Cyber security glossary All0-9ABCDEFGHIJKLMNOPQRSTUVWXYZ0-92FA (dual authentication) 🟢 ProtectionAAAA (Authentication, Authorization, Accounting) 🟢 ProtectionACL (Access Control List) 🟢 ProtectionActive Directory (AD)ANSSI 🟩 AuthorityAPT (Advanced Persistent Threat) 🔴 AttackSingle sign-on (SSO)National Cyber Security Authority 🟩 AuthorityBBackdoor 🔴 VulnerabilityBotnet 🟠 ToolCCERT 🟩 TeamTrojan horse 🔴 AttackCookiesCSP (Content Security Policy) 🟢 ProtectionDDDoS (distributed denial of service) 🔴 AttackDenial of service 🔴 AttackHardening 🟢 ProtectionEEDR (Endpoint Detection and Response) 🟢 ProtectionFFirewall 🟢 ProtectionForensicsGGovernance 🟩 ToolHEthical hacker 🟢 ProfessionPhishing 🔴 AttackISQL injection 🔴 AttackInjection 🔴 AttackIPSec (Internet Protocol Security) 🟩 ToolISO 27001 🟦 StandardISO 27005 🟦 StandardISO 31000 🟦 StandardJEvil twin 🔴 AttackKKeylogger (keylogger) 🔴 AttackKill Switch 🟢 ProtectionLAccess Control List (ACL) 🟢 ProtectionMMalware 🔴 AttackMan-in-the-middle 🔴 AttackMITRE ATT&CK 🟩 ToolNNIS 2 🟦 RegulationsOOCSP 🟩 ToolOWASPPPCI DSS 🟦 StandardPentest (penetration testing)Pentester 🟢 JobBusiness Continuity Plan (BCP) 🟩 ToolDisaster Recovery Plan (DRP) 🟩 ToolPSSI (information systems security policy) 🟩 ToolRRansomware 🔴 AttackRemediation 🟢 ProtectionRTO (Recovery Time Objective)SSBOMSecNumCloud 🟦 CertificationShadow ITSOC 🟩 StructureSpyware 🔴 AttackTTLS (Transport Layer Security) 🟢 ProtectionVVirus 🔴 AttackData theft 🔴 AttackVulnerability 🟥 WeaknessWWAF (Web Application Firewall) 🟢 ProtectionXXSS (Cross-Site Scripting) 🔴 AttackZZero Trust 🟢 ProtectionZero-day (0-day) 🔴 Flaw