Cybersecurity Glossary
1506 essential cybersecurity terms explained. Your reference guide from A to Z.
1506Terms
A–ZIndexed
F
Firewall
A network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules, acting as a barrier between trusted and untrusted networks.
File Upload Vulnerability
A security weakness where a web application fails to properly validate uploaded files, allowing attackers to upload malicious scripts or executables.
Fileless Malware
Malware that operates entirely in memory without writing files to disk, making it difficult to detect with traditional antivirus solutions that scan file systems.
FIDO2
An authentication standard that enables passwordless login using hardware security keys or platform authenticators, providing strong phishing-resistant authentication.
Footprinting
The process of gathering maximum information about a target system, network, or organization during the reconnaissance phase of a penetration test.
FERPA
Family Educational Rights and Privacy Act. A US federal law protecting the privacy of student education records at institutions receiving federal funding.
FedRAMP
Federal Risk and Authorization Management Program. A US government program providing a standardized approach to security assessment for cloud products and services.
FISMA
Federal Information Security Modernization Act. US legislation requiring federal agencies to develop, document, and implement information security programs.
Full Disclosure
A vulnerability disclosure approach where details of security vulnerabilities are published immediately and publicly, without giving the vendor advance notice.
Firmware Analysis
The process of examining device firmware to identify vulnerabilities, backdoors, and hardcoded credentials that could be exploited by attackers.
Flash Loan Attack
A DeFi exploit where attackers use uncollateralized flash loans to manipulate cryptocurrency prices and drain liquidity pools in a single transaction.
Faraday Cage
An enclosure made of conductive material that blocks electromagnetic signals, used to prevent electronic eavesdropping and protect sensitive equipment.
FTP
File Transfer Protocol. A standard network protocol used for transferring files between a client and server, considered insecure without encryption.
Forensic Imaging
The process of creating an exact bit-for-bit copy of a storage device for forensic analysis, preserving the original evidence.
File Carving
A forensic technique that recovers files from unallocated disk space based on file signatures and structure, without relying on file system metadata.
Fuzzing
An automated software testing technique that provides invalid, unexpected, or random data to program inputs to discover vulnerabilities and crashes.
Federated Learning Attack
Attacks targeting distributed machine learning systems where malicious participants manipulate local model updates to corrupt the global model.
Fault Injection
An attack technique that introduces faults into hardware through voltage glitching, clock manipulation, or laser stimulation to bypass security mechanisms.
Full Disk Encryption
A security method that encrypts all data on a storage drive, protecting information even if the device is lost or stolen.
File Integrity Monitoring
A security process that validates the integrity of operating system and application files by comparing current states against known good baselines.
Flow Analysis
The examination of network flow data like NetFlow or sFlow to identify anomalies, detect threats, and understand traffic patterns.
File Upload Attack
An attack exploiting file upload functionality to upload malicious files like web shells, achieving remote code execution on the server.
Format-Preserving Encryption
An encryption scheme where the ciphertext has the same format and length as the plaintext, useful for encrypting structured data.
Firmware Malware
Malware that infects device firmware to persist below the operating system, surviving OS reinstallation and most security measures.
Formjacker
Malicious JavaScript code injected into payment forms on websites to steal credit card information as customers enter their details.
FLARE VM
A Windows-based malware analysis distribution maintained by Mandiant, providing a curated collection of reverse engineering and analysis tools.
Firmware Forensics
The extraction and analysis of device firmware for evidence of tampering, backdoors, or malicious modifications.
Fraggle Attack
A denial-of-service attack similar to Smurf that uses UDP echo instead of ICMP to amplify traffic against a target.
Forced Browsing
An attack where a user manually accesses web pages not linked from the application, potentially finding unprotected administrative functions.
Format String Attack
A vulnerability exploiting format string functions like printf to read or write memory, potentially leading to code execution.
Fileless Attack
An attack technique that executes malicious code entirely in memory using legitimate system tools without writing files to disk.
False Positive Tuning
The process of refining detection rules and thresholds to reduce false alerts while maintaining detection effectiveness.
Forensic Readiness
The organizational preparation to efficiently conduct digital forensic investigations, including log retention and tool availability.
Forensic Report
A detailed document presenting findings from a digital forensic investigation, suitable for legal proceedings and management review.
Federated Learning Security
Security considerations for distributed machine learning where models are trained across decentralized devices without sharing raw data.
First Responder
The initial person to arrive at a digital crime scene or security incident, responsible for preserving volatile evidence.
Forensic Toolkit
A collection of hardware and software tools used by digital forensic investigators to acquire, analyze, and report on evidence.
Forensic Workstation
A dedicated computer system configured specifically for digital forensic analysis with appropriate tools and write-blocking capabilities.
Forensic Imaging Tool
Specialized software or hardware for creating bit-for-bit copies of storage devices while maintaining forensic integrity.