecurity jargon.
The cybersecurity lexicon gives knowledge and insight into the industry's key phrases and definitions to the cybersecurity community. This glossary contains important terms.All related terms referenced on sunnyvalley.io website and commonly used in the cybersecurity field have been added. You can begin your search by looking up the key terms you'll need to know as a security professional.
Read on for a dictionary of cybersecurity terminology and acronyms if you want to know the most commonly used 180 cybersecurity terms. We'll be updating this on a regular basis, so let us know if you have any suggestions for additions.
Cybersecurity Terms with A
You can find here definitions for common cybersecurity terms starting with the letter "A"
Access Control
The process of approving or rejecting specific requests for or attempts to: 1) receive and use the information and related information processing services; and 2) get access to certain physical facilities.
Access Control List (ACL)
An object's list of permissions. The list indicates who or what is permitted access to the object, as well as what operations are permitted on it. 2. A mechanism for enumerating the system entities that are permitted to access a system resource and specifying, either implicitly or explicitly, the access modes provided to each entity in order to implement access control for that resource.
Access Control Policy
High-level requirements define how access is controlled and who has access to what information and when.
Access Management
Access Management is a set of procedures that allows only those who have been granted access to a resource to perform actions on it. Policy Administration, Authentication, and Authorization are the three most frequent Access Management services you may encounter on a daily basis without ever recognizing it.
Access Point
A device that logically connects wireless client devices in infrastructure and grants access to a distribution system.
Active Attack
A genuine attack on a system, its resources, data, or operations by an intentional threat source. Man-in-the-middle, impersonation, and session hijacking are examples of active attacks.
Active Directory
A directory service from Microsoft for managing identities in Windows domain networks.
Address Resolution Protocol (ARP)
A methodology for obtaining the physical address of a node. A client station broadcasts an ARP request onto the network with the target node's Internet Protocol (IP) address, and the node responds by sending back its physical address so that packets can be sent to it.
Advanced Encryption Standard (AES)
AES stands for Advanced Encryption Standard. A cryptographic technique that has been authorized by the US government and can be used to protect electronic data.
Advanced Persistent Threat (APT)
An adversary with advanced levels of competence and substantial resources, allowing it to create opportunities to fulfill its goals by employing many attack vectors (e.g., cyber, physical, and deception).
Adware
Adware, sometimes known as advertising-supported software, is software that earns revenue for its creator by displaying internet advertisements in the software's user interface or on a screen displayed to the user during the installation process.
American Standard Code for Information Interchange (ASCII)
The American System Code for Information Interchange, or ASCII, is a character encoding standard used in electronic communication. In computers, telecommunications equipment, and other devices, ASCII codes represent text.
Anomaly-Based Detection
The practice of identifying major deviations by comparing concepts of what constitutes normal activity with observable events.
Anonymizing proxy
An anonymizer, often known as an anonymous proxy, is a tool that aims to make online behavior untraceable. It's a proxy server computer that serves as a middleman and privacy shield between a client computer and the rest of the Internet.
Anti Spyware software
Antispyware software is a tool that focuses on identifying, preventing, and uninstalling spyware.
Anti-spam
Anti-spam software is designed to keep unsolicited and malicious emails out of company inboxes.
Anti-spoofing
Countermeasures were taken to prevent the illegal use of lawful identity and authentication (I&A) data, regardless of how it was obtained, to impersonate someone other than the attacker.
Antivirus Software
An application that monitors a computer or network for the purpose of detecting and preventing malware incidents.
Application control
Completeness and validity checks, identification, authentication, authorization, input controls, and forensic controls are all examples of application control.
Application Firewall
A firewall that analyzes network traffic for one or more applications using stateful protocol analysis.
Artificial intelligence
Artificial intelligence, as opposed to natural intelligence expressed by humans or animals, is intelligence demonstrated by robots.
Assembly Language
Assembly language, abbreviated as in computer programming, is any low-level programming language in which the instructions in the language have a very strong correlation with the architecture's machine code instructions.
Assessment plan
The control assessment objectives, as well as a detailed methodology for conducting such assessments.
Asymmetric Keys
A public key and a private key are two linked keys that are used to execute complementary activities like encryption and decryption, as well as signature production and verification.
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM) is a telecommunications standard developed by ANSI and the International Telecommunication Union (ITU) for digital transmission of multiple types of traffic, such as telephony, data, and video signals, over a single network without the use of separate overlay networks.
Attack
A breach of system integrity or an attempt to gain unauthorized access to system services, resources, or information.
Attack method
An adversary's method, tactic, or means for attacking information or an information system.
Attack signature
An unauthorized access attempt is indicated by a specified series of actions.
Attack surface
An attacker can try to access, produce an effect on, or extract data from a system, a system element, or an environment by attempting to enter, cause an effect on, or extract data from those spots on the system, system element, or environment's border.
Attack Vector
An attack vector in computer security refers to a specific path, method, or situation that can be used to break into an IT system and compromise its security.
Attacker
A malicious party, such as an insider, acts with the goal to breach a system.
Audit Trail
A track of who has accessed an information technology (IT) system and what actions they have completed during a period of time.
Authentication
Verifying a user's, process's, or device's identification, which is frequently required before granting access to resources in an information system.
Authentication Mechanism
Mechanisms based on hardware or software require users to authenticate their identity before accessing data on a device.
Authenticator
The method of confirming a user's, process's, or device's identity (e.g., user password or token).
Authorization
A system entity is given the right or authority to access a system resource.
Autonomous System
One or more routers are managed by the same person and follow the same routing rules.
Autonomous System Number (ASN)
An Autonomous System is identified by a two-byte number.
Availability
Providing fast and reliable access to and utilization of data.
Cybersecurity Terms with B
You can find here definitions for common cybersecurity terms starting with the letter "B"
Back Door (Backdoor)
A method of gaining access to a computer system that is not documented. A backdoor can be a security hazard.
Backbone Network
A backbone, also known as a core network, is a component of a computer network that connects networks by providing a conduit for data to flow between separate LANs or subnetworks.
Backhaul
A high-capacity connection between a remote site or network and a central site or network.
Base64 Encoding
Base64 is a set of binary-to-text encoding techniques used in programming to express binary data in an ASCII string format by converting it to a radix-64 representation. The word Base64 refers to a MIME content transmission encoding standard. Each non-final Base64 digit represents exactly 6 bits of data.
Baseline Security
The very minimum of security controls required to protect an IT system's confidentiality, integrity, and/or availability, as determined by its identified needs.
Big data
Big data is a field that deals with methods for analyzing, methodically extracting information from, or otherwise dealing with data volumes that are too large or complicated for typical data-processing application software to handle.
Bit
The value of a binary digit is either 0 or 1.
Black Box Testing
Black-box testing is a type of software testing that looks at an application's functioning without seeing inside its internal structures or workings. This test approach can be used at all levels of software testing, including unit, integration, system, and acceptance.
Blacklist
A collection of discrete things, such as hosts or programs, that have previously been linked to harmful conduct. Also referred to as a "filthy words" list.
Blue Team
The team in charge of protecting an organization's use of information systems by preserving its security posture in the face of a group of dummy attackers (i.e., the Red Team). The Blue Team and its followers are usually called upon to defend against real or simulated attacks. 1) over a long length of time, 2) in a realistic operational setting (e.g., as part of an operational exercise), and 3) in accordance with regulations established and supervised by a neutral body refereeing the simulation or exercise (i.e., the White Team).
Border Gateway Protocol (BGP)
The Border Gateway Protocol is a standardized outside gateway protocol that allows autonomous systems on the Internet to share routing and reachability information.
Botnet
The terms "robot" and "network" are combined to generate the word "botnet." Cyber criminals employ particular Trojan viruses to get into the security of numerous users' computers, take control of each one, and group all of the infected computers into a network of "bots" that the criminal can control remotely.
Browser hijacking
Browser hijacking is a type of undesirable software that alters the settings of a web browser without the user's permission in order to inject unwanted advertising into the browser. A browser hijacker might change your default home page, error page, or search engine to one of its own.
Brute Force Password Attack
Attempting multiple permutations of numeric/alphanumeric passwords to get access to an obstructed device.
Buffer Overflow Attack
A way of overwriting and corrupting memory beyond the buffer's bounds by overloading a preset quantity of memory storage in a buffer.
Bug
A bug in a computer program is defined as a malfunction or weakness in the software.
Business Continuity Plan (BCP)
The recording of a preset set of instructions or procedures that describe how an organization's mission/business processes will be maintained during and after a major disruption.
Business Impact Analysis (BIA)
An examination of the requirements, functions, and interdependencies of an information system that is used to define system contingency requirements and priorities in the case of a substantial disruption.
BYOD (Bring Your Own Device)
Bring your own device, also known as bring your own technology, bring your own phone, and bring your own personal computer, refers to the ability to use one's own device rather than being forced to utilize one provided by the organization. This phrase is used in two distinct settings.
Byte
The byte is a unit of digital data that typically consists of eight bits. The byte is the smallest addressable unit of memory in various computer systems because it was historically the amount of bits needed to encode a single character of text in a computer.
Cybersecurity Terms with C
You can find here definitions for common cybersecurity terms starting with the letter "C"
Cache Poisoning
Cache poisoning is a computer security flaw in which faulty entries are stored in a cache and then presumed to be valid when they are later used. DNS cache poisoning and ARP cache poisoning are two frequent types. The poisoning of web caches is known as web cache poisoning [cs]. There have also been attacks on other, more targeted caches.
Certificate Management Authority
A Certification Authority or a Registration Authority.
Certification Authority (CA)
Public key certificates are issued and revoked by a trusted authority.
Checksum
For detecting changes in data, a value that (a) is computed by a function that is reliant on the contents of a data object and (b) is stored or sent with the object.
Clear Text
Data that is understandable and whose semantic content is available. Note that clear text data is not encrypted by definition.
Clickjacking
A clickjacking attack is when a user is tricked into clicking a webpage element that is hidden or disguised as another element.
Cloud Computing
A concept for providing on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that may be swiftly supplied and released with minimal administrative effort or service provider engagement.
COBIT
Control Objectives for Information and Related Technology
Command and Control
The exercise of authority and direction by a properly designated commander over assigned and attached forces in the completion of the objective is known as command and control. Command and control functions are carried out by a commander using a combination of persons, equipment, communications, facilities, and procedures to plan, direct, coordinate, and control forces and operations in order to complete the mission.
Common Vulnerabilities and Exposures (CVE)
A lexicon and nomenclature for security-related software problems.
Common Vulnerability Scoring System (CVSS)
A method for determining the severity of software defect vulnerabilities.
Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA)
Completely Automated Public Turing test to tell Computer and Humans Apart
Computer Emergency Response Team (CERT)
A professional group that addresses computer security events is known as a computer emergency response team. The computer emergency preparation team and computer security incident response team are two more names for such teams.
Computer Incident Response Team (CIRT)
Security Analysts form a group that develops, recommends, and coordinates rapid mitigation activities for containment, eradication, and recovery in the event of a computer security issue. Also known as a Computer Security Incident Response Team (CSIRT) or a Computer Security Incident Response Center (CIRC) (Computer Incident Response Center, Computer Incident Response Capability, or Cyber Incident Response Team).
Confidentiality
Keeping authorized constraints on data access and disclosure in place, including safeguards for personal privacy and proprietary data.
Configuration Management
Controlling processes for initializing, updating, and monitoring the configurations of information technology products and information systems throughout the system development life cycle is a set of activities aimed at establishing and maintaining the integrity of those goods and systems.
Contingency plan
Policy and procedures used by management to govern an organization's response to a perceived loss of mission capability. The enterprise risk managers' initial strategy for determining what happened, why, and what to do is the Contingency Plan. For large disruptions, it may refer to the continuity of operations plan (COOP) or disaster recovery plan (DRP).
Critical Infrastructure
Systems and assets, whether real or virtual, that are so important to the United States that their incapacity or destruction would cripple security, national economic security, national public health or safety, or any combination of those issues.
Cross-site request forgery (CSRF)
An attack in which a subscriber who is currently authenticated to an RP and connected over a secure session visits an attacker's website, inadvertently invoking undesirable activities at the RP. If a bank website is vulnerable to a CSRF attack, a subscriber could mistakenly authorize a huge money transfer by simply seeing a malicious link in a webmail message while a connection to the bank is open in another browser window.
Cyber Threat Actor
A Cyber Threat Actor (CTA) is a participant (individual or group) in an action or process involving computers, devices, systems, or networks that is characterized by malice or hostile behavior (intentional harm).
Cyberattack
An attack that uses cyberspace to disrupt, disable, damage, or maliciously control a computing environment/infrastructure; or corrupt the integrity of data or steal controlled information.
Cybersecurity Terms with D
You can find here definitions for common cybersecurity terms starting with the letter "D"
Data Breach
A data breach occurs when safe or private/confidential information is released to an untrusted environment, whether intentionally or unintentionally. Unintentional information disclosure, data leak, information leakage, and data spill are all phrases used to describe this event.
Data Encryption Standard (DES)
The Data Encryption Standard defines a symmetric encryption algorithm.
Data integrity
The property that the data has not been tampered with in any way. Data integrity refers to how data is stored, processed, and transported.
Data Leakage
The unlawful communication of data from within an organization to an external destination or recipient is known as data leakage.
Data Loss Prevention
Through deep packet content inspection, contextual security analysis of transaction (attributes of originator, data object, medium, timing, recipient/destination, etc.) within a centralized management framework, a system's ability to identify, monitor, and protect data in use (e.g. endpoint actions), data in motion (e.g. network actions), and data at rest (e.g. data storage). The capabilities for data loss prevention are meant to detect and prevent the unlawful use and transmission of NSS data.
Data Mining
Data mining is a technique for extracting and detecting patterns in huge data sets that combines machine learning, statistics, and database systems.
Data Theft
The act of taking information from an unwitting victim's computer, server, or other device with the goal to jeopardize privacy or get personal information is known as data theft.
Decipher
Using a cryptographic system, convert encrypted text to plain text.
Defense-in-Depth
Multiple layers of security controls are installed throughout an information technology system as part of the defense in depth concept in information security.
Demilitarized Zone (DMZ)
Perimeter network section that connects internal and external networks logically. Its goal is to enforce the internal network's Information Assurance policy for external information exchange and to grant external, untrusted sources limited access to releasable information while protecting the internal networks from outside threats.
Denial of Service (DoS)
The denial of permitted access to resources or the postponement of time-sensitive operations. (Depending on the service supplied, time-critical can be milliseconds or hours.)
Dictionary Attack
A dictionary attack is a way of breaking into a password-protected computer, network, or other IT resource by inputting every word in a dictionary as a password in a methodical manner.
Diffie-Hellman
An unsafe network mechanism for safely exchanging or establishing secret keys. Temporary or single-use secret keys are created using ephemeral Diffie-Hellman.
Digital Signature Standard (DSS)
The Digital Signature Standard is a Federal Information Processing Standard that was established in 1994 by the United States National Institute of Standards and Technology to specify a set of algorithms that can be used to generate digital signatures.
Disaster Recovery Plan (DRP)
A disaster recovery plan (DRP) is a documented, systematic technique that explains how a company can quickly restart operations following an unanticipated event.
Distributed Denial of Service
A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt a targeted server's, service's, or network's normal traffic by flooding the target or its surrounding infrastructure with Internet traffic.
Domain Name System (DNS)
The system for tracking and regulating Internet domain names and addresses, as defined by IETF RFC 1034 and other related RFCs.
Cybersecurity Terms with E
You can find here definitions for common cybersecurity terms starting with the letter "E"
Eavesdropping Attack
An attack in which an attacker passively listens to the authentication protocol in order to gather the information that can be utilized in a later active attack to impersonate the claimant.
Egress Filtering
Outgoing network traffic is filtered.
Encapsulation
Encapsulation is a term used in object-oriented programming to describe the grouping of data with the methods that operate on it, or the restriction of direct access to parts of an object's components.
End-to-End Encryption
When data is transmitted via a network, it is encrypted, but routing information remains visible.
Exfiltration
Unauthorized information transmission from an information system.
Exploit
An exploit is a piece of software, a chunk of data, or a set of commands that uses a defect or vulnerability to cause unintended or unexpected behavior in computer software, hardware, or electronic devices.
Cybersecurity Terms with F
You can find here definitions for common cybersecurity terms starting with the letter "F"
Fail-over
When the previously active system fails or terminates abnormally, the capability to automatically transition to a redundant or standby information system (usually without human involvement or notification).
False-positive
A warning that mistakenly implies the presence of a vulnerability.
File Transfer Protocol (FTP)
FTP is a file transfer protocol that allows you to send and receive data over the internet. Upload and download Web pages, graphics, and other items between local media and a distant server that permits FTP access using FTP tools and utilities.
Firewall
An inter-network connection device that limits data communication flow between two networks that are linked together. A firewall can be a general-purpose computer application or a specialized platform (appliance) that forwards or rejects/drops packets on a network. Firewalls are commonly used to define zone boundaries. Firewalls usually have rules that limit which ports can be accessed.
Firmware
Computer programs and data are kept in hardware - commonly read-only memory (ROM) or programmable read-only memory (PROM) - so that they cannot be dynamically changed or modified while the programs are being executed.
Forensics
The process of collecting, storing, and analyzing computer-related data for investigative purposes while maintaining the data's integrity.
Cybersecurity Terms with G
You can find here definitions for common cybersecurity terms starting with the letter "G"
Gateway
An intermediary system (interface, relay) that connects two (or more) computer networks with comparable functionality but different implementations, allowing one-way or two-way communication between them.
Gray box testing
An approach to testing that assumes some knowledge of the tested object's underlying structure and implementation details. Another name for it is gray box testing.
Greyhat hacker
Grey hat hackers fall between white hat and black hat hackers. They are neither good nor bad, but generally, their intentions are not to harm other people and entities.
Governance, Risk Management and Compliance (GRC)
GRC is an integrated set of competencies for achieving objectives, dealing with uncertainty, and running a business with integrity.
GDPR
The General Data Protection Regulations (GDPR) is a European Union law that protects the privacy and personal data of all EU and EEC individuals (EEA).
Cybersecurity Terms with H
You can find here definitions for common cybersecurity terms starting with the letter "H"
Hacker
An unauthorized user who tries to or succeeds in gaining access to a computer system.
Hash algorithm
An algorithm for generating a hash from a message.
Honeypot
A system (e.g., a web server) or system resource (e.g., a server file) that is meant to entice potential crackers and invaders, similar to how honey attracts bears.
Host Intrusion Detection System
A system that keeps track of critical operating system files.
Hostname
DNS is where hostnames are most typically defined and utilized. The fully qualified DNS domain name of a system is often referred to as the hostname of that system.