Glossary
Find the definition of the most commonly used cyber security terms in our glossary below.
- Access Certification
- Access Discovery
- Access Management
- Active Directory
- Adaptive Multi-Factor Authentication
- Adware
- Antivirus
- Application (App) Gateway
- Authentication
- Authorization
- Backdoor
- Blacklisting
- Botnet
- Brute Force Attack
- CI/CD Pipeline
- Cloud IAM Permissions
- Cloud Identity Security
- Cloud Infrastructure Entitlements Management
- Cloud Workload Security
- Cyber Espionage
- Cyber Hygiene
- Cyber Insurance
- Data Breach
- Data Sovereignty
- DDoS Attack
- Defense-in-Depth
- DevOps Security
- Digital Transformation
- Directory Services
- Distributed Denial of Service
- DNS Spoofing
- Encryption
- Endpoint Detection and Response (EDR)
- Endpoint Security
- Enterprise Browser
- Exploit
- Firewall
- Honeypot
- Identity and Access Management
- Identity as a Service
- Identity Governance and Administration
- Identity Lifecycle Management
- Identity Orchestration
- Identity Security
- Identity Threat Detection and Response
- IDS
- Insider Threat
- Keylogger
- Logic Bomb
- Man-in-the-Middle Attack
- Patch
- Penetration Testing
- Pharming
- Phishing
- Red Team
- Remote Access Trojan
- Security Information and Event Management
- Social Engineering
- Spoofing
- Threat Intelligence
- Trojan
- Two-Factor Authentication
- URL Filtering
- Virtual Machine (VM)
- Virtual Private Network
- VPN
- Watering Hole Attack
- Whitelisting
- Zero-Day
- Zero-Day Exploit