Browse thousands of cybersecurity terms and definitions in our digital security glossary. This cybersecurity dictionary has definitions, examples, terms, and further reading.
A
Abandonware
Accelerated Mobile Pages
Acceptable Use Policy
Access Control Entry
Access Layer
Access Point Name
Account Compromise
Account Hijacking
Account Takeover
Activation Code
Active Attack
Active Defense
Ad Hoc On-demand Distance Vector
Ad-Hoc Mode
Adaptive Authentication
Address Space
Address Space Layout Randomization (ASLR)
ADFGVX Cipher
Administrative Privileges
Advanced Metering Infrastructure
Advanced Penetration Testing
Advanced Threat Detection
Adversarial Machine Learning
Adware
AES Encryption
AI Trism
Alert Fatigue
Allowlisting
Alphanumeric Password
Analog Computer
Angler Phishing
Anomaly-based Detection
Anonymous Call Rejection
Anti-malware
Anti-spam
Antivirus Scanner
Anycast DNS
Apple Filling Protocol (AFP)
AppleTalk Data Stream Protocol (ADSP)
Application Acceleration
Application Allow-listing
Application Base
Application Clustering
Application Delivery Controller (ADC)
Application Deployment
Application Gateway
Application Infrastructure Provider (AIP)
Application Log
Application Performance Monitoring
Application Programming Interface (API)
Application Service Provider (ASP)
Application Streaming
Application-Aware Networking
Arbitrary Code Execution (ACE)
Area Border Router (ABR)
ARM Processor
Artificial Intelligence (AI)
Asynchronous Transfer Mode (ATM)
ATFS
ATM Jackpotting
Atomicity, Consistency, Isolation, Durability (ACID)
Attack Surface
Attack Taxonomy
Attribute-based Encryption (ABE)
Audit Log
Augmented Intelligence
Authentication Header
Authorized Push Payment Fraud
Automatic Private IP Addressing
Autonomous Intelligence
Autorun Worm
B
C
D
E
E-Government
Eavesdropping
Edge AI
Edge Datacenter
Edge Network
Egosurfing
Egress Traffic
Elastic IP Address
Electronic Data Interchange
Electronic Intelligence
Electronic Pickpocketing
Electronic Signature
Electronically Stored Information
Elliptic Curve Cryptography
Email Bomb
Email Harvesting
Email Retention Policy
Email Spoofing
Embedded Software
F
G
H
H.323
Hackintosh
Hadoop Cluster
Half Duplex
Halt and Catch Fire
Hamming Code
Handshake Protocol
Hard Reboot
Hardening
Hardware as a Service
Hardware Virtualization
Hash Function
Hashing
Heap Spray
HermeticWiper
Heuristic Virus
High Anonymity Proxy
High Availability Cluster
High Performance File System
I
J
K
L
L1 Cache
L2 Cache
Label Edge Router
LAN Party
Lateral Movement
Layer 2 Forwarding (L2F) Protocol
Leaf-spine Architecture
Leased Line
Least Privilege Access
Least Significant Bit
Legacy System
Level 3 Cache
Lights Out Data Centre
Lightweight Directory Access Protocol
Linear Discriminant Analysis
Link Aggregation Control Protocol
Link Layer Discovery Protocol
Load Balancer
Loadable Kernel Modules
M
MAC Address
Machine Data
Machine to Machine
Macro Virus
Magecart
Mail Exchange Record
Main Distribution Frame
Malicious Active Content
Malicious Code
Malleability
Malvertising
Malware as a service
Malware Obfuscation
Malware Sandboxing
MAM
Man-in-the-Middle Attack
Managed Data Center
Managed File Transfer
Managed Video as a Service