Cyber security glossary Decipher cybersecurity with ORSYS: knowledge is your best shield! All0-9ABCDEFGHIJKLMNOPQRSTUVWXYZ0-92FA (double authentification) 🟢 ProtectionAAAA (Authentication, Authorization, Accounting) 🟢 ProtectionACL (Access Control List) 🟢 ProtectionActive Directory (AD)ANSSI (French National Agency for Information Systems Security)APT (Advanced Persistent Threat) 🔴 AttackAuthentification unique (SSO)BBackdoor 🔴 VulnerabilityBotnet 🟠 ToolCTrojan horse 🔴 AttackDDDoS (distributed denial of service) 🔴 AttackHardening 🟢 ProtectionEEDR (Endpoint Detection and Response) 🟢 ProtectionFFirewall 🟢 ProtectionGGovernance 🟩 ToolHPhishing 🔴 AttackIISO 27001 🟦 StandardISO 27005 🟦 StandardISO 31000 🟦 StandardKKeylogger (keylogger) 🔴 AttackKill Switch 🟢 ProtectionLAccess control listMMalware 🔴 AttackNNIS 2 🟦 RegulationsPBusiness Continuity Plan (BCP) 🟩 ToolDisaster Recovery Plan (DRP) 🟩 ToolPSSI (information systems security policy) 🟩 ToolRRTO (Recovery Time Objective)SSBOMShadow ITXXSS (Cross-Site Scripting) 🔴 AttackZZero Trust 🟢 ProtectionZero-day (0-day) 🔴 Flaw