Browse thousands of cybersecurity terms and definitions in our digital security glossary. This cybersecurity dictionary has definitions, examples, terms, and further reading.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0-9

A

Abandonware Accelerated Mobile Pages Acceptable Use Policy Access Control Entry Access Layer Access Point Name Account Compromise Account Hijacking Account Takeover Activation Code Active Attack Active Defense Ad Hoc On-demand Distance Vector Ad-Hoc Mode Adaptive Authentication Address Space Address Space Layout Randomization (ASLR) ADFGVX Cipher Administrative Privileges Advanced Metering Infrastructure Advanced Penetration Testing Advanced Threat Detection Adversarial Machine Learning AES Encryption Alert Fatigue Allowlisting Alphanumeric Password Analog Computer Angler Phishing Anomaly-based Detection Anonymous Call Rejection Anti-malware Anti-spam Antivirus Scanner Anycast DNS Apple Filling Protocol (AFP) AppleTalk Data Stream Protocol (ADSP) Application Acceleration Application Allow-listing Application Base Application Clustering Application Delivery Controller (ADC) Application Deployment Application Gateway Application Infrastructure Provider (AIP) Application Log Application Performance Monitoring Application Programming Interface (API) Application Service Provider (ASP) Application Streaming Application-Aware Networking Arbitrary Code Execution (ACE) Area Border Router (ABR) ARM Processor Artificial Intelligence (AI) Asynchronous Transfer Mode (ATM) ATM Jackpotting Atomicity, Consistency, Isolation, Durability (ACID) Attack Surface Attack Taxonomy Attribute-based Encryption (ABE) Audit Log Augmented Intelligence Authentication Header Authorized Push Payment Fraud Automatic Private IP Addressing Autonomous Intelligence Autorun Worm

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

0-9