Cybersecurity Glossary

1506 essential cybersecurity terms explained. Your reference guide from A to Z.

1506Terms
A–ZIndexed
All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Z
Zero Trust
A security model that requires strict identity verification for every person and device attempting to access resources, regardless of whether they are inside or outside the network perimeter.
Zero-Day
A previously unknown software vulnerability that is exploited before the vendor has released a patch, giving defenders zero days to address the threat.
Zero-Knowledge Proof
A cryptographic method where one party proves knowledge of information to another party without revealing the information itself.
ZTNA
Zero Trust Network Access. A security model that provides secure remote access to applications based on defined access control policies, replacing traditional VPN access.
Zero Trust Network
A security model that requires strict identity verification for every person and device trying to access resources, regardless of whether they are inside or outside the network perimeter.
Zero-Day Exploit
An attack that targets a previously unknown software vulnerability for which no patch exists, giving defenders zero days to fix the issue.
Zigbee Attack
Attacks targeting Zigbee wireless protocol used in smart home devices, including key extraction, replay attacks, and network infiltration.
Zero-Knowledge Authentication
An authentication protocol where the prover demonstrates knowledge of a secret without revealing the secret itself to the verifier.
Zero Trust Architecture
A cybersecurity architecture based on zero trust principles that eliminates implicit trust and continuously validates every digital interaction.
Zerologon
A critical vulnerability in the Netlogon protocol that allows attackers to take over Windows domain controllers by exploiting a cryptographic flaw.
Zeek
An open-source network security monitoring platform that provides detailed logs of network activity for security analysis.
Zero-Knowledge Identity
Identity verification systems that confirm attributes about a person without revealing the underlying personal data.
Zero-RTT
A TLS 1.3 feature allowing data transmission on the first round trip of a connection, trading some security properties for lower latency.
Zigbee Security
Security analysis of Zigbee IoT protocol including key management weaknesses, replay attacks, and network infiltration techniques.