Cyber security glossary
cybersecurity terms explained
A
- AAA (Authentication, Authorisation, Audit) π’ Protection
- AAD (Azure Active Directory)
- ACL (Access Control List) π’ Protection
- Active Directory (AD)
- Air gap π’ Protection
- Safety alert π© Safety information
- Behavioural analysis π© Security method
- Predictive analysis
- ANSSI π© Authority
- Authentication application π’ Protection
- APT (Advanced Persistent Threat) π΄ Attack
- Supply chain attack π΄ Attack
- Attacks on AI π΄ Attacks
- Single sign-on (SSO) π© Tool
- National Cyber Security Authority π© Authority
B
C
- CERT π© Security team
- Trojan horse π΄ Attack
- Encryption π
- CISA π© Authority
- Cookies
- Cryptojacking (cryptographic hacking) π΄ Attack
- CSP (Content Security Policy) π’ Protection
- CSRF π΄ Attack
- CTI (Cyber Threat Intelligence) π’ Tool
- CVE (Common Vulnerabilities and Exposures) π© Repository
- CVSS π© Tool
- Cyber attack π΄ Attack
- Cybercriminal π₯ Threat
- Cyber investigator π© Cyber security profession
- Cyber espionage π΄ Attack
- Cyber threat π Risk
- Cybersecurity π’ Protection
D
- DDoS (distributed denial of service) π΄ Attack
- Deepfake π΄ Manipulation
- Defence in depth π’ Protection
- Site defacement
- Denial of service π΄ Attack
- DevSecOps π© Security practice
- Personal data
- Sensitive data
- DPO (Data Protection Officer) π© Business line
- DPO (Data Protection Officer) π© Job title
- Hardening π’ Protection
E
I
- IAM (Identity and Access Management) π’ Protection
- IDS (Intrusion Detection System) π’ Protection
- Social engineering π΄ Attack
- SQL injection π΄ Attack
- Injection π΄ Attack
- IoC (indicator of compromise) π© Tool
- IPSec (Internet Protocol Security) π© Tool
- ISO 27001 π¦ Standard
- ISO 27002 π¦ Standard
- ISO 27005 π¦ Standard
- ISO 31000 π¦ Standard
M
N
O
P
- Patch π’ Protection
- Payload π΄ Malicious component
- PCI DSS π¦ Standard
- Pentest (penetration testing) π’ Tool
- Pentester π’ Job
- Business Continuity Plan (BCP) π© Document
- Disaster Recovery Plan (DRP) π© Document
- Privacy policy
- Backup policy π© Document
- Security policy π© Document
- Principle of least privilege (PoLP) π’ Protection
- Privilege
- PSSI (information systems security policy) π© Document
R
S
- Sandboxing π’ Protection
- SBOM
- SecNumCloud π¦ Certification
- Cyber security awareness π© Protection
- Shadow IA
- Shadow IT
- SIEM π’ Protection
- ISMS (Information Security Management System) π©
- SOAR (Security Orchestration, Automation, and Response) π’ Protection
- SOC (Security Operations Center) π© Structure
- Spyware π΄ Attack
- Attack surface π΄ Faults