Cybersecurity Glossary

1506 essential cybersecurity terms explained. Your reference guide from A to Z.

1506Terms
A–ZIndexed
All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A
ARP Spoofing
An attack where a malicious actor sends falsified ARP messages to link their MAC address with a legitimate IP address, enabling man-in-the-middle attacks on a local network.
API Security
The practice of protecting application programming interfaces from attacks and misuse, including authentication, authorization, rate limiting, and input validation.
AES
Advanced Encryption Standard. A symmetric block cipher adopted as the encryption standard by the US government, widely used for securing sensitive data with 128, 192, or 256-bit keys.
Asymmetric Encryption
An encryption method using a pair of mathematically related keys where one encrypts and the other decrypts, enabling secure communication without prior key exchange.
Argon2
A modern password hashing algorithm that won the Password Hashing Competition, designed to be resistant to GPU and ASIC-based attacks using memory-hard operations.
Adware
Software that automatically displays or downloads advertising material, often bundled with free software and sometimes collecting user data for targeted advertising.
APT
Advanced Persistent Threat. A sophisticated, long-term cyberattack campaign where an intruder gains and maintains unauthorized access to a network, often state-sponsored.
Authentication
The process of verifying the identity of a user, device, or system, typically through credentials like passwords, tokens, biometrics, or certificates.
Authorization
The process of determining what resources and actions an authenticated user is permitted to access, enforced through policies and access control mechanisms.
Active Directory
Microsoft directory service that provides authentication and authorization for Windows domain networks, managing users, computers, and security policies.
ABAC
Attribute-Based Access Control. An access control model that evaluates attributes of users, resources, and environment conditions to make authorization decisions.
Aircrack-ng
A network security suite for assessing Wi-Fi network security, including monitoring, attacking, testing, and cracking WEP and WPA/WPA2 encryption.
Artifact
A piece of digital evidence found during forensic analysis, such as log entries, file metadata, registry entries, or network traffic captures.
Acceptable Use Policy
A document defining the acceptable ways employees and users can use organizational IT resources, establishing boundaries and consequences for violations.
Attack Surface
The total sum of all possible entry points or vulnerabilities through which an attacker could potentially gain unauthorized access to a system or network.
Attack Vector
The specific path, method, or scenario an attacker uses to gain unauthorized access to a system or network, such as phishing emails or unpatched vulnerabilities.
Air Gap
A physical and logical isolation of a computer or network from unsecured networks, including the internet, used to protect highly sensitive systems.
App Sandboxing
A mobile OS security mechanism that isolates each application in its own restricted environment, preventing unauthorized access to other apps and system resources.
Attachment Sandboxing
The practice of opening email attachments in an isolated virtual environment to detect malicious behavior before delivering them to the recipient inbox.
AI-Powered Attacks
Cyberattacks that leverage artificial intelligence and machine learning to automate reconnaissance, generate convincing phishing content, or evade detection systems.
Adversarial Machine Learning
Techniques that exploit vulnerabilities in machine learning models by crafting inputs designed to cause the model to make incorrect predictions.
AI Jailbreaking
Techniques used to bypass the safety restrictions and content policies of AI systems, causing them to produce outputs they are designed to refuse.
Asset Management
The practice of tracking and managing all IT assets within an organization, essential for understanding and protecting the complete attack surface.
After-Action Report
A structured review document completed after a security incident or exercise that captures lessons learned, successes, and areas for improvement.
Access Control System
Hardware and software systems that manage and restrict physical access to facilities, rooms, and equipment using cards, biometrics, or PINs.
AMSI Bypass
Techniques used to circumvent the Antimalware Scan Interface in Windows, allowing malicious scripts to execute without being detected by security software.
AS-REP Roasting
An attack targeting Active Directory accounts that do not require Kerberos preauthentication, allowing offline password cracking of their AS-REP responses.
Assumed Breach
A penetration testing approach that begins with the assumption that an attacker already has internal access, focusing on lateral movement and impact assessment.
Adaptive Authentication
A security method that adjusts authentication requirements based on risk assessment, requiring additional verification for suspicious login attempts.
Alert Fatigue
A condition where security analysts become desensitized to security alerts due to the high volume of false positives, potentially missing genuine threats.
Attack Tree
A conceptual diagram showing how a system can be attacked, with the root representing the attacker's goal and branches representing different attack paths.
Adversary Simulation
The practice of mimicking the tactics, techniques, and procedures of specific threat actors to test an organization's detection and response capabilities.
API Gateway
A server that acts as a single entry point for API requests, handling authentication, rate limiting, request routing, and security enforcement.
Adversarial Machine Learning
The study of attacks on machine learning systems and defenses against them, including evasion, poisoning, and model extraction attacks.
AI Red Teaming
The practice of systematically testing AI systems for vulnerabilities, biases, and failure modes using adversarial techniques and creative probing.
AI Supply Chain Attack
An attack targeting the AI development pipeline, including compromised training data, poisoned pre-trained models, and malicious dependencies.
Autonomous Threat
AI-powered malware or attack tools that can independently make decisions, adapt to defenses, and pursue objectives without human operator input.
AI Hallucination Exploit
An attack that exploits AI model hallucinations by registering domain names, package names, or resources that AI systems falsely recommend.
AI-Powered Phishing
Phishing attacks enhanced by AI to generate highly personalized and convincing messages, automatically adapting content based on target profiles.
AI Firewall
Security solutions that monitor and filter AI model inputs and outputs to detect prompt injections, data leaks, and other AI-specific threats.
APK Decompilation
The process of reverse engineering Android application packages to analyze source code, identify vulnerabilities, and understand application behavior.
Android Rooting
The process of gaining root access on Android devices to bypass manufacturer restrictions and access system files for security testing.
App Wrapping
A mobile security approach that applies a management layer to mobile applications without modifying the underlying code, enforcing security policies.
ARC
Authenticated Received Chain. An email authentication system that preserves authentication results across intermediaries like mailing lists and forwarding services.
Active Reconnaissance
Information gathering that involves direct interaction with the target system, such as port scanning, service enumeration, and vulnerability probing.
Anti-Forensics
Techniques used to prevent or hinder digital forensic analysis, including data wiping, encryption, log tampering, and timestamp manipulation.
AppLocker Bypass
Techniques for circumventing Windows AppLocker application whitelisting policies to execute unauthorized programs.
AI Worm
Self-propagating malware that uses AI to adapt its behavior, evade detection, and automatically spread across systems without human direction.
AI Model Theft
The unauthorized extraction or replication of proprietary machine learning models through techniques like model extraction or side-channel attacks.
Adversarial Example
Intentionally crafted inputs designed to cause machine learning models to make incorrect predictions while appearing normal to humans.
AI Governance
Frameworks and practices for managing the development and deployment of AI systems responsibly, including security, ethics, and compliance.
AI Supply Chain Risk
Security risks in the AI development pipeline including compromised pre-trained models, poisoned datasets, and malicious dependencies.
Account Takeover
An attack where a malicious actor gains unauthorized access to a user account, typically through credential theft or session hijacking.
API Abuse
The exploitation of API endpoints beyond their intended use, including excessive requests, parameter manipulation, and business logic exploitation.
AMQP
Advanced Message Queuing Protocol. An application layer protocol for message-oriented middleware, requiring security considerations for authentication and encryption.
Assume Breach Mentality
A security mindset that operates under the assumption that attackers are already inside the network, driving more resilient security practices.
Attack Chain
The sequence of steps an attacker takes from initial reconnaissance to achieving their final objective, used for understanding and disrupting attacks.
Anycast
A network addressing and routing method where multiple servers share the same IP address, used for DDoS mitigation and content delivery.
Application Layer Gateway
A firewall component that provides protocol-specific filtering at the application layer, understanding application-level commands.
API Rate Limit Bypass
Techniques for circumventing API rate limiting controls, including header manipulation, IP rotation, and parameter pollution.
Arkime
An open-source full packet capture and search system that indexes network traffic for forensic analysis and threat hunting.
Asset Discovery
The automated process of identifying all hardware and software assets connected to an organization network for security management.
Autopsy
An open-source digital forensics platform with a graphical interface built on The Sleuth Kit for hard drive and smartphone analysis.
AICPA SOC
American Institute of CPAs Service Organization Controls. Audit frameworks for evaluating service provider security controls.
AWS GuardDuty
An AWS threat detection service that continuously monitors for malicious activity and unauthorized behavior in AWS accounts.
AI Code Generation Risk
Security risks from AI-generated code including vulnerable patterns, outdated libraries, and hallucinated package names.
AI Social Engineering
The use of AI to automate and enhance social engineering attacks through personalized phishing, voice cloning, and deepfakes.
Adversarial Patch
A physical pattern designed to fool computer vision systems when placed in a camera field of view, potentially evading surveillance.
AI Bias Exploitation
Attacks that deliberately exploit known biases in AI systems to achieve favorable outcomes or bypass security decisions.
API Security Testing
The process of testing APIs for vulnerabilities including authentication flaws, injection attacks, and business logic errors.
ACME Protocol
Automatic Certificate Management Environment. A protocol for automating certificate issuance and management, used by Let us Encrypt.
App Store Malware
Malicious applications that bypass app store security reviews and are distributed through official channels to reach victims.
Anti-Spoofing Controls
Technical measures including SPF, DKIM, DMARC, and MTA-STS that prevent unauthorized parties from sending email as your domain.
ARP Cache Poisoning
Corrupting the ARP table of a target device to associate the attacker MAC address with a legitimate IP, enabling traffic interception.
Assumed Compromise Assessment
A penetration test starting from the assumption of initial access to evaluate internal defenses, detection, and response capabilities.
API Penetration Testing
Security testing specifically targeting application programming interfaces to identify authentication, authorization, and injection vulnerabilities.
Active Directory Penetration Testing
Security assessment focused on Active Directory environments, testing Kerberos attacks, trust relationships, and privilege escalation paths.
Access Review
A periodic process of validating that users access rights are appropriate for their current roles, removing unnecessary permissions.
Authorization Server
A component that authenticates resource owners and issues access tokens to clients after receiving valid authorization grants.
Attribute Certificate
A digital document that binds a set of attributes to an entity, used for fine-grained authorization without bundling identity.
API Key
A unique identifier used to authenticate requests to an API, providing a simple but less secure alternative to OAuth tokens.
Attack Surface Management
The continuous discovery, monitoring, and management of an organization external-facing digital assets and their vulnerabilities.
AI Alignment
The challenge of ensuring artificial intelligence systems behave in accordance with human values and intentions.
AI Safety
Research and practices focused on preventing AI systems from causing unintended harm, including alignment and robustness.
AI Data Extraction
Techniques for recovering training data from machine learning models through memorization exploitation and inference attacks.
AI Watermarking
Techniques for embedding detectable signals in AI-generated content to identify its synthetic origin.
AI Incident Response
Procedures for handling security incidents involving AI systems including model compromise, data poisoning, and adversarial attacks.
AI Penetration Testing
Security assessment of AI and machine learning systems for vulnerabilities including adversarial robustness and data extraction.
API Endpoint Discovery
The process of identifying undocumented or hidden API endpoints that may lack proper security controls.
API Versioning Security
Security risks arising from maintaining multiple API versions, where older versions may contain unpatched vulnerabilities.
Assumed Breach Assessment
A security engagement starting from simulated internal access to test detection, response, and containment capabilities.
Adversary Emulation Plan
A detailed plan for simulating specific threat actor techniques during red team engagements, based on threat intelligence.
Atomic Red Team
A library of simple, focused tests mapped to the MITRE ATT&CK framework for validating security detection capabilities.
Attack Path Analysis
The identification and visualization of potential routes an attacker could take from initial access to critical assets.
Alert Correlation
The process of analyzing multiple security alerts to identify related events that together indicate a larger attack pattern.
Access Control Policy
A policy defining how access to systems and data is granted, managed, reviewed, and revoked within an organization.
AI-Powered Deception
Using artificial intelligence to create more convincing social engineering attacks, including personalized phishing and voice impersonation.
AI Explainability
The ability to understand and explain how AI systems reach their decisions, critical for identifying bias and detecting adversarial manipulation.
Attribute-Based Access
An access control model where authorization decisions are based on attributes of users, resources, and environmental conditions.
Attack Tree Analysis
A systematic method for describing and analyzing the security of systems using a tree structure showing how a target can be attacked.
Automated Penetration Testing
Tools that automate discovery, enumeration, and exploitation phases of penetration testing for consistent and repeatable results.
API Key Leakage
The accidental exposure of API keys in source code repositories, client-side code, or public documentation.
Attack Campaign
A coordinated series of related cyberattacks conducted by a threat actor against specific targets over a defined period.
Anti-Analysis Technique
Malware capabilities that detect and evade analysis environments including debugger detection, VM detection, and timing checks.
Audit Trail
A chronological record of system activities that provides documentary evidence of the sequence of events for regulatory review.
AI-Powered Threat Detection
Using machine learning algorithms to identify security threats by analyzing patterns in network traffic, user behavior, and system logs.
Autonomous Security
AI-driven security systems that can independently detect, analyze, and respond to threats without human intervention.
AI Model Poisoning
Deliberately corrupting AI model training data or processes to introduce vulnerabilities or biases that can be exploited later.
Access Certification
A periodic review process where managers verify that users access rights are still appropriate for their current roles.
Attack Emulation Plan
A detailed blueprint for simulating specific threat actor campaigns during red team engagements.
AI Content Detection
Technologies that identify whether text, images, or media were generated by artificial intelligence systems.