a
- Access Control
- ACL
- Access Control Service
- Account Harvesting
- Active Content
- Activity Monitors
- Address Resolution Protocol
- ARP
- Admin privilege
- AES
- Advanced Encryption Standard
- ATP
- Advanced Threat Protection
- Adware
- Algorithm
- Amazon Web Services
- AWS
- Antivirus Software
- Applet
- Application
- API
- Application Programming Interface
- ARPANET
- Asset
- Asymmetric Cryptography
- Asymmetric Warfare
- Attack vector
- Auditing
- Authentication
- Authenticator
- Authenticity
- Authorization
- Autonomous System
- Availability
- Azure
b
- Backdoor
- Backend-as-a-Service
- BaaS
- Backend database
- Backup
- Bandwidth
- Bandwidth Control
- Banner
- Basic Authentication
- Behavior Monitoring
- Behavioral Analysis
- Big Data
- BIND
- Biometrics
- Bit
- Bitcoin
- Black Hat Hacker
- Blacklist
- Block Cipher
- Boot Record Infector
- Border Gateway Protocol
- BGP
- Bot/Botnet
- Branch Transformation
- Breach
- BYOD
- Bring Your Own Device
- British Standard 7799
- Broadcast
- Broadcast Address
- Browser
- Browser Isolation
- Brute force attack
- Buffer Overflow
- Bug
- BCP
- Business Continuity Plan
- BIA
- Business Impact Analysis
- Byte
c
- Cache
- Cache Cramming
- Cache Poisoning
- CAC
- Call Admission Control
- CAPTCHA
- Catfishing
- Certificate-Based Authentication
- CHAP
- Challenge-Handshake Authentication Protocol
- Checksum
- Cipher
- Ciphertext
- Clickjacking
- Client
- Closed Source
- Cloud
- Cloud Application
- Cloud Application Security Broker
- CASB
- Cloud Application Visibility
- Cloud Architecture
- Cloud Backup
- Cloud Computing
- Cloud Data Protection
- Cloud Enablement
- Cloud Firewall
- Cloud Firewall as a Service
- FWaaS
- Cloud Foundry
- Cloud Governance and Compliance
- CMP
- Cloud Management Platform
- Cloud Marketplace
- Cloud Migration
- Cloud Native
- Cloud Proxy
- Cloud Sandbox
- Cloud Security
- Cloud Security Gateway
- Cloud Security Posture Management
- CSPM
- CSP
- Cloud Service Provider
- Cloud Sourcing
- Cloud Storage
- Cloud Washing
- Collision
- CGI
- Common Gateway Interface
- Common Vulnerabilities and Exposures
- CVE
- Competitive Intelligence
- CERT
- Computer Emergency Response Team
- Computer Network
- CND
- Computer Network Defense
- Confidentiality
- Configuration Management
- Container
- Content Delivery Network
- Cookie
- Corruption
- Cost Benefit Analysis
- Countermeasure
- Covert Channels
- Crimeware
- Critical Infrastructure
- Cron
- Crossover Cable
- Crypojacking
- Cryptographic Algorithm or Hash
- Cryptography
- Customer Relationship Management
- Cut-Through
- Cyber Ecosystem
- Cyber Teams
- Cyberattack
- Cyberespionage
- Cybersecurity
- CRC
- Cyclic Redundancy Check
d
- Daemon
- Data Aggregation
- Data Breach
- Data Custodian
- Data Encryption
- Data Encryption Standard
- DES
- Data Integrity
- DLP
- Data Loss Prevention
- Data Mining
- Data Owner
- Data protection
- Data Theft
- Data Warehousing
- Database
- Datagram
- Day Zero
- Decapsulation
- Decrypt
- Decryption
- Deepfake
- Defacement
- Defense In-Depth
- Demilitarized Zone
- DMZ
- DOS
- Denial of Service
- DevOps
- Dictionary Attack
- Diffie-Hellman
- Digest Authentication
- Digital Certificate
- Digital Envelope
- Digital Forensics
- Digital Security
- Digital Signature
- DSA
- Digital Signature Algorithm
- DSS
- Digital Signature Standard
- Digital Transformation
- Direct-to-Internet / Direct-to-Cloud
- Disassembly
- Disaster Recovery Plan
- DRP
- Discretionary Access Control
- DAC
- Disruption
- Distance Vector
- DDoS
- Distributed Denial of Service
- Distributed Scans
- Domain
- Domain Hijacking
- Domain Name
- DNS
- Domain Name System
- Drive-By Download
- Due Care
- Due Diligence
- DumpSec
- Dumpster Diving
- Dynamic Link Library
- Dynamic Routing Protocol
e
- Eavesdropping
- Echo Reply
- Echo Request
- Egress Filtering
- Elasticity and Scalability
- Emanations Analysis
- Encapsulation
- Encode
- Encryption
- Encryption Key
- Enterprise Application
- ERP
- Enterprise Resource Planning
- Ephemeral Port
- Escrow Passwords
- Ethernet
- Ethical hacking
- Event
- Evergreen
- Exact Data Match
- EDM
- Exploit
- Exponential Backoff Algorithm
- Exposure
- Extended ACLs
- Extensibility
- EAP
- Extensible Authentication Protocol
- Exterior Gateway Protocol
- EGP
f
- False Rejects
- Fast File System
- Fast Flux
- Fault Line Attacks
- Federated Database
- File Transfer Protocol
- FTP
- Fileless Malware
- Filter
- Filtering Router
- Finger
- Fingerprinting
- Firewall
- Firmware
- Flame
- Flooding
- Forest
- Fork Bomb
- Form-Based Authentication
- Forward Lookup
- Forward Proxy
- Fragment Offset
- Fragment Overlap Attack
- Fragmentation
- Frames
- Full Duplex
- Fully-Qualified Domain Name
- Fuzzing
g
- Gateway
- gethostbyaddr
- gethostbyname
- GNU
- Gnutella
- Google Cloud Platform
- GCP
- Google Workspace
- Group Authenticator
h
- Hacker
- Hacktivism
- Hardening
- Hardware
- Hash
- Hash Function
- Header
- Hijack Attack
- Honeymonkey
- Honeypot
- Hops
- Host
- Host-Based ID
- Host Machine
- HTTP Proxy
- Hub
- Hybrid Attack
- Hybrid Cloud
- Hybrid Encryption
- Hyperlink
- Hypertext Markup Language
- HTML
- HTTP
- Hypertext Transfer Protocol
- HTTPS
- Hypertext Transfer Protocol Secure
- Hypervisor
i
- Identity
- Identity Check
- Identity Cloning
- Identity Fraud
- Identity Theft
- Incident
- Incident Handling
- Incident Response Plan
- Incremental Backups
- Inference Attack
- Information Security Policy
- Information Technology
- Infrastructure
- Infrastructure-As-A-Service
- IaaS
- Ingress Filtering
- Input Validation Attacks
- Insider Threat
- Integrated Development Environment
- IDE
- Integrity
- Integrity Star Property
- International Organization for Standardization
- ISO
- ITU-T
- International Telecommunications Union, Telecommunication Standardization Sector
- Internet
- Internet Control Message Protocol
- ICMP
- IETF
- Internet Engineering Task Force
- IMAP
- Internet Message Access Protocol
- IoT
- Internet of Things
- IP
- Internet Protocol
- IPsec
- Internet Protocol Security
- Internet Security
- ISP
- Internet Service Provider
- Internet Standard
- Interrupt
- Intranet
- Intrusion Detection System
- IDS
- IPS
- Intrusion Prevention System
- IP Address
- IP Flood
- IP Forwarding
- IP Spoofing
- Issue-Specific Policy
j
- Javascript
- JavaScript-Binding-Over-HTTP
- JBOH
- Jump Bag
k
- Kerberos
- Kernel
- Keylogger
l
- L2F
- Layer 2 Forwarding Protocol
- Layer 2 Tunneling Protocol
- L2TP
- Least-Privileged Access
- Legion
- Lightweight Directory Access Protocol
- LDAP
- Link Jacking
- Link State
- Linux
- List Based Access Control
- Load Balancing
- Loadable Kernel Modules
- LAN
- Local Area Network
- Local Internet Breakouts
- Log Clipping
- Logic Bombs
- Logic Gate
- Loopback Address
m
- MAC Address
- Machine Learning
- Malicious Code
- Malware
- MSP
- Managed Service Provider
- MAC
- Mandatory Access Control
- Masquerade Attack
- MD5 Hash
- Measures of Effectiveness
- MoE
- Metadata
- Microsegmentation
- Microsoft Azure
- Microsoft Office 365
- Middleware
- Mitigation Defense
- Monoculture
- Morris Worm
- Multi-Cast
- Multi-Cloud
- Multi-Homed
- Multiplexing
- Multitenant Cloud Architecture
n
- NIST
- National Institute of Standards and Technology
- National Security Agency
- NSA
- Natural Disaster
- Netmask
- Network Address Translation
- NAT
- Network-Based IDS
- Network Mapping
- Network Security
- Network Segmentation
- Network Taps
- Network Transformation
- Next-Generation Firewall
- NGFW
- Non-Printable Character
- Non-Repudiation
- Null Session
o
- Octet
- On-Demand Self Service
- On-Premise
- One-Way Encryption
- One-Way Function
- Open Shortest Path First
- OSPF
- Open Source
- Open Stack
- Open Systems Interconnection
- OSI
- OWASP
- Open Web Application Security Project
- Operational Technology Security
- OT
- OSI Layers
- Outsider Threat
- Outsourcing
- Overload
p
- Packet
- Packet Sniffing
- Packet Switched Network
- Partitions
- Password
- PAP
- Password Authentication Protocol
- Password Cracking
- Password Sniffing
- Patch
- Patch Management
- Patching
- Payload
- Payment Card Skimmers
- Pen Testing or Penetration Testing
- Penetration
- Permutation
- Persistent Threat
- Personal Cloud
- Personal Firewalls
- Pharming
- Phishing
- Piggyback Programs
- Ping of Death
- Ping Scan
- Ping Sweep
- Plaintext
- Platform
- Platform-as-a-Service
- PaaS
- Plugins
- Point of Sale Intrusions
- POS
- Point-to-Point Protocol
- PPP
- Point-to-Point Tunneling Protocol
- PPTP
- Poison Reverse
- Polyinstantiation
- Polymorphism
- Port
- Port Scan
- Possession
- Post Office Protocol, Version 3
- POP3
- Practical Extraction and Reporting Language
- Perl
- Preamble
- Pretty Good Privacy
- PGP
- Private Addressing
- Private Cloud
- Private Data
- Program Infector
- Program Policy
- Promiscuous Mode
- Proprietary Information
- Protocol
- Proxy Server
- Public Cloud
- Public Key
- PFS
- Public-Key Forward Secrecy
- PKI
- Public Key Infrastructure
q
- QAZ
r
- Ransomcloud
- Ransomware
- ReCAPTCHA
- Reconnaissance
- Reflexive ACLs
- Registry
- Regression Analysis
- Request for Comment
- RFC
- Resource
- Resource Exhaustion
- Response
- Restore
- RARP
- Reverse Address Resolution Protocol
- Reverse Engineering
- Reverse Lookup
- Reverse Proxy
- Risk
- Risk Assessment
- Risk Averse
- Risk Management
- RSA
- Rivest-Shamir-Adleman
- Role Based Access Control
- Root
- Rootkit
- Router
- RIP
- Routing Information Protocol
- Routing Loop
- RSBAC
- Rule Set Based Access Control
s
- S/Key
- Salesforce
- Sandboxing
- Scalability
- Scavenging
- Script
- SASE
- Secure Access Service Edge
- Secure Electronic Transactions
- SET
- SSH
- Secure Shell
- Secure Sockets Layer
- SSL
- SWG
- Secure Web Gateway
- Security as a Service
- Security Control
- SIEM
- Security Information and Event Management
- Security Perimeter
- Security Policy
- Segment
- Sensitive Information
- Server
- Service Level Agreement
- SLA
- Session
- Session Hijacking
- Session Key
- SHA1 Hash
- Shadow Password Files
- Share
- Shared Resources
- Shell
- Signals Analysis
- Signature
- Simple Integrity Property
- Simple Network Management Protocol
- SNMP
- Simple Security Property
- Smartcard
- Smurf Attack
- Sniffer
- Sniffing
- Social Engineering
- Socket
- Socket Pair
- SOCKS
- Software
- Software-as-a-Service
- SaaS
- SDP
- Software-Defined Perimeter
- Software-Defined Wide Area Network
- SD-WAN
- SDK
- Software Development Kit
- Software Stack
- Source Port
- Spam
- Spanning Port
- Spear Phishing
- Split Horizon
- Split Key
- Spoofing
- Spyware
- SQL Injection
- SSL Certificate
- SSL Decryption
- SSL Inspection
- Stack Mashing
- Standard ACLs
- Star Property
- State Machine
- Stateful Inspection
- Static Host Tables
- Static Routing
- Stealthing
- Steganalysis
- Steganography
- Store-and-Forward
- Straight-Through Cable
- Stream Cipher
- Strong Star Property
- Sub Network
- Subnet Mask
- SCADA
- Supervisory Control and Data Acquisition
- Supply Chain
- Switch
- Switched Network
- Symbolic Links
- Symmetric Cryptography
- Symmetric Key
- SYN Flood
- Synchronization
- Syslog
- System Security Officer
- SSO
- System-Specific Policy
t
- Tamper
- TCP Fingerprinting
- TCP Full Open Scan
- TCP Half Open Scan
- TCP/IP
- TCP Wrapper
- TCPDump
- TELNET
- Threat
- Threat Assessment
- Threat Model
- Threat Vector
- Time to Live
- Tiny Fragment Attack
- Token-Based Access Control
- Token-Based Devices
- Token Ring
- Topology
- Traceroute
- TCP
- Transmission Control Protocol
- TLS
- Transport Layer Security
- Trialware
- Triple DES
- Trojan Horse
- Trunking
- Trust
- Trusted Ports
- Tunnel
- Two-Factor Authentication
u
- UDP Scan
- Unauthorized Access
- Unicast
- Uniform Resource Identifier
- URI
- Uniform Resource Locator
- URL
- Unix
- Unprotected Share
- URL Filtering
- User
- User Contingency Plan
- UDP
- User Datagram Protocol
- User Experience
- UX
- UI
- User Interface
- User Space
v
- Vendor Lock-in
- Vertical Cloud
- Virtual Desktop Infrastructure
- VDI
- Virtual Machine
- VM
- Virtual Machine Monitor
- VMM
- VPN
- Virtual Private Network
- Virus
- Vishing
- Voice Firewall
- Voice Intrusion Prevention System
- Vulnerability
w
- War Chalking
- War Dialer
- War Driving
- Web of Trust
- Web Server
- White Hat / Black Hat
- White Hat Hacker
- Whitelist
- WHOIS
- Wi-Fi
- Windowing
- Windump
- Wired Equivalent Privacy
- WEP
- Wireless Application Protocol
- WAP
- Wiretapping
- World Wide Web
- WWW
- Worm
z
- Zero-day Attack
- Zero-day Exploit
- Zero Trust
- Zombie