Browse thousands of cybersecurity terms and definitions in our digital security glossary. This cybersecurity dictionary has definitions, examples, terms, and further reading.
A
Abandonware
Accelerated Mobile Pages
Acceptable Use Policy
Access Control Entry
Access Layer
Access Point Name
Account Compromise
Account Hijacking
Account Takeover
Activation Code
Active Attack
Active Defense
Adaptive Authentication
Address Space
Address Space Layout Randomization (ASLR)
Administrative Privileges
Advanced Penetration Testing
Advanced Threat Detection
AES Encryption
Alert Fatigue
Allowlisting
Alphanumeric Password
Analog Computer
Angler Phishing
Anomaly-based Detection
Anonymous Call Rejection
Anti-malware
Anti-spam
Anycast DNS
Apple Filling Protocol (AFP)
AppleTalk Data Stream Protocol (ADSP)
Application Acceleration
Application Allow-listing
Application Base
Application Clustering
Application Delivery Controller (ADC)
Application Deployment
Application Gateway
Application Infrastructure Provider (AIP)
Application Log
Application Programming Interface (API)
Application Service Provider (ASP)
Application Streaming
Application-Aware Networking
Arbitrary Code Execution (ACE)
Area Border Router (ABR)
ARM Processor
Artificial Intelligence (AI)
Asynchronous Transfer Mode (ATM)
ATM Jackpotting
Atomicity, Consistency, Isolation, Durability (ACID)
Attack Surface
Attack Taxonomy
Attribute-based Encryption (ABE)
Audit Log
Augmented Intelligence
Authorized Push Payment Fraud
Automatic Private IP Addressing
Autonomous Intelligence
Autorun Worm