<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//securityelites.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://securityelites.com/glossary/triage/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/breach-notification/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/evidence-preservation/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/malware-triage/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/soc2/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/nist-framework/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cis-benchmarks/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dora/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/nis2-directive/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cmmc/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-minimization/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/pen-test-compliance/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/security-audit/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/vendor-risk-management/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/baiting/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dns-hijacking/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/evil-twin/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/rubber-ducky/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/wifi-pineapple/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/drop-box/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/red-team-infrastructure/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/adversary-simulation/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/differential-privacy/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/pseudonymization/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/consent-management/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-subject-rights/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cross-border-data-transfer/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/privacy-enhancing-technology/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/identity-governance/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/right-to-access/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-retention/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/sca/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/fuzzing/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dependency-confusion/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/code-signing/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/obfuscation/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/api-gateway/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/rate-limiting/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/sbom/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/indirect-prompt-injection/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/adversarial-ml/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/model-inversion/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ai-red-teaming/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/llm-jailbreak/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/supply-chain-ai-attack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/autonomous-threat/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/weaponized-ai/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/synthetic-identity/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ai-hallucination-exploit/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/rag-poisoning/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/membership-inference/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/federated-learning-attack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ai-phishing/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/gpt-exploitation/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ai-firewall/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/uart/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/spi-flash/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/power-analysis/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/electromagnetic-emanation/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/fault-injection/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cold-boot-attack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/nfc-attack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/bluetooth-attack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/zigbee-attack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/iot-botnet/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/plc/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/hmi/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/mdm/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/byod/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/mobile-app-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ssl-pinning-bypass/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/apk-decompilation/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ios-jailbreak/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/android-rooting/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/mobile-code-signing/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/app-wrapping/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/mobile-threat-defense/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/stagefright/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/mobile-sandbox/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/tapjacking/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/insecure-data-storage/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/certificate-transparency/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/mobile-pentesting/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/emulator-detection/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/hook-framework/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/krack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/deauth-attack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/karma-attack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/wifi-handshake/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/wps-vulnerability/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/spectrum-analysis/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/bluetooth-sniffing/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/wireless-forensics/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/captive-portal-attack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dragonblood/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/fragmentation-attack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/mesh-network-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/wireless-penetration-test/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/bec/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/email-header-analysis/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/spam-filter/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/email-encryption/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/homoglyph-attack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/mta-sts/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/bimi/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/email-sandboxing/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/spear-phishing-detection/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/arc/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dane/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/email-impersonation/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/url-rewriting/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/quarantine/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/bollard/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/security-guard/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/visitor-management/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/environmental-controls/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/secure-destruction/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/piggybacking/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/lock-picking/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/bump-key/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/rfid-access-control/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/video-analytics/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/perimeter-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/intrusion-alarm/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/safe-room/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/security-convergence/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/social-engineering-defense/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/comptia-security-plus/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/oswe/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/osep/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ewptx/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ccna-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/pentest-career-path/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/bug-bounty-career/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/security-analyst/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/incident-responder/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/threat-hunter-career/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/vr-training/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/database-encryption/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/backup-security/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-lifecycle/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-integrity/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/checksum/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/full-disk-encryption/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/file-integrity-monitoring/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-exfiltration-prevention/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/database-activity-monitoring/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/hsm/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/key-management-system/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/data-discovery/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/information-rights-management/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/secure-file-transfer/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/http-2/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/http-3/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/quic/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/tls-1-3/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/tacacs-plus/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/syslog/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/mqtt/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/grpc/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/websocket/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dnssec/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dot/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/doh/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/separation-of-duties/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/need-to-know/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/cyber-hygiene/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/security-posture/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/pen-test-report/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/bgp-hijacking/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/dns-amplification/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ntp-amplification/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/syn-flood/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ip-spoofing/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/mac-flooding/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/vlan-hopping/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/stp-attack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/network-telescope/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/darknet-monitoring/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/flow-analysis/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/packet-crafting/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/network-enumeration/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/passive-reconnaissance/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/active-reconnaissance/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/blind-sqli/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/second-order-sqli/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/error-based-sqli/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/union-sqli/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/time-based-sqli/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/xss-polyglot/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/csp-bypass/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/file-upload-attack/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/server-side-include/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/xpath-injection/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/ldap-injection/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/host-header-injection/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/request-forgery/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/business-logic-flaw/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/http-verb-tampering/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://securityelites.com/glossary/session-puzzle/</loc>
		<lastmod>2026-04-17T00:00:00+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->