Cybersecurity Glossary
1506 essential cybersecurity terms explained. Your reference guide from A to Z.
1506Terms
A–ZIndexed
K
Key Exchange
The method by which cryptographic keys are exchanged between parties, with protocols like Diffie-Hellman enabling secure key agreement over insecure channels.
Keylogger
Software or hardware that records keystrokes made by a user, often used maliciously to capture passwords, credit card numbers, and other sensitive information.
Kerberos
A network authentication protocol that uses tickets to allow nodes to prove their identity securely over non-secure networks, widely used in Active Directory environments.
Kerberoasting
An attack technique that targets Active Directory service accounts by requesting Kerberos service tickets and cracking them offline to obtain plaintext passwords.
Kill Chain
A model describing the stages of a cyberattack from reconnaissance to objective completion, used to understand and disrupt attack progression.
Kubernetes Security
Security practices for Kubernetes container orchestration platforms, including cluster hardening, pod security, network policies, and secrets management.
KRACK Attack
Key Reinstallation Attack. A vulnerability in the WPA2 protocol that allows attackers to intercept and decrypt Wi-Fi traffic by manipulating the four-way handshake.
Kali Linux
A Debian-based Linux distribution designed for digital forensics and penetration testing, pre-loaded with hundreds of security tools and utilities.
Key Management
The administration of cryptographic keys throughout their lifecycle, including generation, distribution, storage, rotation, and destruction.
KRACK
Key Reinstallation Attack. A vulnerability in the WPA2 protocol that allows attackers to decrypt wireless traffic by manipulating and replaying handshake messages.
KARMA Attack
A wireless attack where a rogue access point responds to all probe requests, tricking devices into connecting by advertising any network name they seek.
Key Management System
A system that manages the lifecycle of cryptographic keys, including generation, distribution, storage, rotation, and destruction.
Killware
Malware specifically designed to cause physical harm or endanger human life by targeting critical infrastructure and medical systems.
Key Stretching
A technique that makes a potentially weak cryptographic key more secure by increasing the resources needed to test each possible key.
Key Derivation Function
A cryptographic algorithm that derives one or more secret keys from a master key, password, or other source of entropy.
Kerberos Protocol
A network authentication protocol that uses symmetric key cryptography and a trusted third party to authenticate users and services.
Kyber
A lattice-based key encapsulation mechanism selected by NIST for post-quantum cryptography standardization.
Key Ceremony
A formal process for generating cryptographic keys with multiple witnesses and security controls to ensure key integrity.