
- a
- Access Control
- Access Control List
- Access Control Service
- Account Harvesting
- Account Hijacking
- ACL
- Active Content
- Activity Monitors
- Address Resolution Protocol
- Admin privilege
- Advanced Encryption Standard
- Advanced Threat Protection
- Adware
- AES
- Algorithm
- Amazon Web Services
- Antivirus Software
- API
- Applet
- Application
- Application Programming Interface
- ARP
- ARPANET
- Asset
- Asymmetric Cryptography
- Asymmetric Warfare
- ATP
- Attack vector
- Auditing
- Authentication
- Authenticator
- Authenticity
- Authorization
- Autonomous System
- Availability
- AWS
- Azure
- b
- BaaS
- Backdoor
- Backend-as-a-Service
- Backend database
- Backup
- Bandwidth
- Bandwidth Control
- Banner
- Basic Authentication
- BCP
- Behavior Monitoring
- Behavioral Analysis
- BGP
- BIA
- Big Data
- BIND
- Biometrics
- Bit
- Bitcoin
- Black Hat Hacker
- Blacklist
- Block Cipher
- Boot Record Infector
- Border Gateway Protocol
- Bot/Botnet
- Branch Transformation
- Breach
- Bring Your Own Device
- British Standard 7799
- Broadcast
- Broadcast Address
- Browser
- Browser Isolation
- Brute force attack
- Buffer Overflow
- Bug
- Business Continuity Plan
- Business Impact Analysis
- BYOD
- Byte
- c
- CAC
- Cache
- Cache Cramming
- Cache Poisoning
- Call Admission Control
- CAPTCHA
- CASB
- Catfishing
- CERT
- Certificate-Based Authentication
- CGI
- Challenge-Handshake Authentication Protocol
- CHAP
- Checksum
- Cipher
- Ciphertext
- Clickjacking
- Client
- Closed Source
- Cloud
- Cloud Application
- Cloud Application Security Broker
- Cloud Application Visibility
- Cloud Architecture
- Cloud Backup
- Cloud Computing
- Cloud Data Protection
- Cloud Enablement
- Cloud Firewall
- Cloud Firewall as a Service
- Cloud Foundry
- Cloud Governance and Compliance
- Cloud Management Platform
- Cloud Marketplace
- Cloud Migration
- Cloud Native
- Cloud Proxy
- Cloud Sandbox
- Cloud Security
- Cloud Security Gateway
- Cloud Security Posture Management
- Cloud Service Provider
- Cloud Sourcing
- Cloud Storage
- Cloud Washing
- CMP
- CND
- Collision
- Common Gateway Interface
- Common Vulnerabilities and Exposures
- Competitive Intelligence
- Computer Emergency Response Team
- Computer Network
- Computer Network Defense
- Confidentiality
- Configuration Management
- Container
- Content Delivery Network
- Cookie
- Corruption
- Cost Benefit Analysis
- Countermeasure
- Covert Channels
- Cracker
- CRC
- Crimeware
- Critical Infrastructure
- CRM
- Cron
- Crossover Cable
- Crypojacking
- Cryptographic Algorithm or Hash
- Cryptography
- CSP
- CSPM
- Customer Relationship Management
- Cut-Through
- CVE
- Cyber Ecosystem
- Cyber Teams
- Cyberattack
- Cyberespionage
- Cybersecurity
- Cyclic Redundancy Check
- d
- DAC
- Daemon
- Data Aggregation
- Data Breach
- Data Custodian
- Data Encryption
- Data Encryption Standard
- Data Integrity
- Data Loss Prevention
- Data Migration
- Data Mining
- Data Owner
- Data protection
- Data Theft
- Data Warehousing
- Database
- Datagram
- Day Zero
- DDoS
- Decapsulation
- Decrypt
- Decryption
- Deepfake
- Defacement
- Defense In-Depth
- Demilitarized Zone
- Denial of Service
- DES
- DevOps
- Dictionary Attack
- Diffie-Hellman
- Digest Authentication
- Digital Certificate
- Digital Envelope
- Digital Forensics
- Digital Security
- Digital Signature
- Digital Signature Algorithm
- Digital Signature Standard
- Digital Transformation
- Direct-to-Internet / Direct-to-Cloud
- Disassembly
- Disaster Recovery Plan
- Discretionary Access Control
- Disruption
- Distance Vector
- Distributed Denial of Service
- Distributed Scans
- DLP
- DMZ
- DNS
- Domain
- Domain Hijacking
- Domain Name
- Domain Name System
- DOS
- Drive-By Download
- DRP
- DSA
- DSS
- Due Care
- Due Diligence
- DumpSec
- Dumpster Diving
- Dynamic Link Library
- Dynamic Routing Protocol
- e
- EAP
- Eavesdropping
- Echo Reply
- Echo Request
- EDM
- EGP
- Egress Filtering
- Elasticity and Scalability
- Emanations Analysis
- Encapsulation
- Encode
- Encryption
- Encryption Key
- Enterprise Application
- Enterprise Resource Planning
- Ephemeral Port
- ERP
- Escrow Passwords
- Ethernet
- Ethical hacking
- Event
- Evergreen
- Exact Data Match
- Exploit
- Exponential Backoff Algorithm
- Exposure
- Extended ACLs
- Extensibility
- Extensible Authentication Protocol
- Exterior Gateway Protocol
- f
- False Rejects
- Fast File System
- Fast Flux
- Fault Line Attacks
- Federated Database
- File Transfer Protocol
- Fileless Malware
- Filter
- Filtering Router
- Finger
- Fingerprinting
- Firewall
- Firmware
- Flame
- Flooding
- Forest
- Fork Bomb
- Form-Based Authentication
- Forward Lookup
- Forward Proxy
- Fragment Offset
- Fragment Overlap Attack
- Fragmentation
- Frames
- FTP
- Full Duplex
- Fully-Qualified Domain Name
- Fuzzing
- FWaaS
- g
- Gateway
- GCP
- gethostbyaddr
- gethostbyname
- GNU
- Gnutella
- Google Cloud Platform
- Google Workspace
- Group Authenticator
- h
- Hacker
- Hacktivism
- Hardening
- Hardware
- Hash
- Hash Function
- Header
- Hijack Attack
- Honeymonkey
- Honeypot
- Hops
- Host
- Host-Based ID
- Host Machine
- HTML
- HTTP
- HTTP Proxy
- HTTPS
- Hub
- Hybrid Attack
- Hybrid Cloud
- Hybrid Encryption
- Hyperlink
- Hypertext Markup Language
- Hypertext Transfer Protocol
- Hypertext Transfer Protocol Secure
- Hypervisor
- i
- IaaS
- ICMP
- IDE
- Identity
- Identity Check
- Identity Cloning
- Identity Fraud
- Identity Theft
- IDS
- IETF
- IMAP
- Incident
- Incident Handling
- Incident Response Plan
- Incremental Backups
- Inference Attack
- Information Security Policy
- Information Technology
- Infrastructure
- Infrastructure-As-A-Service
- Ingress Filtering
- Input Validation Attacks
- Insider Threat
- Integrated Development Environment
- Integrity
- Integrity Star Property
- International Organization for Standardization
- International Telecommunications Union, Telecommunication Standardization Sector
- Internet
- Internet Control Message Protocol
- Internet Engineering Task Force
- Internet Message Access Protocol
- Internet of Things
- Internet Protocol
- Internet Protocol Security
- Internet Security
- Internet Service Provider
- Internet Standard
- Interrupt
- Intranet
- Intrusion Detection System
- Intrusion Prevention System
- IoT
- IP
- IP Address
- IP Flood
- IP Forwarding
- IP Spoofing
- IPS
- IPsec
- ISO
- ISP
- Issue-Specific Policy
- ITU-T
- j
- Javascript
- JavaScript-Binding-Over-HTTP
- JBOH
- Jump Bag
- k
- Kerberos
- Kernel
- Keylogger
- l
- L2F
- L2TP
- LAN
- Layer 2 Forwarding Protocol
- Layer 2 Tunneling Protocol
- LDAP
- Least-Privileged Access
- Legion
- Lightweight Directory Access Protocol
- Link Jacking
- Link State
- Linux
- List Based Access Control
- LKM
- Load Balancing
- Loadable Kernel Modules
- Local Area Network
- Local Internet Breakouts
- Log Clipping
- Logic Bombs
- Logic Gate
- Loopback Address
- m
- MAC
- MAC Address
- Machine Learning
- Malicious Code
- Malware
- Managed Service Provider
- Mandatory Access Control
- Masquerade Attack
- MD5 Hash
- Measures of Effectiveness
- Metadata
- Microsegmentation
- Microsoft Azure
- Microsoft Office 365
- Middleware
- Mitigation Defense
- MoE
- Monoculture
- Morris Worm
- MSP
- Multi-Cast
- Multi-Cloud
- Multi-Homed
- Multiplexing
- Multitenant Cloud Architecture
- n
- NAT
- National Institute of Standards and Technology
- National Security Agency
- Natural Disaster
- Netmask
- Network Address Translation
- Network-Based IDS
- Network Mapping
- Network Security
- Network Segmentation
- Network Taps
- Network Transformation
- Next-Generation Firewall
- NGFW
- NIST
- Non-Printable Character
- Non-Repudiation
- NSA
- Null Session
- o
- Octet
- On-Demand Self Service
- On-Premise
- One-Way Encryption
- One-Way Function
- Open Shortest Path First
- Open Source
- Open Stack
- Open Systems Interconnection
- Open Web Application Security Project
- Operational Technology Security
- OSI
- OSI Layers
- OSPF
- OT
- Outsider Threat
- Outsourcing
- Overload
- OWASP
- p
- PaaS
- Packet
- Packet Sniffing
- Packet Switched Network
- PAP
- Partitions
- Password
- Password Authentication Protocol
- Password Cracking
- Password Sniffing
- Patch
- Patch Management
- Patching
- Payload
- Payment Card Skimmers
- Pen Testing or Penetration Testing
- Penetration
- Perl
- Permutation
- Persistent Threat
- Personal Cloud
- Personal Firewalls
- PFS
- PGP
- Pharming
- Phishing
- Piggyback Programs
- Ping of Death
- Ping Scan
- Ping Sweep
- PKI
- Plaintext
- Platform
- Platform-as-a-Service
- Plugins
- Point of Sale Intrusions
- Point-to-Point Protocol
- Point-to-Point Tunneling Protocol
- Poison Reverse
- Polyinstantiation
- Polymorphism
- POP3
- Port
- Port Scan
- POS
- Possession
- Post Office Protocol, Version 3
- PPP
- PPTP
- Practical Extraction and Reporting Language
- Preamble
- Pretty Good Privacy
- Private Addressing
- Private Cloud
- Private Data
- Program Infector
- Program Policy
- Promiscuous Mode
- Proprietary Information
- Protocol
- Proxy Server
- Public Cloud
- Public Key
- Public-Key Forward Secrecy
- Public Key Infrastructure
- q
- QAZ
- r
- Race Condition
- Ransomcloud
- Ransomware
- RARP
- ReCAPTCHA
- Reconnaissance
- Reflexive ACLs
- Registry
- Regression Analysis
- Request for Comment
- Resource
- Resource Exhaustion
- Response
- Restore
- Reverse Address Resolution Protocol
- Reverse Engineering
- Reverse Lookup
- Reverse Proxy
- RFC
- RIP
- Risk
- Risk Assessment
- Risk Averse
- Risk Management
- Rivest-Shamir-Adleman
- Role Based Access Control
- Root
- Rootkit
- Router
- Routing Information Protocol
- Routing Loop
- RSA
- RSBAC
- Rule Set Based Access Control
- s
- S/Key
- SaaS
- Salesforce
- Sandboxing
- SASE
- SCADA
- Scalability
- Scavenging
- Script
- SD-WAN
- SDK
- SDP
- Secure Access Service Edge
- Secure Electronic Transactions
- Secure Shell
- Secure Sockets Layer
- Secure Web Gateway
- Security as a Service
- Security Control
- Security Information and Event Management
- Security Perimeter
- Security Policy
- Segment
- Sensitive Information
- Separation of Duties
- Server
- Service Level Agreement
- Session
- Session Hijacking
- Session Key
- SET
- SHA1 Hash
- Shadow Password Files
- Share
- Shared Resources
- Shell
- SIEM
- Signals Analysis
- Signature
- Simple Integrity Property
- Simple Network Management Protocol
- Simple Security Property
- SLA
- Smartcard
- Smurf Attack
- Sniffer
- Sniffing
- SNMP
- Social Engineering
- Socket
- Socket Pair
- SOCKS
- Software
- Software-as-a-Service
- Software-Defined Perimeter
- Software-Defined Wide Area Network
- Software Development Kit
- Software Stack
- Source Port
- Spam
- Spanning Port
- Spear Phishing
- Split Horizon
- Split Key
- Spoofing
- Spyware
- SQL Injection
- SSH
- SSL
- SSL Certificate
- SSL Decryption
- SSL Inspection
- SSO
- Stack Mashing
- Standard ACLs
- Star Property
- State Machine
- Stateful Inspection
- Static Host Tables
- Static Routing
- Stealthing
- Steganalysis
- Steganography
- Store-and-Forward
- Straight-Through Cable
- Stream Cipher
- Strong Star Property
- Sub Network
- Subnet Mask
- Supervisory Control and Data Acquisition
- Supply Chain
- SWG
- Switch
- Switched Network
- Symbolic Links
- Symmetric Cryptography
- Symmetric Key
- SYN Flood
- Synchronization
- Syslog
- System Security Officer
- System-Specific Policy
- t
- Tamper
- TCP
- TCP Fingerprinting
- TCP Full Open Scan
- TCP Half Open Scan
- TCP/IP
- TCP Wrapper
- TCPDump
- TELNET
- Threat
- Threat Assessment
- Threat Model
- Threat Vector
- Time to Live
- Tiny Fragment Attack
- TLS
- Token-Based Access Control
- Token-Based Devices
- Token Ring
- Topology
- Traceroute
- Transmission Control Protocol
- Transport Layer Security
- Trialware
- Triple DES
- Trojan Horse
- Trunking
- Trust
- Trusted Ports
- Tunnel
- Two-Factor Authentication
- u
- UDP
- UDP Scan
- UI
- Unauthorized Access
- Unicast
- Uniform Resource Identifier
- Uniform Resource Locator
- Unix
- Unprotected Share
- URI
- URL
- URL Filtering
- User
- User Contingency Plan
- User Datagram Protocol
- User Experience
- User Interface
- User Space
- UX
- v
- VDI
- Vendor Lock-in
- Vertical Cloud
- Virtual Desktop Infrastructure
- Virtual Machine
- Virtual Machine Monitor
- Virtual Private Network
- Virus
- Vishing
- VM
- VMM
- Voice Firewall
- Voice Intrusion Prevention System
- VPN
- Vulnerability
- w
- WAP
- War Chalking
- War Dialer
- War Driving
- Web of Trust
- Web Server
- WEP
- White Hat / Black Hat
- White Hat Hacker
- Whitelist
- WHOIS
- Wi-Fi
- Windowing
- Windump
- Wired Equivalent Privacy
- Wireless Application Protocol
- Wiretapping
- World Wide Web
- Worm
- WWW
- z
- Zero-day Attack
- Zero-day Exploit
- Zero Trust
- Zombie