Looks like no one added any tags here yet for you.
802.1X
The IEEE standard that defines port-based security for network access control.
Acceptable Use Policy (AUP)
A document that provides network and system users with clear direction on permissible uses of information resources.
Access Control List (ACL)
Rule that either permits or denies actions.
Active Reconnaissance
A technique that directly engages the target in intelligence gathering.
Adaptive Identity
Also called adaptive authentication, it considers multiple data points like user location and device.
Advanced Persistent Threats (APTs)
Cybersecurity adversaries characterized by a sophisticated series of related attacks taking place over an extended period.
Application Programming Interfaces (APIs)
APIs allow application developers to interact directly with a web service through function calls.
Asymmetric Key Algorithms
Cryptographic algorithms that use two different keys: one for encryption and another for decryption.
Backdoors
An opening left in a program application that allows additional access to data.
Behavior-based Detection
An intrusion discovery mechanism that finds abnormal and possible malicious activities by watching system behavior.
Brute-Force Attacks
A type of attack that systematically tries all possibilities for a password until successful.
Business Continuity and Disaster Recovery (BC-DR)
Outline the procedures and strategies to ensure essential business functions continue during and after a disaster.
Cloud Access Security Broker (CASB)
A security policy enforcement solution that enforces security policies across cloud providers.
Cryptanalysis
The study of methods to defeat codes and ciphers.
Data Exfiltration Attack
An attack where access to sensitive information is gained and then removed from an organization.
Denial-of-Service Attacks
Attacks that seek to disrupt services making them unavailable to legitimate users.
Encryption
The process of converting plain text into ciphertext to prevent unauthorized access.
Identity Theft
The unauthorized use of someone else's identity.
Intrusion Detection System (IDS)
A product that automates the inspection of audit logs and system events to detect intrusion attempts.
Vulnerability Management
A program used to detect weaknesses within an organization through scans and assessments.
Web Application Firewall (WAF)
A firewall specifically designed to protect web applications.
Zero Trust
A security model that presumes no trust boundary and requires continuous validation of all actions.
Phishing
A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
Malware
Malicious software designed to harm, exploit, or otherwise operate unauthorized or unwanted actions on computer systems.
Firewall
A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Social Engineering
Manipulative tactics used to trick individuals into revealing confidential or personal information.
Multi-Factor Authentication (MFA)
A security mechanism that requires more than one form of verification to access an account or system.
Tokenization
The process of replacing sensitive data with unique identification symbols that retain essential information about the data without compromising its security.
Patch Management
The process of managing updates for software applications and technologies to mitigate vulnerabilities.
Biometric Authentication
A security process that relies on the unique biological characteristics of individuals, such as fingerprints or facial recognition.
Security Information and Event Management (SIEM)
A software solution that aggregates and analyzes security data from across an organization to provide real-time insights.
Ransomware
A type of malware that encrypts a victim's files and demands payment for the decryption key.
Network Segmentation
The practice of dividing a computer network into smaller parts for improved security and performance.
Incident Response Plan
A set of instructions for responding to and managing cybersecurity incidents.
Security Awareness Training
Training provided to employees to help them recognize and respond to security threats.
Threat Intelligence
Information obtained from various sources to understand potential threats and vulnerabilities to an organization.
Data Loss Prevention (DLP)
A strategy for ensuring that sensitive data is not lost, misused, or accessed by unauthorized users.
Endpoint Security
The practice of securing endpoints or entry points of end-user devices, such as desktops and laptops.
Two-Factor Authentication (2FA)
A security process in which the user provides two different authentication factors to verify their identity.
Continuous Monitoring
The ongoing observation and analysis of systems and networks to detect anomalies and threats.
Cybersecurity Framework
A set of standards, guidelines, and best practices designed to manage cybersecurity-related risk.
Network Intrusion Prevention System (NIPS)
A network security technology that inspects network traffic for malicious activity and can take action.
Patch Management System
A system used to deploy updates and patches for software applications to mitigate security vulnerabilities.
Risk Assessment
The process of identifying, evaluating, and prioritizing risks to organizational assets.
Data Breach
An incident where unauthorized access to confidential data occurs.
Virtual Private Network (VPN)
A technology that creates a secure connection over the internet to protect data privacy.
Digital Forensics
The process of recovering, preserving, and analyzing data from digital devices in response to a cybersecurity incident.
Service-Level Agreement (SLA)
A contract that defines the level of service expected from a service provider.
Cyber Threat Hunting
Proactive searching for cyber threats that may have infiltrated a network.
Social Media Fraud
Fraudulent activities conducted through social media platforms to deceive individuals.
Incident Detection
The process of identifying cybersecurity incidents or breaches as they occur.
Digital Risk Protection
The practice of monitoring online threats and protecting an organizationās digital assets.
Secure Coding Practices
Methodologies used by developers to write code that is secure against vulnerabilities.
Data Encryption at Rest
Encryption of data that is stored on disk to prevent unauthorized access.
User Behavior Analytics (UBA)
The monitoring and analysis of user behaviors to detect potential insider threats.
SSL/TLS (Secure Sockets Layer/Transport Layer Security)
Protocols used to establish a secure connection between a client and a server.
Forensics Analysis
The examination of digital devices to uncover and analyze cyber incidents.
Supply Chain Security
The practice of ensuring the integrity and security of the supply chain process.
Security Policy
Formalized rules and guidelines that dictate how an organization's data and resources are protected.