Browse thousands of cybersecurity terms and definitions in our digital security glossary. This cybersecurity dictionary has definitions, examples, terms, and further reading.
A
Abandonware
Accelerated Mobile Pages
Acceptable Use Policy
Access Control Entry
Access Layer
Access Point Name
Account Compromise
Account Hijacking
Account Takeover
Activation Code
Active Attack
Active Defense
Ad Hoc On-demand Distance Vector
Ad-Hoc Mode
Adaptive Authentication
Address Space
Address Space Layout Randomization (ASLR)
ADFGVX Cipher
Administrative Privileges
Advanced Metering Infrastructure
Advanced Penetration Testing
Advanced Threat Detection
Adversarial Machine Learning
Adware
AES Encryption
AI Trism
Alert Fatigue
Allowlisting
Alphanumeric Password
Analog Computer
Angler Phishing
Anomaly-based Detection
Anonymous Call Rejection
Anti-malware
Anti-spam
Antivirus Scanner
Anycast DNS
Apple Filling Protocol (AFP)
AppleTalk Data Stream Protocol (ADSP)
Application Acceleration
Application Allow-listing
Application Base
Application Clustering
Application Delivery Controller (ADC)
Application Deployment
Application Gateway
Application Infrastructure Provider (AIP)
Application Log
Application Performance Monitoring
Application Programming Interface (API)
Application Service Provider (ASP)
Application Streaming
Application-Aware Networking
Arbitrary Code Execution (ACE)
Area Border Router (ABR)
ARM Processor
Artificial Intelligence (AI)
Asynchronous Transfer Mode (ATM)
ATFS
ATM Jackpotting
Atomicity, Consistency, Isolation, Durability (ACID)
Attack Surface
Attack Taxonomy
Attribute-based Encryption (ABE)
Audit Log
Augmented Intelligence
Authentication Header
Authorized Push Payment Fraud
Automatic Private IP Addressing
Autonomous Intelligence
Autorun Worm
B
C
Cache Coherence
Cache Invalidation
Cache Server
Caesar Encryption
Call Stack
Camfecting
Campus Area Network
Canary Token
Canonical Data Model
Canonical Name
CAPTCHA
Captive Portal
Card Purchase Authorization
Cardinality
Carrier Ethernet
CCTV
Cellular Network
Cybersecurity Supply Chain Risk Management (C-SCRM)
D
E
E-Government
Eavesdropping
Edge AI
Edge Datacenter
Edge Network
Egosurfing
Egress Traffic
Elastic IP Address
Electronic Data Interchange
Electronic Intelligence
Electronic Pickpocketing
Electronic Signature
Electronically Stored Information
Elliptic Curve Cryptography
Email Bomb
Email Harvesting
Email Retention Policy
Email Spoofing
Embedded Intelligence
Embedded Software
F
Face ID
Facial Recognition
Failback
Fake Antivirus
False Flag
Fast Flux
Fatal Error
Fault Configuration Accounting Performance Security
Fault Tolerance
FCFS
FCIP
Fiber Channel over Ethernet
Fiber Distributed Data Interface
Fiber to the Node
File Allocation Table
File Carving
File eXchange Protocol
File Hash
File Management System
G
Garlic Routing
GDPR
Generative AI
Generic Routing Encapsulation
Geofencing
GHOST Bug
Ghostware
Gigabit Interface Converter
Global Area Network
Global Catalog
Global File System
Globbing
Golden Ticket Attack
Google Dorking
Government Surveillance
GPS Jamming
Graphical User Interface
Graymail
Green Hat Hacker
H
H.323
Hackintosh
Hadoop Cluster
Half Duplex
Halt and Catch Fire
Hamming Code
Hamming Distance
Handshake Protocol
Hard Link
Hard Reboot
Hard Reset
Hardening
Hardware as a Service
Hardware Virtualization
Hash Function
Hashing
Heap Spray
HermeticWiper
Heuristic Virus
High Anonymity Proxy
High Availability Cluster
High Performance File System
I
I/O Controller
IAM Authentication
IAST
iBeacon
Ice Phishing
IDE
Identity and Access Management
Identity Cloning
Identity Fabric
Identity Life Cycle
Identity Orchestration
Identity Proofing
Identity-based Encryption
IEEE 802
ILOVEYOU
Image Recognition
Image Spam
IMEI
Immutable Ledger
Impersonation Attack
In-memory Database
Integrated Development Environment
IPv4
IPv6
J
K
Keepalive
Kerberos
Kerckhoffs’ Principle
Kernel-based Virtual Machine (KVM)
Key Based Routing
Key Derivation Function
Key Distribution Center
Key Escrow
Key Exchange
Key Fob
Key Length
Key Risk Indicator
Key Schedule
Key-Policy Attribute-Based Encryption
Keychain
Keypunch Machine
KLOC
KOVTER
KYC Verification
L
L1 Cache
L2 Cache
Label Edge Router
LAN Party
Lateral Movement
Layer 2 Forwarding (L2F) Protocol
Leaf-spine Architecture
Leased Line
Least Privilege Access
Least Significant Bit
Legacy System
Level 3 Cache
Lights Out Data Centre
Lightweight Directory Access Protocol
Linear Discriminant Analysis
Link Aggregation Control Protocol
Link Layer Discovery Protocol
Living Off the Land Attack
Load Balancer
Loadable Kernel Modules
M
MAC Address
Machine Data
Machine to Machine
Macro Virus
Magecart
Mail Exchange Record
Main Distribution Frame
Malicious Active Content
Malicious Code
Malleability
Malvertising
Malware as a service
Malware Obfuscation
Malware Sandboxing
MAM
Man-in-the-Middle Attack
Managed Data Center
Managed File Transfer
Managed Video as a Service
Manchester Encoding
N
O
OAuth
Object Request Broker
OCSP Stapling
Offensive Security
Offline Storage Table File
On-premises Software
One-time Pad (OTP)
One-way Encryption
Online Certificate Status Protocol (OCSP)
Open Port
Open Relay
Open System
OpenPGP
Operation Shady Rat
Operational Level Agreement
Operational Testing
Optical Character Recognition
OSI Model
Overlay Network
P
Packet Buffer
Packet Capture
Packet Coalescing
Packet Filtering
Packet Loss
Packet Monkey
Packet Sniffer
Packet Switching
Pagejacking
Parallel Data Transmission
Parallel Processing
Parameter Tampering
Parental Controls
Parity Check
Parser
Pass the Hash
Passive Attack
Path Character
Private IP
Public IP
Q
R
Race Condition
RAID 0
RAID 1
RAID 2
RAID 3
RAID 4
RAID 5
RAID 5EE
RAID 6
Rain Fencer Cipher
Rainbow Table Attack
RAM Scraping
Random Forest
Raspberry Robin
RC4
RC5
RC6
Read-Only Memory
Real-time Communications
Real-time Data
Real-time Transport Control Protocol
Reconnaissance
Recovery Time Objective
Right to Rectification
S
T
U
U2F
Ubiquitous Computing
UEFI Rootkit
Unicast Address
Unified Storage
Unified Threat Management Network
Uniform Resource Name
Unix Box
Unix-to-Unix Copy
Unknown Host
Unlabeled Data
UPnP
URL Filtering
USB Debugging
USB Restricted Mode
Usenet
User Agent
User and Entity Behavior Analytics (UEBA)
User Datagram Protocol
V
V2Ray Protocol
Van Eck Phreaking
vCPE
Vehicle-to-Infrastructure
Velocity Checks
Vendor Email Compromise
VeriChip
Vertical Cloud
Virtual Address
Virtual Data Room
Virtual Dedicated Server
Virtual Device
Virtual Drive
Virtual File Allocation Table
Virtual Host
Virtual Machine Cluster
Visitor-based Networking