<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityelites.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityelites.com/glossary/post-exploitation/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/persistence/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/pivoting/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/exfiltration/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/social-engineering/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/pretexting/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/tailgating/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/nmap/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/metasploit/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/burp-suite/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/wireshark/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/john-the-ripper/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/hashcat/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cobalt-strike/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/mimikatz/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/bloodhound/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/responder/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/sqlmap/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/nikto/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dirb/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/gobuster/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/hydra/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/aircrack-ng/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/shodan/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cve/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cvss/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cwe/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/scope/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/rules-of-engagement/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/incident-response/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/digital-forensics/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/chain-of-custody/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/threat-hunting/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ioc/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ioa/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ttps/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/kill-chain/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/containment/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/eradication/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/recovery/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/lessons-learned/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/volatility/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/disk-imaging/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/log-analysis/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/threat-intelligence/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/malware-analysis/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/sandbox-analysis/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/memory-forensics/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/artifact/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dfir/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cloud-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/shared-responsibility-model/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/iaas/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/paas/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/saas/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/casb/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cspm/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/container-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/serverless-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/s3-bucket-misconfiguration/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/iam/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cloud-workload-protection/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/kubernetes-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/docker-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cloud-native-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cwpp/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/multi-cloud-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cloud-forensics/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/gdpr/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/hipaa/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/pci-dss/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/soc-2/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/iso-27001/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/nist/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/nist-csf/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cis-controls/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ccpa/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ferpa/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/sox/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/fedramp/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/fisma/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/risk-assessment/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/vulnerability-assessment/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/compliance-audit/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-classification/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-loss-prevention/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/security-policy/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/acceptable-use-policy/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/business-continuity/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/disaster-recovery/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cybersecurity/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/information-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cia-triad/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/attack-surface/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/attack-vector/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/threat-actor/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/threat-model/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/defense-in-depth/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/security-by-design/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/shift-left-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/devsecops/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/patch-management/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/hardening/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/sandboxing/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-breach/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-exfiltration/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/insider-threat/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cyber-kill-chain/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/threat-landscape/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/security-awareness-training/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/vulnerability-disclosure/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/responsible-disclosure/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/full-disclosure/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cyber-insurance/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/security-orchestration/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/soar/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/edr/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/xdr/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/mdr/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ztna/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/sase/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/endpoint-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/network-tap/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/air-gap/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cyber-resilience/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/pii/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/phi/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-anonymization/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-pseudonymization/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-masking/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/tokenization/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/right-to-be-forgotten/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/privacy-by-design/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-sovereignty/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cookie-consent/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/privacy-impact-assessment/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/de-identification/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/digital-footprint/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/doxing/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/identity-theft/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/iot-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/firmware-analysis/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/rfid-cloning/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/hardware-security-module/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/secure-boot/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/tpm/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/side-channel-attack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/jtag/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/bluetooth-hacking/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/usb-drop-attack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/badusb/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/electromagnetic-emanations/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/hardware-implant/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/scada-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ics-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ot-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/mobile-malware/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/app-sandboxing/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/mobile-device-management/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/jailbreaking/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/rooting/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/sms-interception/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/sim-swapping/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/man-in-the-browser/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/certificate-pinning/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/owasp-mobile-top-10/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/spf/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dkim/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dmarc/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/email-spoofing/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/email-gateway/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/s-mime/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/email-bombing/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/header-analysis/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/attachment-sandboxing/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/wpa2/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/krack-attack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/rogue-access-point/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/deauthentication-attack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/pmkid-attack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/wireless-ids/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/8021x/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/radius/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/wi-fi-pineapple/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/sast/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dast/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/iast/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/rasp/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/code-review/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/secure-coding/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/input-validation/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/output-encoding/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/parameterized-queries/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dependency-scanning/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/software-composition-analysis/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/threat-modeling/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/security-champion/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/bug-severity/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/secure-sdlc/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ai-powered-attacks/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->