Browse thousands of cybersecurity terms and definitions in our digital security glossary. This cybersecurity dictionary has definitions, examples, terms, and further reading.
A
Abandonware
Accelerated Mobile Pages
Acceptable Use Policy
Access Control Entry
Access Layer
Access Point Name
Account Compromise
Account Hijacking
Account Takeover
Activation Code
Active Attack
Active Defense
Ad Hoc On-demand Distance Vector
Ad-Hoc Mode
Adaptive Authentication
Address Space
Address Space Layout Randomization (ASLR)
ADFGVX Cipher
Administrative Privileges
Advanced Metering Infrastructure
Advanced Penetration Testing
Advanced Threat Detection
Adversarial Machine Learning
Adware
AES Encryption
AI Trism
Air Gap
Alert Fatigue
Allowlist
Allowlisting
AlphaGo
Alphanumeric Password
Analog Computer
Angler Phishing
Anomaly-based Detection
Anonymous Call Rejection
Anti-malware
Anti-spam
Antivirus Scanner
Anycast DNS
Apple Filling Protocol (AFP)
AppleTalk Data Stream Protocol (ADSP)
Application Acceleration
Application Allow-listing
Application Base
Application Clustering
Application Delivery Controller (ADC)
Application Deployment
Application Gateway
Application Infrastructure Provider (AIP)
Application Log
Application Performance Monitoring
Application Programming Interface (API)
Application Service Provider (ASP)
Application Streaming
Application-Aware Networking
Arbitrary Code Execution (ACE)
Area Border Router (ABR)
ARM Processor
Artificial Intelligence (AI)
Asynchronous Transfer Mode (ATM)
ATFS
ATM Jackpotting
Atomicity, Consistency, Isolation, Durability (ACID)
Attack Surface
Attack Taxonomy
Attribute-based Encryption (ABE)
Audit Log
Augmented Intelligence
Authentication Header
Authorized Push Payment Fraud
Automatic Private IP Addressing
Autonomous Intelligence
Autorun Worm
B
C
Cache Coherence
Cache Invalidation
Cache Server
Caesar Encryption
Call Stack
Camfecting
Campus Area Network
Canary Token
Canonical Data Model
Canonical Name
CAPTCHA
Captive Portal
Card Purchase Authorization
Cardinality
Carrier Ethernet
CCTV
Cellular Network
Centralized Computing
Cerber Ransomware
Certificate Authority Server
Cybersecurity Supply Chain Risk Management (C-SCRM)
D
Daemon
Dangling Pointer
Dark Patterns
Dark Web
DarkHotel
Data Access
Data Administration
Data Analytics
Data Asset
Data Audit
Data Backup
Data Bank
Data Binding
Data Breach Prevention
Data Center Architecture
Data Center Proxy
Data Center Virtualization
Data Collection
Data Conversion
Data Custodian
Data Deduplication
Data Dictionary
E
E-Government
Eavesdropping
Edge AI
Edge Datacenter
Edge Network
Egosurfing
Egress Traffic
Elastic IP Address
Electronic Data Interchange
Electronic Intelligence
Electronic Pickpocketing
Electronic Signature
Electronically Stored Information
Elliptic Curve Cryptography
Email Bomb
Email Harvesting
Email Retention Policy
Email Spoofing
Embedded Intelligence
Embedded Software
Emoticon
Emulator
EMV Tokenization
F
Face ID
Facial Recognition
Failback
Fake Antivirus
False Flag
Fast Flux
Fatal Error
Fault Configuration Accounting Performance Security
Fault Tolerance
FCFS
FCIP
Fiber Channel over Ethernet
Fiber Distributed Data Interface
Fiber to the Node
File Allocation Table
File Carving
File eXchange Protocol
File Hash
File Hosting Service
File Management System
Fileless Attacks
FileRepMalware
G
Garlic Routing
GDPR
Generative AI
Generic Routing Encapsulation
Geofencing
GHOST Bug
Ghostware
Gigabit Interface Converter
Global Area Network
Global Catalog
Global File System
Globbing
Golden Ticket Attack
Google Dorking
Government Surveillance
GPS Jamming
Graphical User Interface
Graymail
Green Hat Hacker
Greyware
Group Policy
GSSAPI
H
H.323
Hackintosh
Hadoop Cluster
Half Duplex
Halt and Catch Fire
Hamming Code
Hamming Distance
Handshake Protocol
Hard Link
Hard Reboot
Hard Reset
Hardening
Hardware Acceleration
Hardware as a Service
Hardware Identification
Hardware Virtualization
Hash Function
Hashing
Heap Spray
HermeticWiper
Heuristic Virus
Hexdump
High Anonymity Proxy
High Availability Cluster
High Performance File System
I
I/O Controller
IAM Authentication
IAST
iBeacon
Ice Phishing
IDE
Identity and Access Management
Identity Cloning
Identity Fabric
Identity Life Cycle
Identity Orchestration
Identity Proofing
Identity-based Encryption
IEEE 802
ILOVEYOU
Image Recognition
Image Spam
IMEI
Immutable Ledger
Impersonation Attack
In-memory Database
Indicator of Compromise
Industroyer
Inference Attack
Integrated Development Environment
IPv4
IPv6
J
K
Keepalive
Kerberos
Kerckhoffs’ Principle
Kernel-based Virtual Machine (KVM)
Key Based Routing
Key Derivation Function
Key Distribution Center
Key Escrow
Key Exchange
Key Fob
Key Length
Key Risk Indicator
Key Schedule
Key-Policy Attribute-Based Encryption
Keyboard Buffer
Keychain
Keylogger
Keypunch Machine
KLOC
KOVTER
KYC Verification
L
L1 Cache
L2 Cache
Label Edge Router
LAN Party
Lateral Movement
Layer 2 Forwarding (L2F) Protocol
Leaf-spine Architecture
Leased Line
Least Privilege Access
Least Significant Bit
Legacy System
Level 3 Cache
Lights Out Data Centre
Lightweight Directory Access Protocol
Linear Discriminant Analysis
Link Aggregation Control Protocol
Link Layer Discovery Protocol
Living Off the Land Attack
Load Balancer
Loadable Kernel Modules
Local File Inclusion
Location Intelligence
Locky Ransomware
M
MAC Address
Machine Data
Machine to Machine
Macro Virus
Magecart
Mail Exchange Record
Main Distribution Frame
Malicious Active Content
Malicious Code
Malleability
Malvertising
Malware as a service
Malware Obfuscation
Malware Sandboxing
MAM
Man-in-the-Middle Attack
Managed Data Center
Managed File Transfer
Managed Video as a Service
Manchester Encoding
Masquerade Attack
MAST
Master Password
N
N-tier Architecture
Nano Kernel
NAS
NAT Traversal
Nearline Storage
Net Neutrality
NetBIOS
Netflow
Netmask
NetScaler
NetSecOps
Netwalker Ransomware
Network Access Control
Network Access Server
Network Administrator
Network Backup
Network Bridge
Network Congestion
Network Convergence
Network Degradation
Network Discovery
Network-Based IDS
O
OAuth
Object Request Broker
OCSP Stapling
Offensive Security
Offline Storage Table File
On-premises Software
One-time Pad (OTP)
One-way Encryption
Online Certificate Status Protocol (OCSP)
Open Port
Open Relay
Open System
OpenPGP
Operation Shady Rat
Operational Level Agreement
Operational Testing
Optical Character Recognition
OSI Model
Over the Top Application
Overlay Network
Overwriting Virus
P
Packet Buffer
Packet Capture
Packet Coalescing
Packet Filtering
Packet Loss
Packet Monkey
Packet Sniffer
Packet Switching
Pagejacking
Parallel Data Transmission
Parallel Processing
Parameter Tampering
Parental Controls
Parity Check
Parser
Pass the Hash
Passive Attack
Path Character
Private IP
Public IP
Q
R
Race Condition
RAID 0
RAID 1
RAID 2
RAID 3
RAID 4
RAID 5
RAID 5EE
RAID 6
Rain Fencer Cipher
Rainbow Table Attack
RAM Scraping
Random Forest
Raspberry Robin
RC4
RC5
RC6
Read-Only Memory
Real-time Communications
Real-time Data
Real-time Transport Control Protocol
Reconnaissance
Recovery Time Objective
Right to Rectification
S
T
U
U2F
Ubiquitous Computing
UEFI Rootkit
Unicast Address
Unified Storage
Unified Threat Management Network
Uniform Resource Name
Unix Box
Unix-to-Unix Copy
Unknown Host
Unlabeled Data
UPnP
URL Filtering
USB Debugging
USB Restricted Mode
Usenet
User Agent
User and Entity Behavior Analytics (UEBA)
User Datagram Protocol
V
V2Ray Protocol
Van Eck Phreaking
vCPE
Vehicle-to-Infrastructure
Velocity Checks
Vendor Email Compromise
VeriChip
Vertical Cloud
Virtual Address
Virtual Data Room
Virtual Dedicated Server
Virtual Device
Virtual Drive
Virtual File Allocation Table
Virtual Host
Virtual Machine Cluster
Visitor-based Networking