Cybersecurity Glossary
0-9
A
- A/B Testing
- A Record
- ABEND
- Accelerated Mobile Pages
- Acceptable use policy
- Access control entry
- Access Control List (ACL)
- Access Control
- Access layer
- Access management
- Access Point Name
- Access Point
- Access Token
- Accessibility
- Account compromise
- Account Theft
- ACID
- Activation code
- Active attack
- Active content
- Active defense
- Active Directory
- Active Surveillance
- ActiveX
- Ad Blockers
- Ad Fraud
- Ad-Hoc Network
- Adaptive authentication
- Address Bus
- Address space
- ADFGVX cipher
- Administrative privileges
- Advanced evasion technique
- Advanced metering infrastructure
- Adversarial Attack
- Adversary group naming
- Adware
- AES-256
- AES (Advanced Encryption Standard)
- Affiliate Marketing
- AFTS
- Aggregation Attack
- Agile Business
- Agile Development
- AI Bias
- AI Ethics
- AI in Cybersecurity
- AI Security
- AI TRiSM
- AIOps
- Air gap
- Airflow Management
- AJAX (Asynchronous JavaScript and XML)
- Alert fatigue
- Algorithm
- Algorithmic Fairness
- Allowlist
- Alpha Testing
- AlphaGo
- Alphanumeric password
- Alternative routing
- Amazon Web Services (AWS)
- Amplification Attack
- Analog computer
- Analysis Paralysis
- Android package kit
- Angler phishing
- Anna Kournikova virus
- Anomaly Detection
- Anomaly in Databases
- Anonymity
- Anonymization
- Anonymizer
- Anonymous call rejection
- Anonymous hackers
- Anonymous Proxy
- Anonymous Reporting
- Answer-seizure ratio
- Anti-malware
- Anti-patterns
- Anti-phishing service
- Anti-spam
- Anti-spyware
- Antivirus scanner
- Antivirus
- Anycast
- API Keys
- API (Application Programming Interface)
- App Permissions
- App Store
- Application acceleration
- Application awareness
- Application-centric infrastructure
- Application client
- Application Control
- Application delivery controller
- Application delivery network
- Application delivery
- Application deployment
- Application gateway
- Application hosting
- Application layer
- Application-Level Gateway
- Application log
- Application management
- Application performance monitoring
- Application program
- Application programming interface
- Application Security
- Application server
- Application virtualization
- Advanced Persistent Threat (APT)
- Arbitrary code execution
- Archiving
- Area border router
- Arithmetic logic unit
- Arithmetic Overflow
- ARM processor
- ARP Spoofing
- ARP
- ARPANET
- Artificial intelligence
- AS1 (Applicability Statement 1)
- AS2 (Applicability Statement 2)
- ASCII
- ASLR
- Assembler
- Asset Management
- Asymmetric Encryption
- Asynchronous Transfer Mode
- Asynchronous transmission
- Atbash Cipher
- ATM jackpotting
- ATM Security
- Attack signature
- Attack surface
- Attack taxonomy
- Attack Vector
- Attribute-Based Access Control (ABAC)
- Attribute value pair
- Attribution Problem
- Auction fraud
- Audit log
- Audit trail
- Augmented intelligence
- Authentication Protocol
- Authentication server
- Authentication
- Authorization Code
- Authorization
- Authorized push payment fraud
- Auto attendant
- Automated Testing
- Automatic Call Distributor (ACD)
- Automatic content recognition
- Automatic repeat request
- Automation platform
- Automation
- Autonomic network
- Autonomous intelligence
- Autonomous system
- Autonomous Vehicles
- Autorun worm
- Azure Active Directory (Azure AD)
B
- Backbone Area
- Backdoor
- Backhaul
- Backporting
- Backpropagation
- Backtracking
- Backup and Recovery
- Backup as a Service
- Backup (n.)
- Backward Compatibility
- BACnet
- Bad Sector
- BadUSB
- Baiting
- Bak file
- Balanced Scorecard
- Bandwidth-Intensive Activities
- Bandwidth Management
- Bandwidth meter
- Bandwidth Theft
- Bandwidth
- Bank Drop
- Banker Trojan
- Bare-metal provisioning
- Base address
- Baseboard management controller
- Baseline configuration
- Baselining
- Basic Authentication
- Bastion host
- Batch Processing
- Baud rate
- Bcrypt
- Beaconing
- Bearer protocol
- Behavior Analytics
- Behavior-based Detection
- Behavior monitoring
- Bell-LaPadula Model
- Beta Testing
- BGP
- BGPsec
- Biba Model
- Big Data
- BIN Attack
- Binary code analysis
- Binary Code
- Binary
- Biometric data
- Biometric Scanners
- Biometric spoofing
- Biometrics
- BIOS password
- BIOS rootkit
- BIOS
- Biphase Encoding
- Birthday attack
- Bit Error Rate
- Bit-flipping attack
- Bit
- Bitbucket
- BitLocker
- Bitrate
- Bitwise Operation
- Black hat hacker
- Black Hat SEO
- BlackEnergy
- Blackholing
- Blacklist
- Bladabindi
- Blade Server
- Blended threat
- Bloatware
- Block cipher
- Block size
- Block Storage
- Blockchain
- Blocklist
- Blue hat hacker
- Blue Pill attack
- Blue Screen of Death (BSoD)
- Blue team
- BlueBorne
- Bluebugging
- Bluejacking
- Bluesnarfing
- Bluetooth Hacking
- Bluetooth Sniffing
- Bluetooth
- Bogon filtering
- Bonjour Protocol
- Boolean Algebra
- Boolean logic
- Boolean Operators
- Boot Disk
- Boot Image
- Boot sector virus
- Bootable USB
- Booter
- Bootkit
- Bootloader
- Bot herder
- Bot mitigation
- Bot
- Botnet
- Bounce Rate
- Boundary Protection
- Bridge Protocol Data Units (BPDU)
- Branch Prediction
- Branching and Merging
- Brandjacking
- Bricking
- Bridge ID
- Bridge mode
- Broadband over power line
- Broadband router
- Broadband
- Broadcast address
- Broadcast Domain
- Broadcast Storm
- Broadcast
- Broken access control
- Broken authentication attack
- Browser Extension
- Browser hijacker
- Browser isolation
- Browser sandboxing
- Brute-force attack
- Buffer Overflow
- Bug Bounty Program
- Bug
- Building Automation System (BAS)
- Bulk data transfer
- Bullet camera
- Bus Arbitration
- Bus Network
- Business Continuity
- Business email compromise
- Business Intelligence
- Business Process Automation
- Business Process Management (BPM)
- BYOD (Bring Your Own Device)
- Byte
- Byzantine fault tolerance
- Bundling
C
- C&C server
- Cache Eviction
- Cache hit
- Cache invalidation
- Cache Memory Attacks
- Cache Memory
- Cache miss
- Cache server
- Caching proxy
- Caching
- Caesar Cipher
- Call detail record
- Call Routing
- Call Stack
- Call-to-Action (CTA)
- Campus area network
- Canary token
- Canonical name
- Capacity Planning
- CAPTCHA
- Captive portal
- Capture The Flag (CTF)
- Carberp
- Card purchase authorization
- Card testing
- Cardinality
- Carding
- Carrier Ethernet
- Catfishing
- California Consumer Privacy Act (CCPA)
- CCTV
- CDN (Content Delivery Network)
- CDR Analysis
- Cellular Jamming
- Cellular Network Security
- Cellular network
- Censorship Circumvention
- Censorship
- CEO fraud
- Cerber ransomware
- Certificate Authority (CA)
- Certificate-based authentication
- Certificate management
- Certificate pinning
- Certificate Revocation
- CGNAT
- ChaCha20
- Chaffing and winnowing
- Chain of Custody
- Change Control
- Change Management
- Challenge Handshake Authentication Protocol (CHAP)
- Character Encoding
- Character set
- Chargeware
- Chatbot
- Check-in/Check-out
- Checksum
- Child Exploitation
- Chosen plaintext attack
- Continuous Integration/Continuous Deployment (CI/CD)
- CIDR
- CIEM
- Cipher suite
- Ciphertext
- Circuit-level gateway
- Circuit Switching
- CIS Controls
- Complex Instruction Set Computing (CISC)
- Cisco IOS
- Civil Liberties
- Clark-Wilson Model
- Class A IP address
- Class B IP address
- Class C IP address
- Class D IP address
- Class E IP address
- Class of Service
- Classful Network
- Classified Information
- Clean Code
- Clean fraud
- Clean install
- Click Fraud
- Clickjacking
- Clicktivism
- Client-Server Model
- Client-server network
- Client-Side Attacks
- Cloaking
- Clock Speed
- Clocking
- Clop ransomware
- Closed Source
- Closed System
- Cloud architecture
- Cloud archiving
- Cloud as a service
- Cloud attack
- Cloud Automation
- Cloud Backup
- Cloud-based supercomputing
- Cloud Collaboration
- Cloud Computing
- Cloud containers
- Cloud data platform
- Cloud database
- Cloud forensics
- Cloud Hosting
- Cloud Infrastructure
- Cloud Migration
- Cloud networking
- Cloud operating system
- Cloud security posture management
- Cloud Security
- Cloud server
- Cloud Storage
- Cloud VPN
- Cloud VPS
- CWPP
- CloudTrust protocol
- CLSID
- Cluster analysis
- Cluster controller
- Clustering
- CNAPP
- Co-location
- COBIT
- Code Compilation
- Code generator
- Code injection
- Code management
- Code morphing
- Code Optimization
- Code Review
- Code signing
- Code Smell
- Codec
- Coding
- Cognitive computing
- Cold boot
- Cold data
- Cold Site
- Collaboration Tools
- Collaborative Filtering
- Collaborative Software
- Collision domain
- Collision
- COM Objects
- COMINT
- Command and Control (C2)
- Command Execution
- Command injection
- Command-line interface
- Command-Line Shell
- Commit
- Committed information rate
- Communications system
- Compatibility Testing
- Compatibility
- Compiler Optimization
- Compiler
- Compliance Audit
- Compliance Framework
- Compliance Management
- Component-Based Development
- Compressed file
- Compression
- Compute platforms
- Compute security
- Computer Malfunction
- Computer network defense
- Computer network operations
- Computer system
- Computer virus
- Computer Vision
- COMSEC
- Concurrency control
- Concurrency
- Condition-Based Maintenance
- Conditional Statements
- Conficker
- Configuration file
- Configuration Management
- Conflict Resolution
- Connected Vehicle Technology
- Connected Vehicles
- Connection-oriented protocol
- Connectionless Protocol
- Consensus Algorithms
- Consensus Mechanism
- Consent Management
- Constant-Time Algorithms
- Consumer electronics
- Contactless Payment
- Container breakout
- Container Format
- Container isolation
- Container scanning
- Container Security
- Containerization
- Content-Based Filtering
- Content Encryption
- Content Filtering
- Content Management System
- Content Scraping
- Content security policy
- Context-aware Authentication
- Context Delivery Architecture
- Control bus
- Control Flow
- Control framework
- Control network
- Control plane
- Control structure
- Control unit
- Converged infrastructure
- Conversation hijacking
- Conversion Rate Optimization (CRO)
- Cookie Encryption
- Cookie hash
- Cookie Poisoning
- Cookie stuffing
- Cookie theft
- Cookie
- Copy-paste compromise
- Copy protection
- Copyright Infringement
- CoreBot
- Correlation Attack
- Cross-Origin Resource Sharing (CORS)
- Counterfeit Software
- Country code top-level domain
- Covert channel
- CPU Bound
- CPU Cache
- CPU contention
- CPU Cores
- CPU Pipeline
- CPU Scheduling
- CPU utilization
- CPU (Central Processing Unit)
- Cracker
- Crash Dump
- Cyclic Redundancy Check (CRC)
- Credential harvesting
- Credential stuffing
- Credentials
- Credit Freeze
- Credit Monitoring
- Credit Report
- Creeper virus
- Creepware
- Crisis Management
- Critical Infrastructure Protection
- Critical Infrastructure
- CRLF injection
- Cross-Border Data Transfer
- Cross-Browser Testing
- Cross-Frame Scripting
- Cross-Functional Teams
- Cross-platform
- Crossover cable
- Cryptanalysis
- CryptBot
- Crypto malware
- Crypto shredding
- Cryptocurrency Mining
- Cryptocurrency
- Cryptographic algorithm
- Cryptographic Attack
- Cryptographic Hash
- Cryptographic key
- Cryptographic protocol
- Cryptographic Techniques
- Cryptographic Vulnerability
- Cryptography
- Cryptojacking
- Cryptosystem
- Cryptovirus
- Cryptowall
- CSCW
- CSIRT
- Cross-Site Request Forgery (CSRF)
- CTB locker
- Curation
- Custom ROMs
- Customer edge router
- CVE
- CVSS
- Cyber attribution
- Cyber Communication
- Cyber Deception
- Cyber Forensics
- Cyber harassment
- Cyber Hygiene
- Cyber incident
- Cyber insurance
- Cyber operations
- Cyber-physical attack
- Cyber-Physical Systems
- Cyber privateering
- Cyber range
- Cyber Resilience
- Cyber Safety
- Cyber Threat Analysis
- Cyber vandalism
- Cyber vigilantism
- Cyberattack
- Cyberbullying
- Cybercrime
- Cyberlibel
- Cyberlocker
- Cybersecurity Awareness
- Cybersecurity Competition
- Cybersecurity ecosystem
- Cybersecurity Maturity Model Certification
- Cybersecurity Measures
- Cybersecurity mesh
- Cybersecurity Policy
- Cybersecurity Risk
- Cybersecurity Standards
- Cybersecurity
- Cyberspace
- Cybersquatting
- Cyberstalking
- Cyberterrorism
- Cyberthreat
- Cyberwarrior
- Cybersecurity Risks of Public Wi-Fi
D
- Daemon
- Daisy chain routers
- Dangling pointer
- Dark Fiber
- Dark patterns
- Dark web
- DarkHotel
- Darknet Marketplaces
- Data access
- Data acquisition
- Data administration
- Data aggregation
- Data Analytics
- Data asset
- Data-at-rest Encryption
- Data at rest
- Data audit
- Data availability
- Data bank
- Data Blocking
- Data Blocks
- Data Breach Insurance
- Data breach
- Data bus
- Data Center Cooling
- Data center design
- Data Center Efficiency
- Data Center Infrastructure Management (DCIM)
- Data center proxy
- Data Center Rack
- Data center storage
- Data center tiers
- Data center virtualization
- Data Center
- Data-centric security
- Data Classification
- Data Cleansing
- Data Cleanup
- Data Consistency
- Data conversion
- Data corruption
- Data custodian
- Data deduplication
- Data Definition Language (DDL)
- Data diddling
- Data Diode
- Data-driven
- Data Encryption Key (DEK)
- Data Encryption Standard (DES)
- Data Entry
- Data Erasure
- Data Exchange
- Data Execution Prevention (DEP)
- Data Flow Analysis
- Data flow model
- Data governance framework
- Data Governance
- Data hiding
- Data in motion
- Data in Transit
- Data Integration
- Data integrity
- Data intelligence
- Data key
- Data lake
- Data Leak
- Data Lifecycle Management
- Data link layer
- Data Localization
- Data logging
- Data loss prevention
- Data loss
- Data Manipulation Language
- Data Manipulation
- Data marketplace
- Data masking
- Data migration
- Data Minimization
- Data mining
- Data Normalization
- Data Owner
- Data plane
- Data poisoning
- Data Privacy
- Data profiling
- Data Protection Officer (DPO)
- Data protection policy
- Data Quality Management
- Data Quality
- Data Recovery
- Data Redundancy
- Data remanence
- Data Retention Laws
- Data Retention
- Data retrieval
- Data sanitization
- Data Security
- Data segregation
- Data source
- Data sovereignty
- Data Steward
- Data subject
- Data terminal equipment
- Data theft
- Data transfer
- Data transmission
- Data Type
- Data validation
- Data vaulting
- Data verification
- Data Visualization
- Data warehouse
- Data wiping
- Database Backup
- Database Constraints
- Database Indexing
- Database Optimization
- Database replication
- Database Schema
- Database Security
- Datafication
- Datagram
- Datastore
- Database Management System (DBMS)
- Dcs1000
- DD-WRT
- DDoS (Distributed Denial of Service)
- DDR3
- DDR4
- Dead-box forensics
- Dead code
- Debug symbols
- Debugger
- Decapsulation
- Decentralization
- Decentralized Application (DApp)
- Decentralized Identifiers (DIDs)
- Decentralized Network
- Decentralized Systems
- Decentralized Web
- Declassification
- Decoding
- Decoherence
- Decoy
- Decryption Algorithm
- Dedicated Internet Access
- Dedicated IP
- Dedicated server
- Deep Learning
- Deep Packet Inspection (DPI)
- Deep Web
- Deepfake
- Default gateway
- Default password
- Defense In-Depth
- Defense Industrial Base (DIB)
- Deflection routing
- Delta rule
- Demand Response
- Demultiplexing
- Denormalization
- Deobfuscate
- Dependency Injection
- Dependency
- Deprecation
- Deserialization
- Deterministic System
- Developer Options
- Device Fingerprinting
- Device Management
- DevOps
- DevSecOps
- DFIR
- DHCP attack
- DHCP proxy
- DHCP Snooping
- DHCP
- Dial-Up Connection
- Dialog box
- Dictionary attack
- Differential Backups
- Differential fault analysis attack
- Differential Manchester Encoding
- Differential privacy
- Diffie-Hellman
- Digest authentication
- Digital Asset Management
- Digital certificate
- Digital Citizenship
- Digital Communication
- Digital Computer
- Digital data
- Digital Detox
- Digital dystopia
- Digital envelope
- Digital Evidence
- Digital exhaust
- Digital Experience Monitoring
- Digital fingerprint
- Digital footprint
- Digital Governance
- Digital identity
- Digital Legacy
- Digital optimization
- Digital Performance Management
- Digital Preservation
- Digital signature algorithm
- Digital Signature
- Digital switch
- Digital twin
- Digital Wallets
- Digital watermarking
- Digitalization
- Digitization
- Dijkstra Algorithm
- Direct connection
- Directory traversal attack
- Dirty bit
- Disassociation attack
- Disaster Recovery as a Service (DRaaS)
- Disaster Recovery
- Discretionary Access Control
- Disinformation
- Disk-Based Storage
- Disk Cloning
- Disk defragmentation
- Disk Forensics
- Disk Partitioning
- Disk Scrubbing
- Distance vector
- Distorting proxy
- Distributed Computing
- Distributed Energy Resources (DER)
- Distributed firewalls
- Distributed Ledger Technology (DLT)
- Distributed network
- Distributed system
- Diverse Routing
- Diversity in Cybersecurity
- DKIM (DomainKeys Identified Mail)
- DLL hijacking
- DLL injection
- DMA Attack
- DMA (Direct Memory Access)
- DMCA
- Demilitarized Zone (DMZ)
- DNS AAAA record
- DNS blocking
- DNS cache
- DNS client
- DNS encryption
- DNS failover
- DNS filtering
- DNS firewall
- DNS flushing
- DNS hijacking
- DNS hosting
- DNS load balancing
- DNS MX record
- DNS port
- DNS propagation
- DNS proxy
- DNS PTR record
- DNS query
- DNS rebinding attack
- DNS record
- DNS redundancy
- DNS reflection attack
- DNS round-robin
- DNS sinkhole
- DNS SOA record
- DNS SPF record
- DNS Spoofing
- DNS SRV record
- DNS TTL
- DNS tunneling
- DNS TXT record
- DNS zone
- DNS (Domain Name System)
- DNSSEC
- Docker Security
- Docker
- Document Management System (DMS)
- Document versioning
- Domain admin
- Domain controller
- Domain shadowing
- Domain spoofing
- Domain
- Donationware
- Dotted decimal notation
- Double tagging
- Downloader trojan
- Downtime
- Doxing
- DRAM (Dynamic Random Access Memory)
- Dridex
- Drive-by attack
- Driver
- DRM-free
- Digital Rights Management (DRM)
- Dropper
- Dropshipping
- DSL (Digital Subscriber Line)
- DSLAM
- Dedicated Short-Range Communication (DSRC)
- Dual-homed host
- Dumpster diving attack
- Duqu
- Dwell time
- Dynamic analysis
- Dynamic Application Security Testing (DAST)
- Dynamic Code Analysis
- Dynamic DNS
- Dynamic IP
- Dynamic library
- Dynamic Memory Allocation
- Dynamic ports
- Dynamic Routing
- Dynamic website
- Dyreza
E
- E-commerce
- E-government
- Extensible Authentication Protocol (EAP)
- East-West Traffic
- Eavesdropping
- Elastic Compute Cloud (EC2)
- ECM
- Edge caching
- Edge Computing
- Edge gateway
- EDI (Electronic Data Interchange)
- Electronic Discovery (eDiscovery)
- Egosurfing
- Egress filtering
- Egress traffic
- EHR Security
- EIGRP
- Elastic IP address
- Electromagnetic Eavesdropping
- Electromagnetic Interference (EMI)
- Electronic intelligence
- Electronic signature
- Electronic Warfare
- Elliptic-curve cryptography
- Elliptic Curve Digital Signature Algorithm (ECDSA)
- Elliptic-Curve Discrete Logarithm Problem
- Email Attachment
- Email Authentication
- Email bomb
- Email Filtering
- Email gateway
- Email retention policy
- Email Security
- Email signature
- Email Tracking
- Email virus
- Embedded intelligence
- Embedded Systems
- Embezzlement
- Emission security
- Emoji
- Emotet
- Emoticon
- Emotion recognition
- Emulator
- EMV Card
- Encapsulating security payload
- Encoding
- Encrypted file transfer
- Encryption Algorithm
- Encryption as a service
- Encryption key
- Encryption Protocols
- Encryption
- End-of-Life (EOL)
- End-to-end encryption
- End-User Experience Monitoring
- Endpoint Detection and Response (EDR)
- Endpoint device
- Endpoint security
- Energy Star Certification
- Enterprise Mobility Management (EMM)
- Erasure coding
- Error Checking
- Error control
- Error-Correcting Code (ECC)
- Error detection and correction
- Escrow Passwords
- Espionage
- ETags
- EternalBlue
- Ethernet Cable
- Ethernet Frame
- Ethernet Over Power (EOP)
- Ethernet Passive Optical Network (EPON)
- Ethernet Port
- Ethernet
- EtherType
- Ethical Hacker
- ETL (Extract, Transform, Load)
- End-User License Agreement (EULA)
- Evasion Attacks
- Event-driven Architecture
- Event log
- Evil maid attack
- Evil twin
- Evolutionary computation
- Evolutionary Robotics
- Exception Handling
- Exfiltration
- Exif Data
- Exit node
- Expert system
- Exploit-as-a-service (EaaS)
- Exploit chain
- Exploit kit
- Exploit
- Exploitability
- Exponential Distribution
- Expression language injection
- Ext4 (Fourth Extended Filesystem)
- Extended ACLs
- Extensibility
- Exterior gateway protocol
- External Hard Drive
- Extraction
- Extranet
- Extreme Programming (XP)
F
- Face ID
- Facebook stalking
- Facial recognition
- Factory Reset Protection (FRP)
- Factory reset
- Factory Settings
- Failover
- Fake antivirus
- False flag
- False Negative
- Faraday Pouch
- Fast flux
- FAT32 (File Allocation Table 32)
- Fault injection attack
- Fault tolerance
- Fiber Channel Switch
- Fiber Channel
- Fiber Distributed Data Interface
- Fiber Optic Cable
- Fiber-Optic Internet
- Fiber optic switch
- Fiber to the Home (FTTH)
- Fiber to the Node
- FIDO (Fast Identity Online)
- Fieldbus
- File Allocation Table
- File binder
- File Encryption
- File format
- File hash
- File-hosting service
- File integrity monitoring
- File-Level Encryption
- File Locking
- File Permissions
- File Sharing
- File signature
- File System
- Fileless attacks
- FileRepMalware
- FileVault
- Fingerprinting
- Finite field
- FIPS compliance
- Firesheep
- Firewall rules
- Firewall
- Firmware Attacks
- Firmware over-the-air
- Firmware
- First-party cookie
- Flaming
- Flash cookies
- Flash Memory
- Flash
- Flat file
- Flooder
- Flow routing
- Fog computing
- Footprinting
- Forecasting
- Foreign Key
- Forensic Analysis
- Fork bomb
- Form authentication
- Format string attack
- Formjacking
- Forward compatibility
- Forward DNS
- Forward Error Correction
- Forward proxy
- Forwarding Tables
- FOSS
- Four-way handshake
- FPS
- Fragment overlap attack
- Frame Busting
- Frame
- Frape
- Fraud Alert
- Fraud as a Service
- Fraud Detection
- Fraud
- Fraudulent Transactions
- Freedom of information
- Freemium
- Freeware
- Frequency Analysis
- Frequency Band
- Frequency-Division Multiplexing (FDM)
- FTP proxy
- FTP
- Full Backup
- Full-Disk Encryption
- Full duplex
- Fullz
- Function as a Service (FaaS)
- Functional dependency
- Fuzz testing
- FWaaS
G
- Gamification
- GandCrab
- Garbage Collection
- Garbage in, garbage out
- Garlic routing
- Gatekeeper
- Gateway server
- Gateway
- GDPR
- General packet radio service
- Generative Adversarial Networks (GANs)
- Generative AI
- Generic routing encapsulation
- Genetic Algorithm
- Geo-blocking
- Geo-Restrictions
- Geospatial Analysis
- Geotag Removal Tools
- Geotagging
- GHOST bug
- GhostNet
- Ghostware
- Gigabit Ethernet
- Gigabit interface converter
- GIS (Geographic Information Systems)
- Git
- GitHub
- GUID
- Globbing
- Gnosticplayers
- Golden ticket attack
- Google dorking
- Gopher protocol
- Government surveillance
- GPS jamming
- GPU Acceleration
- Graphics Processing Unit (GPU)
- Gradient Descent
- Granularity
- Gray hat hacker
- Graymail
- Green Data Center
- Green hat hacker
- Greylist
- Greyware
- Grid computing
- Griefing
- Group Policy
- Groupware
- Grover's Algorithm
- Gated Recurrent Unit (GRU)
- GSM
- GSSAPI
- Guessing entropy
- Graphical User Interface (GUI)
H
- Hackathon
- Hacking
- Hackintosh
- Hacktivism
- Half duplex
- Halt and Catch Fire
- Hamming Code
- Hamming distance
- Handshake protocol
- Hard Drive
- Hard link
- Hard reboot
- Hard reset
- Hardening
- Hardware acceleration
- Hardware-Enforced Virtualization
- Hardware Failure
- Hardware identification
- Hardware Security Module (HSM)
- Hardware Security
- Hardware virtualization
- Hardware Wallet
- Hash chain
- Hash function
- Hashing
- HDMI (High-Definition Multimedia Interface)
- Headless system
- Health Tech
- Heap spray
- Heat Maps
- HermeticWiper
- Heuristic analysis
- Heuristic virus
- Hexadecimal
- Hexdump
- High Availability
- High-Performance Computing (HPC)
- High-Speed Serial Interface
- Hoax
- Home Automation
- Home server
- Homograph attack
- Homomorphic encryption
- HoneyMonkey
- Honeynet
- Honeytoken
- Hop count
- Host address
- Host-based firewall
- Host-Based Intrusion Detection System (HIDS)
- Host security
- Host virtual machine
- Hostname
- Hosts file
- Hot Aisle/Cold Aisle
- Hot site
- Hot spare
- Hotlink
- Hotspot Security
- HTTP Strict Transport Security (HSTS)
- HTML Injection
- HTML tag
- HTML5
- HTTP Basic Authentication
- HTTP header
- HTTP parameter pollution
- HTTP proxy
- HTTP request smuggling
- HTTP Request
- HTTP
- HTTPOnly Cookie
- HTTPS phishing
- HTTPS
- Hub and spoke network
- Human-Computer Interaction (HCI)
- Human firewall
- Hybrid active directory
- Hybrid attack
- Hybrid Cloud
- Hybrid computer
- Hybrid Drive
- Hybrid encryption
- Hybrid firewall
- Hybrid IT management
- Hybrid Recommender Systems
- Hyper-Threading
- Hyperautomation
- Hyperlink
- Hyperscale
- Hypervisor
I
- I/O controller
- I2C (Inter-Integrated Circuit)
- I2P
- Infrastructure as a Service (IaaS)
- IAM authentication
- IAM (Identity and Access Management)
- Ice phishing
- ICE
- ICMP Flooding
- ICS (Industrial Control Systems)
- Idempotence
- Identity cloning
- Identity fabric
- Identity Governance and Administration (IGA)
- Identity Governance
- Identity Management
- Identity orchestration
- Identity proofing
- Identity Provider (IdP)
- Identity Theft
- Identity Verification
- Idle Timeout
- Intrusion Detection and Prevention Systems (IDPS)
- Intrusion Detection System (IDS)
- IEEE 802.11
- IEEE 802.1X
- IEEE 802
- ILOVEYOU
- Image Deployment
- Image recognition
- Image spam
- IMEI Blocking
- IMEI
- Immutable Ledger
- Impersonation attack
- Implantable Medical Devices
- IMSI Catcher
- In-Band Management
- In-Memory Computing
- Incident Management
- Incident Response Plan
- Incident Response Team
- Incident Response
- Inclusive Hiring
- Incremental Backup
- Indexing
- Indicators of Compromise (IoC)
- Indicators of Attack (IoA)
- Industrial IoT (Internet of Things)
- Industroyer
- Inetd
- Inference attack
- Information Literacy
- Information management
- Information processing
- Information security policy
- Information Security
- Information Silos
- Information System Security
- Infotainment
- Infrared
- Infrastructure as Code (IaC)
- Ingress filtering
- Ingress Traffic
- Initial access brokers
- Initialization vector
- Inline frame
- Inode
- Input Devices
- Input layer
- Input Validation
- Insecure direct object references
- Insertion attack
- Insider Threat
- InstallCore
- Instruction Register (IR)
- Instruction Set Architecture (ISA)
- Integer overflow
- Integrated circuit
- Integrated drive electronics
- Integrated service digital network
- Integration Testing
- Integrity checking
- Intel Virtualization Technology
- Intelligent Automation
- Intelligent character recognition
- Intelligent cloud
- Intelligent network
- Intelligent web
- Interconnection agreement
- Interdepartmental Communication
- Interface Converter
- Interface message processor
- Interior gateway protocol
- Intermediate Distribution Frame (IDF)
- Internal Controls
- Internet Addiction
- Internet backbone
- Internet background noise
- Internet bot
- Internet Control Message Protocol
- Internet Exchange Point (IXP)
- Internet key exchange
- Internet of Bodies
- Internet of Everything
- Internet of Medical Things
- Internet routing
- Internet security
- Internet worm
- Internet
- Interoperability
- Interpreter
- Interprocess Communication
- Intranet
- Inversion of Control
- I/O Bound
- I/O Memory Management Unit (IOMMU)
- IoT botnet
- IoT gateway
- IoT middleware
- IoT Security
- Internet of Things (IoT)
- IP Address Allocation
- IP address blocking
- IP Address Masking
- IP Address
- IP Addresses
- IP camera
- IP forwarding
- IP hijacking
- IP packet
- IP reputation
- IP SLA
- IP surveillance
- IP (Internet Protocol)
- IPsec
- IPv4 Address Exhaustion
- IPv4
- IPv6
- IS-IS
- iSCSI (Internet Small Computer System Interface)
- ISO 27001
- Isolation Levels
- Isolation
- ISP
- IT Automation
- IT Governance
- IT Infrastructure
- Iterative DNS query
- ITIL
- ITSM
- ITSP (Internet Telephony Service Provider)
- Interactive Voice Response (IVR)
J
K
- Kanban
- Keepalive
- Kerberos
- Kerckhoffs’ principle
- Kernel Level Exploit
- Kernel Panic
- Kernel
- Key-based Encryption
- Key-based routing
- Key derivation function
- Key Distribution Center (KDC)
- Key encryption key
- Key escrow
- Key exchange
- Key fob
- Key Management
- Key Performance Indicator (KPI)
- Key risk indicator
- Key rotation
- Key schedule
- Key Stretching
- Keychain
- Keygen
- Keylogger
- Keypunch machine
- Killware
- Kovter
- KRACK attack
- Kubernetes Security
- Kubernetes
L
- L2TP/IPsec (Layer 2 Tunneling Protocol/IPsec)
- LAN party
- LAN Security
- LAN (Local Area Network)
- Last Mile
- Latency
- Lateral movement
- Lattice-based access control
- Layer 2 Forwarding protocol
- Layer 2 Switch
- Layer 3 Switch
- Layer 4 switch
- LDAP (Lightweight Directory Access Protocol)
- Leaf-spine architecture
- Leakware
- Lean
- Leased line
- Least privilege
- Least Recently Used (LRU)
- Least Significant Bit
- Leeching
- Legacy system
- License Key
- License
- Linear-feedback shift register
- Link encryption
- Link Load Balancing
- Link-State Database
- Link State Routing
- Linux
- Live Forensics
- Live Migration
- Live USB
- Liveness Detection
- Living off the Land (LotL)
- Load balancer
- Load balancing router
- Loadable kernel modules
- Local area connection
- Local file inclusion
- Localhost
- Location intelligence
- Locky ransomware
- Log Analysis
- Log clipping
- Log file
- Log Integrity
- Log Retention
- Log Rotation
- Log4Shell
- Logging
- Logic bomb
- Logical access
- Logical network
- Logical Operations
- Logical topology
- Logjam
- LOLBin
- LonTalk
- Loop-Free Topology
- Loop Guard
- Loop
- Loopback address
- Loopback plug
- Loss Function
- Lossy Compression
- Low latency
- Long Short-Term Memory (LSTM)
- LTE (Long-Term Evolution)
- LUN masking
- Luring attack
- Lurking
M
- MAC address
- MAC Spoofing
- Machine Code
- Machine cycle
- Machine data
- Machine learning
- macOS
- Macro virus
- Madware
- Magecart
- Magnet link
- Mail Server
- Main distribution frame
- Main Memory
- Malicious code
- Malleability
- Malvertising
- Malware Analysis
- Malware-as-a-service
- Malware Delivery Methods
- Malware Injection
- Malware obfuscation
- Malware sandboxing
- Malware
- MAM
- Man-in-the-Browser Attack
- Man trap
- Managed file transfer
- Managed Hosting
- Managed service provider platform
- Managed Switch
- Management information base
- Manchester encoding
- Mandatory access control
- Markov Chain
- MASINT
- Masquerade attack
- Mass Surveillance
- Master boot record
- Master password
- MBR Malware
- MD5
- Media access control
- Media access unit
- Medical Device Security
- Medical IoT Security
- Melissa virus
- Meltdown
- Memory Address Register
- Memory Address
- Memory allocation
- Memory Corruption
- Memory data register
- Memory-driven computing
- Memory forensics
- Memory Hierarchy
- Memory Leak
- Memory Management
- Memory Mapping
- Memory Protection
- Memory rootkit
- Merge Conflict
- Merkle tree
- Mesh Network
- Mesh node
- Mesh Topology
- Mesh Wi-Fi System
- MESI Protocol
- Message broker
- Message passing
- Message Queue
- Message switching
- Metadata
- MetaMask
- Metamorphic Code
- Metamorphic Virus
- Metasploit
- Metrics
- Metropolitan area network
- MFA bombing
- Micro virtual machine
- Microarchitecture
- Microgrid
- Microprocessor
- Microsegmentation
- Microservices
- Midspan
- MiFi
- Minification
- Mining
- Misappropriation
- Man-in-the-Middle (MitM) Attack
- Mix network
- Mobile ad hoc network
- Mobile Banking
- Mobile code
- Mobile credential
- Mobile Device Management (MDM)
- Mobile-First Design
- Mobile Hotspot
- Mobile malware
- Mobile network operator
- Mobile Optimization
- Mobile Phone Tracking
- Mobile proxy
- Mobile Security
- Mobile Wallet
- Modbus
- Machine Learning Model Robustness
- Model-View-Controller (MVC)
- Modem
- Modular Programming
- Modularity
- Modulation
- Money Laundering
- Money Mule
- Monitoring software
- Monoculture
- Monolithic Architecture
- Monte Carlo simulation
- Morris worm
- Most significant bit
- Motherboard
- Moves, adds, and changes
- MPLS
- MPOE
- MQTT (Message Queuing Telemetry Transport)
- Managed Security Service Provider (MSSP)
- Muling
- Multi-Cloud Strategy
- Multi-Cloud Environment
- Multi-core Processing
- Multi-core Processor
- Multi-factor Authentication (MFA)
- Multi-homed
- Multi-Tenancy
- Multicast Address
- Multicast router
- Multimedia Container
- Multiplayer Online Battle Arena (MOBA)
- Multiplexing
- Multiprocessor System
- Multi-threading
- Mutex (Mutual Exclusion)
- Mutual authentication
- Mutual exclusion
N
- N-Tier Architecture
- Naive Bayes Classifier
- Namespace
- Narrowband
- NAS
- NAT loopback
- NAT-PMP
- NAT traversal
- NAT (Network Address Translation)
- Need-to-Know Principle
- Nested Conditional Statements
- Net neutrality
- NetBIOS
- Netcat
- NetFlow
- Netiquette
- Netmask
- NetScaler
- NetSecOps
- Netsplit
- Netwalker ransomware
- Network access control
- Network adapter
- Network administrator
- Network automation
- Network Bandwidth
- Network based IDS
- Network Booting
- Network bottleneck
- Network bridge
- Network configuration management
- Network congestion
- Network connectivity
- Network convergence
- Network database
- Network degradation
- Network detection and response
- Network Efficiency
- Network encryption
- Network Enumeration
- Network forensics
- Network hub
- Network ID
- Network information system
- Network infrastructure
- Network intelligence
- Network interface card
- Network intrusion
- Network Layer Protocols
- Network layer
- Network management system
- Network Monitoring
- Network node manager
- Network Packet Analyzer
- Network prefix
- Network processor
- Network resilience
- Network sandboxing
- Network scanning
- Network Security Policies
- Network Security
- Network service provider
- Network Slicing
- Network socket
- Network tap
- Network Testing
- Network Time Protocol (NTP)
- Network topology
- Network Traffic
- Network virtualization
- Neural Network
- Newsgroup
- Next hop
- Near-Field Communication (NFC)
- NFV
- NIST Special Publications
- NIST
- Natural Language Processing (NLP)
- Nmap
- No-Logs VPN
- Non-Executable Memory
- Non-Volatile Memory
- Nonce
- Nonlinearity
- Nord name
- Normal Distribution
- North-South Traffic
- Northbound interface/Southbound interface
- NoSQL
- Not-a-virus
- NotPetya
- NPC (Non-Player Character)
- NRZ (Non-Return-to-Zero)
- NS Records
- NTFS (New Technology File System)
- NTP amplification attack
- Nuker
- Null session
- NULL Value
O
- OAuth
- Obfuscation
- Object Detection
- Object-Oriented Programming (OOP)
- Object Storage
- Obsolete Technology
- OCSP stapling
- Odd parity
- Off-Page SEO
- Offensive security
- Offline Attack
- OffSec
- OGNL injection
- On-Page SEO
- On-Premises Infrastructure
- One ring scam
- One-time pad
- One-time password
- One-way encryption
- Onion domain
- Onion Routing
- Online Activism
- Online Banking Security
- Online data storage
- Online Grooming
- Online Privacy
- Online Reputation Management
- Online Security
- Open DNS Resolvers
- Open port
- Open Source Security
- Open Source
- Open system
- Open-World Games
- OpenFlow
- OpenID
- OpenPGP
- OpenVPN
- Operating System Deployment
- Operating System Identification
- Operating System
- Operational level agreement
- Operational technology
- OPSEC
- Optical character recognition
- Optical Fiber
- Optical line terminal
- Optical Network Terminal (ONT)
- Optical Transport Network (OTN)
- Optimization Algorithm
- Orphaned VMs
- OSI model
- OSINT (Open Source Intelligence)
- OSPF
- Over-the-Air (OTA) Updates
- Out-of-Band Management
- Out-of-Order Execution
- Output Devices
- Overfitting
- Overlay network
- Overrun
- OWASP
P
- P2P Network
- Platform as a Service (PaaS)
- Package Manager
- Packet capture
- Packet coalescing
- Packet filtering
- Packet loss
- Packet Radio
- Packet switching
- Packet
- Page file
- Page Speed
- Paging
- Pair Programming
- Pan-Tilt-Zoom (PTZ) Camera
- PAP (Password Authentication Protocol)
- Parallel Computing
- Parameter tampering
- Parameterized Query
- Parental controls
- Parity Bit
- Parity check
- Parser
- Pass the hash
- Pass the Ticket
- Passcode
- Passive attack
- Passive Optical Network (PON)
- Passive surveillance
- Passphrase
- Password Cracking
- Password policy
- Password sniffer
- Password spraying
- Password vault
- Password
- Passwordless
- Patch Panel
- Patch Tuesday
- Patch
- Pattern recognition
- Payload
- Payment Fraud
- Payment Gateway
- PBX (Private Branch Exchange)
- PCI bus
- PCI DSS
- PCIe Security
- PCIe (Peripheral Component Interconnect Express)
- Peak Demand
- Peering
- Penetration Testing
- Pentest
- Perfect Forward Secrecy (PFS)
- Perfect Secrecy
- Perimeter firewall
- Perimeter security
- Peripheral device
- Persistent cookie
- Personal Data
- Personal firewall
- Personal VPN
- Personal web server
- Personalization Engine
- Petya
- PGP encryption
- Pharming
- Phishing
- Phlashing
- PHP injection
- Phreaking
- Physical Access
- Physical address
- Physical layer
- Physical Network
- Physical Security
- Piggybacking
- PII
- PIN Encryption
- Ping Flood
- Ping of death
- Ping sweep
- Ping
- Pipeline Orchestration
- Pipeline
- Piracy
- Platform-Agnostic
- Platform security
- Player Agency
- Plug-in
- Pod slurping
- Point of presence (POP)
- Point of Sale (POS) System
- Point-to-point protocol
- Pointer
- Policy-Based Management
- Polybius Square
- Pop-up Windows
- Port 80
- Port address translation
- Port Forwarding
- Port knocking
- Port mirroring
- Port scanning
- Port triggering
- Port
- Portable computer
- Portal application
- Point-of-Sale (POS) Malware
- Post-quantum cryptography
- POST (Power-On Self-Test)
- Posting
- Poweliks
- Power-analysis attack
- Power distribution unit
- Power Line Communication (PLC)
- Power Outage
- Power over Ethernet
- Power Sourcing Equipment (PSE)
- Power Surge
- Power usage effectiveness
- Powered Device (PD)
- PowerShell
- PPPoE
- PPTP (Point-to-Point Tunneling Protocol)
- Predictive Analytics
- Predictive data mining
- Predictive Maintenance
- Preemption
- Prepared Statement
- Presentation layer
- Pretexting
- Primary Key
- Principle of Least Astonishment
- Privacy by Design
- Privacy Compliance
- Privacy-Focused Browsers
- Privacy Impact Assessment
- Privacy Laws
- Privacy Notice
- Privacy policy
- Privacy Regulations
- Privacy Settings
- Private Cloud
- Private internet access
- Privilege escalation
- Privileged Access Management
- Privileged access workstation
- Privileged User
- Proactive defense
- Probability Distribution
- Procedural Programming
- Process Explorer
- Process hollowing
- Process Injection
- Process Scheduling
- Product Activation
- Product cipher
- Product Key
- Production Environment
- Profiling
- Programmable Logic Controllers (PLCs)
- Project Management Software
- Project Scope Creep
- Promiscuous mode
- Propagation delay
- Proprietary information
- Proprietary software
- Protocol conversion
- Protocol Converter
- Protocol Data Unit (PDU)
- Protocol Mismatches
- Protocol stack
- Protocol
- Provider Edge (PE) Router
- Proxy Authentication
- Proxy Server
- Proxy surfing
- Proxy
- Pseudocode
- Pseudonym
- Pseudonymization
- PsExec
- Public and Private Keys
- Public cloud infrastructure
- Public Cloud Storage
- Public Cloud
- Public domain software
- Public IP
- Public Key Cryptography
- Public key encryption
- Public key infrastructure
- Public proxy
- Pull Request
- Potentially Unwanted Programs (PUPs)
- Purple team
- PvE
- PvP
- PWN
- PXE Server
Q
R
- Race condition
- Rack-Mountable
- Radio Frequency (RF) Spectrum
- RADIUS (Remote Authentication Dial-In User Service)
- RAID 5
- RAID
- Rainbow Table
- RAM scraping
- RAM
- Ransomware-as-a-Service (RaaS)
- Ransomware Insurance
- Rapid Spanning Tree Protocol (RSTP)
- RARP
- Rate Limiting
- Role-Based Access Control (RBAC)
- RC4
- RC5
- RC6
- Relational Database Management System (RDBMS)
- RDP (Remote Desktop Protocol)
- Real-time communications
- Real-time computing
- Real-time data
- Real-Time Operating System (RTOS)
- Real-Time Protocol (RTP)
- Real User Monitoring (RUM)
- Recommendation engine
- Reconnaissance
- Recovery Key
- Recovery mode
- Recovery time objective
- Recurrent neural network
- Recursive DNS Query
- Red hat hacker
- Red team
- Redaction
- RedHack
- Redundancy
- Redundant hardware
- Refactoring
- Referential Integrity
- Referrer-Policy
- Regional internet registry
- Registry editor
- Registry Hives
- Registry
- Regression Testing
- Regular Expressions
- Regulatory Compliance
- Reinforcement Learning
- Relay Attack
- Relay server
- Remote access server
- Remote access trojan
- Remote Access VPN
- Remote Access
- Remote Administration
- Remote attack
- Remote Attestation
- Remote code execution
- Remote desktop
- Remote infrastructure management
- Remote Monitoring and Management (RMM)
- Remote outdoor router
- Remote Power Management
- Remote procedure call
- Remote Sensing
- Remote shell
- Remote Thread Injection
- Remote Wipe
- Renewable Energy
- Repeater
- Replay attack
- Replication
- Repository
- Representation in Tech
- Reputation Management
- Reputation System
- Resale Market
- Reshipping
- Resident virus
- Residential Proxy
- Residual risk
- Resilience Testing
- Resource exhaustion
- RPKI (Resource Public Key Infrastructure)
- Response time
- Responsive Web Design
- REST API
- Retail Cybersecurity
- Return-Oriented Programming (ROP)
- Return-to-Zero (RZ)
- Reverse DNS
- Reverse engineering
- Reverse-path forwarding
- Reverse Proxy
- REvil ransomware
- RFC1918
- RFID blocking
- RFID Skimming
- RFID tag
- RFID (Radio Frequency Identification)
- Rich internet application
- Rijndael
- Ring network
- Routing Information Protocol (RIP)
- RISC (Reduced Instruction Set Computing)
- Risk Analysis
- Risk assessment
- Risk modeling
- Risk monitoring
- Risktool
- Riskware
- Robocalls
- Robotic Process Automation (RPA)
- Rogue access point
- Rogue device
- Rogue DHCP Server
- Rogueware
- Role-Playing Games (RPGs)
- Rollback definition
- Root access
- Root Bridge
- Root Cause Analysis
- Root of trust
- Root server
- Root user
- Rooting
- Rootkit
- Rotating proxy
- Round Robin
- Round-trip time
- Route flapping
- ROA (Route Origin Authorization)
- Route Poisoning
- Route summarization
- Route Table
- Router Security
- Router
- Routing Algorithm
- Routing loop
- Routing Protocol
- Routing table
- Routing
- Rowhammer
- RPG
- RPO
- RS-232
- RSA (Rivest-Shamir-Adleman)
- Rubber duck debugging
- Runtime Application Self-Protection (RASP)
- Runtime Monitoring
- Ryuk ransomware
S
- S/Key
- Software as a Service (SaaS)
- Sabotage
- Simultaneous Authentication of Equals (SAE)
- Safe mode
- Salami fraud
- Salting
- Same-Origin Policy
- SameSite Attribute
- SAN (Storage Area Network)
- Sandbox escape
- Sandbox Games
- Sandboxing
- Static Application Security Testing (SAST)
- SCADA (Supervisory Control and Data Acquisition)
- Scalability
- Scale-out storage
- Scale-Up Storage
- Scam
- Scanning attack
- Scareware
- Scatternet
- Scraper Bots
- Screen lock
- Screen scraping
- Screen Time Management
- Screened subnet firewall
- Script Kiddie
- Scripting Language
- Scrum
- Scunthorpe problem
- SD Cards
- SD-WAN
- Software-Defined Networking (SDN)
- Search Engine Indexing
- Seasonal Adjustment
- SECaaS
- Second-party fraud
- Secret key
- Secure boot
- Secure connection
- Secure cookie
- Secure Electronic Transactions
- Secure enclave
- Secure erase
- Secure File Deletion
- Secure File Transfer
- Secure Multiparty Computation (SMC)
- Secure print
- Secure software development lifecycle
- Secure Software Development
- Security Analytics
- Security assessment
- Security audit
- Security automation
- Security Awareness Training
- Security by Design
- Security Clearance
- Security Content Automation Protocol
- Security Controls
- Security domain
- Security event management
- Security Group
- Security Headers
- Security identifier (SID)
- Security Incident
- Security Key
- Security Monitoring Systems
- Security monitoring
- Security Orchestration
- Security policy
- Security software
- Security Testing
- Security through obscurity
- Security token
- Seeding
- Segment routing
- Segment
- Self-destructing email
- Self-healing Networks
- Self-signed certificate
- Self-sovereign identity
- Semaphore
- Sensitive Data
- Sentiment analysis
- Separation of duties
- SerDes
- Serial ATA (SATA)
- Serial Communication
- Serial port
- Serial server
- Serialization Vulnerability
- Serialization
- Server Farm
- Server hosting
- Server Message Block
- Server redundancy
- Server Security
- Server-side Attacks
- Server-Side Request Forgery (SSRF)
- Server
- Serverless
- Service Desk
- Service Level Agreement (SLA)
- Service Level Agreement (SLA)
- Service pack
- Service Ticket
- Session cookie
- Session Fixation
- Session hijacking
- Session Initiation Protocol (SIP)
- Session key
- Session layer
- Session Persistence
- Session token
- Sextortion
- Secure File Transfer Protocol (SFTP)
- SHA-1
- SHA-256
- Shadow copy
- Shadow Password Files
- Shadowsocks
- Shamoon
- Shared Hosting
- Shared IP
- Shared Memory
- Shared proxy
- Shared storage
- Sharenting
- Shareware
- Sharking
- Shell
- Shellcode
- Shift Left
- Shimming attack
- Shodan search engine
- Shor's Algorithm
- Shoulder surfing
- Shylock
- Side-channel attack
- Sidejacking
- Sideloading
- SIEM (Security Information and Event Management)
- SIGINT
- Signal Amplification
- Signal Blocking
- Signal Interception
- Signal-to-Noise Ratio (SNR)
- Signaling gateway
- Signaling System 7 (SS7)
- Signals analysis
- Signature-based Detection
- Signature verification
- SIM Card Cloning
- SIM Card
- SIM Swapping
- SIM toolkit
- Simple Network Management Protocol (SNMP)
- Single-factor authentication
- Single Sign-On (SSO)
- SIP proxy
- SIP Trunking
- SIP URI (Uniform Resource Identifier)
- Site survey
- Skimmer
- Smart bulb
- Smart card
- Smart contract
- Smart grid
- Smart Home Hub
- Smart Home Technology
- Smart Home
- Smart meter
- SMIME
- Smishing
- SMS Interception
- SMS spoofing
- SMTP (Simple Mail Transfer Protocol)
- Smurf attack
- Smurfing
- Snake malware
- Sneaker bot
- Sneakernet
- SNMP Trap
- SNMPv3
- Snooping Protocol
- Snort
- Snowshoe spam
- SOC as a service
- SOC (Security Operations Center)
- Social engineering
- Social profiling
- Sockets
- SOCMINT
- Soft copy
- Soft Reboot
- Softlifting
- Software assurance
- Software Bug
- Software Composition Analysis (SCA)
- Software-defined infrastructure
- Software-Defined Storage (SDS)
- Software Development Lifecycle (SDLC)
- Software License Agreement
- Software Licensing
- Software package
- Software piracy
- Software repository
- Software Security
- Software Supply Chain Security
- Source Code
- Spam Filter
- Spam
- Spambot
- Spanning Tree Protocol
- Spatial Data
- Spear phishing
- Spectre
- Speculative Execution
- SPF (Sender Policy Framework)
- SPI (Serial Peripheral Interface)
- Split DNS
- Split Horizon
- Spoofing
- Spooling
- SpyEye
- Spyware
- SQL injection
- Structured Query Language (SQL)
- SSD (Solid State Drive)
- SSH Key
- SSH (Secure Shell)
- SSID
- SSL Certificate
- SSL offloading
- SSL Stripping
- SSL VPN
- SSL (Secure Sockets Layer)
- Stack Canaries
- Stack smashing
- Stack Trace
- Staging server
- Stakeholder Engagement
- Stalkerware
- Standard ACLs
- Star Network
- STARTTLS
- State
- Stateful firewall
- Stateful Packet Inspection
- Static Analysis
- Static data
- Static IP
- Static NAT
- Static routing
- Static Website
- Stealth Malware
- Stealth virus
- Stealth VPN
- Steganalysis
- STEM
- Sticky bit
- Sticky session
- STIX and TAXII
- Stochastic Gradient Descent
- Stochastic Modeling
- Storage as a Service
- Storage automation
- Storage capacity
- Storage Device
- Storage over Internet Protocol
- Storage virtualization
- Storm worm
- Stream cipher
- Stream Processing
- Streaming network telemetry
- Stress testing
- Strong authentication
- Structured Cabling
- Structured Data
- Structured prediction
- Structured Programming
- Structuring
- Stub network
- STUN
- Stuxnet
- Subdomain Takeover
- Subnet Mask
- Subnet
- Subscription-based Model
- Substitution cipher
- Subtyping
- Super cookie
- Super-Server
- Supercomputing
- Superkey
- Supernetting
- Superposition
- Superuser
- Supervised Learning
- Supply Chain
- Surveillance Cameras
- Surveillance Capitalism
- Surveillance
- svchost.exe
- Swap Space
- Switch
- Switching fabric
- Switching loop
- Sybil attack
- Symbian
- Symbolic Link
- Symmetric Encryption
- Symmetric Key Algorithm
- SYN Cookies
- SYN flood
- Synchronization
- Synchronous optical networking
- Synchronous Transmission
- Synthetic data
- Synthetic Identity Fraud
- Synthetic Media
- Synthetic Monitoring
- Sysinternals
- Syslog
- Sysmon
- System Bus
- System Crash
- System file
- System integrity protection
- System migration
- System Recovery
- System security
- System Testing
T
- Tabnabbing
- Tactics, Techniques, and Procedures (TTPs)
- Tailgating
- Taint analysis
- Tamper Resistance
- Tampering attack
- Targeted attacks
- Tarpitting
- Task Manager
- TCP handshake
- TCP/IP
- TCP reset attack
- TCP Wrapper
- TCP (Transmission Control Protocol)
- TDD (Time Division Duplex)
- Teardrop attack
- Tech support scam
- Technical Debt
- Telecommunications equipment
- Telecommunications Fraud
- Telecommunications Infrastructure
- Telecommunications Security
- Telematics
- Telemedicine Security
- Telemetry
- Telephony Denial of Service (TDoS)
- Telnet
- TEMPEST shielding
- The Tempest
- Template injection
- Terminal adapter
- Terminal emulation
- Terminal master key
- Terminal node controller
- Terminal
- Terms of Service (TOS)
- Terrorist Threats
- TeslaCrypt
- Tethering
- Text Mining
- The kill chain
- Thick client
- Thin Client
- Third-Party Assessment Organization (C3PAO)
- Third-party cookie
- Third-party risk management
- Thrashing
- Thread Priority
- Thread Starvation
- Threat actor
- Threat assessment
- Threat hunting
- Threat Intelligence
- Threat landscape
- Threat Modeling
- Threat monitoring
- Throttling
- Throughput
- Throwing Exceptions
- Thumb drive
- Ticket-Granting Ticket (TGT)
- Tiger team
- Time bomb
- Time-division multiplexing
- Time Drift
- Time Series Analysis
- Time Synchronization
- Timestamp Analysis
- Timestomping
- Timing attack
- Timing Channel
- TLD (Top-Level Domain)
- TLS (Transport Layer Security)
- TOCTOU attack
- Token Authentication
- Token ring
- Tokenization
- Tool kit
- Top-down design
- Topic Modeling
- Tor
- Torrent
- Touch ID
- Traceroute
- Tracking pixel
- Tracking
- Traffic Analysis
- Traffic Engineering
- Traffic Optimization
- Traffic Redirection
- Traffic shaping
- Transaction Laundering
- Transaction
- Transactional data
- Transactions per second
- Transceiver
- Transcoding
- TRANSEC
- Transit Network
- Transmitter
- Transparent bridge
- Transparent proxy
- Transponder
- Transport Layer Protocols
- Transport layer
- Transposition cipher
- Trialware
- TrickBot
- Trivial File Transfer Protocol
- Trojan
- Trolling
- True positives
- Trunking
- Trust Score
- Trusted computing
- Trusted Platform Module (TPM)
- Trustworthy AI
- Truth Tables
- Try-Catch Blocks
- TTL (Time to Live)
- Tunneling
- Two-phase commit
- Type 1 Hypervisor
- Typecasting
- Typosquatting
U
- U2F
- UART (Universal Asynchronous Receiver-Transmitter)
- Ubiquitous computing
- UDP Flood
- UDP Hole Punching
- UDP (User Datagram Protocol)
- UEBA
- UEFI Password
- UEFI rootkit
- UEFI (Unified Extensible Firmware Interface)
- Unauthorized access
- Uncertainty Modeling
- Unconscious Bias
- Underfitting
- Unicast address
- Unicast
- Unicode
- Unified Communications
- Unified computing system
- Unified Monitoring
- Uniform Resource Name (URN)
- Uninterruptible Power Supply (UPS)
- Unit Testing
- Unix
- Unknown host
- Unlabeled data
- Unmanaged Switch
- Unstructured Data
- Unsupervised Learning
- Update
- UPnP
- Uniform Resource Identifier (URI)
- URL filtering
- URL hijack
- URL injection
- URL redirection attack
- Uniform Resource Locator (URL)
- Usability Testing
- USB Condom
- USB Data Blocker
- USB debugging
- USB Drive-by Attack
- USB drop attack
- USB Flash Drive
- USB Phishing
- USB Port
- USB Restricted Mode
- USB Rubber Ducky
- USB
- Use-after-free
- Usenet
- User Acceptance Testing (UAT)
- User Access Control
- User Account Control
- User agent
- User authentication
- User-Centric Security
- User Consent
- User Experience (UX)
- User Interface (UI)
- User Provisioning
- Username
- UTF-8
- UTM network
- UUID
- UXSS
V
- V2Ray protocol
- Vampire tap
- Van Eck phreaking
- Vanity domain
- vCPE
- Vehicle-to-Infrastructure
- Vehicle-to-Vehicle (V2V)
- Vehicular Ad Hoc Networks (VANETs)
- Vendor Lock-In
- Vendor Security
- VeriChip
- Verifiable Credentials
- Version Control
- Video Analytics
- Video Surveillance
- Virtual address
- Virtual desktop infrastructure
- Virtual environment
- Virtual firewall
- Virtual host
- Virtual IP address
- Virtual machine migration
- VM Sprawl
- Virtual Machine (VM)
- Virtual private LAN service
- Virtual routing and forwarding
- Virtual Storage Area Network (VSAN)
- Virtual switch
- Virtual terminal
- Virtualization Security
- Virtualization
- Virus
- Vishing
- Visitor-based networking
- VLAN hopping
- VLAN trunking protocol
- VLAN (Virtual Local Area Network)
- VLSM
- VM escaping
- vMem
- Voice Assistant
- Voice intrusion prevention system
- Void pointer
- VoIP
- Volatile Memory
- Volatility
- Voltage Fluctuation
- VPN appliance
- VPN Authentication
- VPN concentrator
- VPN firewall
- VPN gateway
- VPN hardware
- VPN Logging Policies
- VPN Protocols
- VPN Security
- VPN token
- Virtual Private Network (VPN)
- VPNaaS
- Virtual Private Server (VPS) Hosting
- vRealize automation
- Vulnerability assessment
- Vulnerability disclosure
- Vulnerability Management
- Vulnerability scanner
- Vulnerability
W
- Wabbit
- Web Application Firewall (WAF)
- Wake-on-LAN (WoL)
- Wallet
- WAN aggregation
- WAN mini port
- WAN optimizer
- WAN port
- WAN
- War driving
- War texting
- Warchalking
- Wardialing
- Wardriving
- Warez
- Warm boot
- Warshipping
- Warwalking
- Waterfall Model
- Watering hole attack
- Watermarking
- Wavelength Division Multiplexing (WDM)
- Wearable computer
- Web access management
- Web authorization management
- Web beacon
- Web Browser Security
- Web content management
- Web Crawler
- Web Filtering
- Web Hosting
- Web protection
- Web security gateway
- Web Server
- Web shell
- Webhook
- Website defacement
- WEP crack
- WEP (Wired Equivalent Privacy)
- Whaling
- Whistleblower
- White Box Testing
- White hat hacker
- Whitebox cryptography
- Whitelist
- Wi-Fi 6 (802.11ax)
- Wi-Fi Direct
- Wi-Fi Extender
- Wi-Fi Security
- Wi-Fi Sniffing
- Wildcard certificate
- Wildcard Characters
- Windowing
- Windows Deployment Services
- Windows Event Log
- Windows Remote Management
- Windows Security
- Windows Services
- Wiper
- Wire transfer fraud
- Wired Network
- Wireguard
- Wireless Access Point
- Wireless bridge
- Wireless Broadband
- Wireless Encryption
- Wireless fidelity
- Wireless Intrusion Detection System (WIDS)
- Wiretapping
- WLAN Security
- WLAN (Wireless LAN)
- WMI Abuse
- WMN network
- Word size
- Workflow Automation
- Workstation
- World Wide Web (WWW)
- Worm
- WPA (Wi-Fi Protected Access)
- WPAN