Cyber security glossary Decipher cybersecurity with ORSYS: knowledge is your best shield! All0-9ABCDEFGHIJKLMNOPQRSTUVWXYZ0-92FA (dual authentication) 🟢 ProtectionAAAA (Authentication, Authorization, Accounting) 🟢 ProtectionACL (Access Control List) 🟢 ProtectionActive Directory (AD)ANSSI (French National Agency for Information Systems Security)APT (Advanced Persistent Threat) 🔴 AttackSingle sign-on (SSO)BBackdoor 🔴 VulnerabilityBotnet 🟠 ToolCTrojan horse 🔴 AttackDDDoS (distributed denial of service) 🔴 AttackHardening 🟢 ProtectionEEDR (Endpoint Detection and Response) 🟢 ProtectionFFirewall 🟢 ProtectionGGovernance 🟩 ToolHPhishing 🔴 AttackIISO 27001 🟦 StandardISO 27005 🟦 StandardISO 31000 🟦 StandardKKeylogger (keylogger) 🔴 AttackKill Switch 🟢 ProtectionLListe de contrôle d’accès (ACL) 🟢 ProtectionMMalware 🔴 AttackNNIS 2 🟦 RegulationsPBusiness Continuity Plan (BCP) 🟩 ToolDisaster Recovery Plan (DRP) 🟩 ToolPSSI (information systems security policy) 🟩 ToolRRansomware 🔴 AttackRTO (Recovery Time Objective)SSBOMShadow ITVVirus 🔴 AttackXXSS (Cross-Site Scripting) 🔴 AttackZZero Trust 🟢 ProtectionZero-day (0-day) 🔴 Flaw