<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityelites.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityelites.com/glossary/deepfake/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/adversarial-machine-learning/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/prompt-injection/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-poisoning/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/model-extraction/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ai-jailbreaking/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/llm-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/synthetic-identity-fraud/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/quantum-computing-threat/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/5g-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/blockchain-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/smart-contract-vulnerability/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/rug-pull/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/flash-loan-attack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/vulnerability-management/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/patch-tuesday/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/change-management/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/configuration-management/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/asset-management/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/security-baseline/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/tabletop-exercise/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/red-team-exercise/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/penetration-test-report/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/security-metrics/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/mean-time-to-detect/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/mean-time-to-respond/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/security-awareness/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/phishing-simulation/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/runbook/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/playbook/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/war-room/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/after-action-report/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cyber-range/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/capture-the-flag/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/hackthebox/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/tryhackme/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/kali-linux/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/parrot-os/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/security-automation/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-at-rest/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-in-transit/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-in-use/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/backup-strategy/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/3-2-1-backup-rule/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/encryption-at-rest/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/key-management/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-retention-policy/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/secure-deletion/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/database-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/sql-audit-trail/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-governance/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/physical-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/access-control-system/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cctv/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/mantrap/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/faraday-cage/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/clean-desk-policy/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dumpster-diving/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/shoulder-surfing/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/social-engineering-toolkit/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/physical-penetration-testing/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/http/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/https/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ftp/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/sftp/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ssh/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/telnet/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/smtp/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/imap/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/pop3/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ntp/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/sip/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/rdp/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/smb/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/living-off-the-land/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/lolbas/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/gtfobins/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/reverse-shell/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/bind-shell/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/webshell/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/token-impersonation/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dll-injection/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dll-hijacking/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/process-hollowing/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/amsi-bypass/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/powershell-empire/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/covenant/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/impacket/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/crackmapexec/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/chisel/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ligolo/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ceh/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/oscp/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cissp/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cism/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cisa/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/gpen/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/crtp/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ejpt/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/soc-analyst/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/penetration-tester/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/security-architect/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ciso/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/bug-bounty-hunter/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/threat-intelligence-analyst/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/sdn/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/zero-trust-network/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/microsegmentation/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/east-west-traffic/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/north-south-traffic/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/sflow/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/network-topology/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/bastion-host/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/jump-server/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/network-acl/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/stateful-firewall/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/next-gen-firewall/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ids-evasion/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/network-pivoting/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/covert-channel/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dns-tunneling/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ssl-inspection/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/traffic-analysis/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ipsec/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/gre-tunnel/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/csp/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dom-xss/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/template-injection/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/directory-listing/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/race-condition/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/mass-assignment/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/jwt-vulnerability/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/websocket-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/subdomain-takeover/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/parameter-pollution/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/web-cache-poisoning/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/prototype-pollution/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/crlf-injection/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/scope-creep/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/persistence-mechanism/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/lolbins/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/as-rep-roasting/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/pass-the-ticket/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dcsync/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/tunneling/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/assumed-breach/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/wireless-penetration-testing/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/osint-reconnaissance/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cryptojacker/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/loader/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/zero-day-exploit/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/malware-sandbox/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ttp/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/mitre-attack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/reverse-engineering/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/sandbox-evasion/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/rsa-algorithm/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/elliptic-curve/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/sha-256/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/pbkdf2/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/perfect-forward-secrecy/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/one-time-pad/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/hotp/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/passkey/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/oidc/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/pac/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ntlm/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/federation/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/credential-harvesting/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/adaptive-authentication/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/certificate-based-auth/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cnapp/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cloud-access-security-broker/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cloud-misconfiguration/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/s3-bucket-exposure/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/iam-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cloud-encryption/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/vpc-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/saas-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/infrastructure-as-code-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cloud-waf/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/immutable-infrastructure/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/secrets-management/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/log-management/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/security-monitoring/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/alert-fatigue/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/attack-tree/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/risk-register/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/deception-technology/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/canary-token/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/incident-response-plan/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/disk-forensics/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/timeline-analysis/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/live-forensics/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dead-box-forensics/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/write-blocker/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/forensic-imaging/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/carving/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/steganalysis/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ioc-extraction/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->