Cybersecurity Glossary

1506 essential cybersecurity terms explained. Your reference guide from A to Z.

1506Terms
A–ZIndexed
All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
V
VPN
Virtual Private Network. A technology that creates an encrypted tunnel between your device and a remote server, protecting data in transit and masking your IP address.
VLAN
Virtual Local Area Network. A logical grouping of network devices that segments broadcast domains, improving security by isolating traffic between different network segments.
Virus
A type of malware that attaches itself to legitimate programs or files and replicates when the host program is executed, spreading to other files and systems.
Vishing
Voice phishing. A social engineering attack conducted over the phone where attackers impersonate legitimate entities to extract sensitive information from victims.
Vulnerability Scanning
The automated process of identifying security weaknesses in systems and applications using specialized scanning tools that check against known vulnerability databases.
Volatility
An open-source memory forensics framework for analyzing RAM dumps, used to investigate malware, rootkits, and other threats that operate in memory.
Vulnerability Assessment
A systematic review of security weaknesses in systems and applications, identifying, quantifying, and prioritizing vulnerabilities for remediation.
Vulnerability Disclosure
The process of reporting discovered security vulnerabilities to the affected vendor or organization, with responsible disclosure allowing time for patching.
Vulnerability Management
The continuous process of identifying, classifying, remediating, and mitigating security vulnerabilities across an organization technology infrastructure.
VPC Security
Security controls for Virtual Private Cloud environments, including security groups, network ACLs, flow logs, and peering configurations.
Vendor Risk Management
The process of assessing and monitoring the security risks posed by third-party vendors who have access to organizational data or systems.
Visitor Management
The process of tracking and managing visitors entering a facility, including registration, badge issuance, and escort requirements.
Video Analytics
AI-powered analysis of surveillance video to automatically detect security events, unusual behavior, and potential threats in real time.
VR Security Training
The use of virtual reality technology for immersive cybersecurity training, simulating real-world scenarios for hands-on experience.
VLAN Hopping
An attack that allows traffic from one VLAN to reach another VLAN by exploiting switch misconfigurations or 802.1Q tagging vulnerabilities.
Vertical Privilege Escalation
Gaining higher-level permissions than currently assigned, such as a standard user obtaining administrator access.
Voice Cloning Attack
Using AI-generated synthetic voice to impersonate individuals for social engineering, fraud, or bypassing voice-based authentication.
Verifiable Credentials
A W3C standard for digital credentials that can be cryptographically verified, enabling trustworthy digital identity assertions.
VPN Split Tunneling
A VPN configuration that routes only specific traffic through the VPN tunnel while allowing other traffic to access the internet directly.
Velociraptor
An open-source endpoint visibility and collection tool that enables forensic analysis and real-time monitoring across an enterprise.
Vehicle Forensics
The extraction and analysis of digital evidence from modern vehicles including infotainment systems, GPS data, and event recorders.
Vendor Email Compromise
An attack where criminals compromise a vendor email account to send fraudulent invoices or payment redirection requests to their customers.
Vulnerability Scanner
An automated tool that scans systems, networks, and applications to identify known security vulnerabilities and misconfigurations.
Volatile Data Collection
The capture of ephemeral system data from running systems including memory contents, network connections, and running processes.
Vulnerability Management Policy
A policy defining requirements for identifying, assessing, remediating, and reporting security vulnerabilities.
Vulnerability Prioritization
The process of ranking discovered vulnerabilities by risk to determine remediation order, considering exploitability and business impact.