A comprehensive glossary of cybersecurity terms, acronyms, and concepts for security professionals and enthusiasts.
A
- Access Control
- The selective restriction of access to resources or data based on user identity, role, or other attributes.
- Active Directory (AD)
- Microsoft’s directory service for Windows domain networks, managing users, computers, and other resources.
- Advanced Persistent Threat (APT)
- A prolonged and targeted cyberattack where an intruder gains unauthorized access and remains undetected for an extended period.
- Air Gap
- Physical isolation of a computer or network from unsecured networks, including the Internet.
- Anti-virus (AV)
- Software designed to detect, prevent, and remove malicious software (malware).
- API (Application Programming Interface)
- A set of protocols and tools for building software applications, defining how components should interact.
- Attack Surface
- The total number of points where an unauthorized user can try to enter or extract data from a system.
- Authentication
- The process of verifying the identity of a user, device, or system.
- Authorization
- The process of granting or denying access rights to resources after authentication.
B
- Backdoor
- A method of bypassing normal authentication to gain unauthorized access to a system while remaining undetected.
- Baseline
- A reference point for comparison, typically the minimum security requirements for a system.
- Blue Team
- The defensive security team responsible for protecting systems and responding to incidents.
- Botnet
- A network of compromised computers (bots) controlled by an attacker to perform coordinated malicious activities.
- Brute Force Attack
- An attack method that tries all possible combinations to crack passwords or encryption keys.
- Buffer Overflow
- A vulnerability where a program writes data beyond the allocated memory buffer, potentially allowing code execution.
- Bug Bounty
- A program where organizations reward security researchers for discovering and reporting vulnerabilities.
C
- Certificate Authority (CA)
- A trusted entity that issues digital certificates to verify identities on the Internet.
- CIA Triad
- The three core principles of information security: Confidentiality, Integrity, and Availability.
- Command and Control (C2/C&C)
- Infrastructure used by attackers to communicate with and control compromised systems.
- Common Vulnerabilities and Exposures (CVE)
- A standardized identifier for known security vulnerabilities and exposures.
- Credential Stuffing
- An attack where stolen username/password pairs are used to gain unauthorized access to user accounts.
- Cross-Site Request Forgery (CSRF)
- An attack that tricks a user’s browser into executing unwanted actions on a trusted site where they’re authenticated.
- Cross-Site Scripting (XSS)
- A vulnerability allowing attackers to inject malicious scripts into web pages viewed by other users.
- Cryptography
- The practice of securing information through encryption and other mathematical techniques.
- CVE Score (CVSS)
- Common Vulnerability Scoring System - a standardized method for rating the severity of security vulnerabilities.
D
- Data Breach
- Unauthorized access to confidential data, resulting in its disclosure, theft, or use.
- DDoS (Distributed Denial of Service)
- An attack overwhelming a system with traffic from multiple sources to make it unavailable.
- Defense in Depth
- A security strategy employing multiple layers of protection.
- Demilitarized Zone (DMZ)
- A network segment that sits between an internal network and untrusted external networks.
- Dictionary Attack
- A password attack using a list of common words and passwords.
- Digital Forensics
- The process of collecting, analyzing, and preserving electronic evidence for investigation.
- DNS (Domain Name System)
- The system that translates human-readable domain names into IP addresses.
- DNS Spoofing/Poisoning
- An attack corrupting DNS cache data to redirect users to malicious sites.
E
- Encryption
- The process of converting data into an unreadable format to prevent unauthorized access.
- Endpoint
- Any device connected to a network, such as computers, smartphones, or IoT devices.
- Endpoint Detection and Response (EDR)
- Security solutions that monitor and respond to threats on endpoint devices.
- Enumeration
- The process of gathering information about a target system or network.
- Escalation of Privilege
- Gaining higher-level access or permissions than originally granted.
- Ethical Hacking
- Authorized testing of systems to identify vulnerabilities before malicious hackers can exploit them.
- Exploit
- Code or technique that takes advantage of a vulnerability to compromise a system.
- Exploit Kit
- A toolkit containing pre-packaged exploits for various vulnerabilities.
F
- False Positive
- When a security system incorrectly identifies benign activity as malicious.
- Firewall
- A network security device that monitors and filters incoming and outgoing traffic based on security rules.
- Footprinting
- The process of gathering information about a target system or organization.
- Forensics
- See Digital Forensics.
- Fuzzing
- An automated testing technique that provides invalid, unexpected, or random data as inputs to discover vulnerabilities.
G
- Gray Hat
- A hacker who operates between ethical (white hat) and malicious (black hat) hacking.
- Governance, Risk, and Compliance (GRC)
- A framework for managing an organization’s security, risk, and regulatory compliance.
H
- Hash Function
- A mathematical function that converts input data into a fixed-size string, used for data integrity and password storage.
- Honeypot
- A decoy system designed to attract and detect attackers.
- HTTP (Hypertext Transfer Protocol)
- The protocol for transmitting web pages over the Internet.
- HTTPS (HTTP Secure)
- HTTP with encryption using TLS/SSL for secure communication.
I
- Incident Response (IR)
- The process of detecting, analyzing, and responding to security incidents.
- Indicator of Compromise (IoC)
- Evidence that a security breach has occurred or is occurring.
- Information Security (InfoSec)
- The practice of protecting information from unauthorized access, use, or destruction.
- Injection Attack
- An attack inserting malicious code into an application (e.g., SQL injection, command injection).
- Insider Threat
- A security risk posed by individuals within an organization with legitimate access.
- Intrusion Detection System (IDS)
- A system that monitors network traffic for suspicious activity and alerts administrators.
- Intrusion Prevention System (IPS)
- Similar to IDS but can actively block detected threats.
- ISO 27001
- An international standard for information security management systems (ISMS).
K
- Kerberos
- A network authentication protocol using tickets to allow secure authentication over non-secure networks.
- Keylogger
- Malware that records keystrokes to steal sensitive information like passwords.
- Kill Chain
- A model describing the stages of a cyberattack, from reconnaissance to action on objectives.
L
- Lateral Movement
- An attacker’s technique of moving through a network after initial compromise to access additional systems.
- Least Privilege
- The security principle of granting users only the minimum access necessary to perform their duties.
- LDAP (Lightweight Directory Access Protocol)
- A protocol for accessing and maintaining directory services over a network.
- Log Analysis
- Examining log files to identify security incidents, troubleshoot issues, or ensure compliance.
M
- Malware
- Malicious software designed to damage, disrupt, or gain unauthorized access to systems.
- Man-in-the-Middle (MitM)
- An attack where an attacker intercepts and potentially alters communication between two parties.
- Multi-Factor Authentication (MFA)
- Authentication requiring two or more verification factors (something you know, have, or are).
N
- Network Segmentation
- Dividing a network into smaller segments to improve security and performance.
- NIST (National Institute of Standards and Technology)
- A U.S. agency that develops cybersecurity frameworks and standards.
- Nmap
- A popular open-source network scanning and enumeration tool.
- NTLM (NT LAN Manager)
- A Microsoft authentication protocol used in Windows environments.
O
- Open Source Intelligence (OSINT)
- Information gathering from publicly available sources.
- OWASP (Open Web Application Security Project)
- A nonprofit organization focused on improving software security.
- OWASP Top 10
- A list of the ten most critical web application security risks.
P
- Patch
- A software update that fixes vulnerabilities or bugs.
- Patch Management
- The process of testing and deploying software updates to systems.
- Payload
- The malicious code delivered by an exploit.
- Penetration Testing (Pentest)
- Simulated cyberattacks to identify vulnerabilities in systems.
- Phishing
- Social engineering attacks using fraudulent messages to trick users into revealing sensitive information.
- Pivot/Pivoting
- Using a compromised system as a launching point to attack other systems on the network.
- Port
- A numbered endpoint for network communication.
- Port Scanning
- Probing a system to identify open ports and services.
- Privilege Escalation
- Gaining higher-level permissions than initially granted.
- Proxy
- An intermediary server that forwards requests between clients and servers.
- Public Key Infrastructure (PKI)
- A framework for managing digital certificates and public-key encryption.
R
- Ransomware
- Malware that encrypts files and demands payment for decryption.
- Red Team
- The offensive security team that simulates attacks to test defenses.
- Remote Code Execution (RCE)
- A vulnerability allowing an attacker to execute arbitrary code on a target system.
- Reverse Engineering
- Analyzing software or hardware to understand its functionality and identify vulnerabilities.
- Reverse Shell
- A connection initiated from a target system back to an attacker’s system.
- Risk Assessment
- The process of identifying, analyzing, and evaluating security risks.
- Rootkit
- Malware designed to hide its presence and maintain privileged access to a system.
S
- Sandbox
- An isolated environment for safely executing and analyzing suspicious code.
- SIEM (Security Information and Event Management)
- Systems that collect, analyze, and correlate security logs from multiple sources.
- Social Engineering
- Manipulating people into divulging confidential information or performing actions.
- Spear Phishing
- Targeted phishing attacks directed at specific individuals or organizations.
- SQL Injection (SQLi)
- An injection attack inserting malicious SQL code into database queries.
- SSH (Secure Shell)
- A cryptographic network protocol for secure remote access.
- SSL/TLS (Secure Sockets Layer/Transport Layer Security)
- Protocols for encrypting data transmitted over networks.
- SUID (Set User ID)
- A Unix permission allowing users to execute files with the permissions of the file owner.
T
- Threat Actor
- An individual or group responsible for a security incident.
- Threat Hunting
- Proactively searching for threats that have evaded automated detection.
- Threat Intelligence
- Information about threats and adversaries used to inform security decisions.
- Threat Model
- A structured approach to identifying and prioritizing potential threats.
- TLS (Transport Layer Security)
- See SSL/TLS.
- Token
- A digital object representing authentication credentials or authorization.
- Trojan Horse (Trojan)
- Malware disguised as legitimate software.
- Two-Factor Authentication (2FA)
- See Multi-Factor Authentication.
V
- Virtual Private Network (VPN)
- A secure, encrypted connection over a public network.
- Virus
- Self-replicating malware that spreads by attaching to files or programs.
- Vulnerability
- A weakness in a system that can be exploited by threats.
- Vulnerability Assessment
- The process of identifying and evaluating security vulnerabilities.
- Vulnerability Scanner
- Automated tools that identify known vulnerabilities in systems.
W
- Web Application Firewall (WAF)
- A firewall specifically designed to protect web applications.
- Whaling
- Phishing attacks targeting high-profile individuals like executives.
- White Hat
- An ethical hacker who uses their skills for defensive purposes.
- Worm
- Self-replicating malware that spreads independently without human interaction.
X
- XSS (Cross-Site Scripting)
- See Cross-Site Scripting.
Z
- Zero-Day
- A vulnerability unknown to the vendor or public, or for which no patch exists.
- Zero Trust
- A security model that assumes no user or system should be automatically trusted.
- Zombie
- A compromised computer controlled by an attacker, typically part of a botnet.
Last Updated: March 2025
This glossary is continuously updated. If you notice any missing terms or have suggestions, please contact us.