AI-powered MSP/MSSP demand routing.

Glossary

Cybersecurity terms made simple.

Use this library to align your team on frameworks, services, and security operations terminology.

Role-ready definitionsCompliance friendlyProvider matching context

Coverage snapshot

Total terms

425

Categories

30

Top category

Compliance

425 terms found

7

Terms starting with 7

72-Hour Breach Notification

Compliance

Regulatory requirement in some jurisdictions to notify authorities within a strict post-breach timeframe.

A

Terms starting with A

AAA

Identity

Authentication, Authorization, and Accounting controls user identity, permissions, and activity tracking.

Acceptable Use Policy (AUP)

Governance

Policy defining allowed and prohibited use of company systems, networks, and data.

Access Control

Identity

Mechanisms that enforce who or what can access systems, applications, and data.

Account Takeover (ATO)

Threats

Unauthorized access to a legitimate user account, typically through stolen credentials or session theft.

Adversary-in-the-Middle (AiTM)

Threats

Attack where an adversary intercepts and manipulates communications between two parties.

Advanced Persistent Threat (APT)

Threats

Skilled, long-term attacker campaign that remains undetected while pursuing strategic objectives.

Air Gap

Architecture

Physical or logical isolation of a system from unsecured networks, especially the internet.

Allowlist

Controls

Security control that permits only pre-approved applications, IPs, users, or actions.

Anomaly Detection

Detection

Technique for identifying behavior that deviates from expected baselines and may signal an attack.

Anti-Malware

Endpoint Security

Tools and controls designed to detect, block, and remove malicious software.

Application Security (AppSec)

Application Security

Practice of integrating security throughout application design, development, testing, and operations.

Asset Inventory

Operations

Authoritative list of hardware, software, cloud assets, and data stores requiring protection.

Attack Path

Risk

Likely sequence of steps an attacker can take to move from initial access to key targets.

Attack Surface

Risk

Total set of reachable assets and entry points that adversaries can target.

Audit Log

Operations

Tamper-resistant record of security-relevant events used for monitoring and investigations.

Authentication

Identity

Process of verifying identity before granting access.

Authorization

Identity

Process of determining which resources an authenticated identity can use.

Availability

Concepts

Assurance that systems and data remain accessible when needed.

Attribute-Based Access Control (ABAC)

Identity

Access model that evaluates user, resource, and context attributes to make authorization decisions.

Account Provisioning

Identity

Process of creating and configuring user accounts, entitlements, and access rights.

Account Deprovisioning

Identity

Process of removing or disabling accounts and access when users change roles or leave.

Admission Controller

Cloud Security

Kubernetes control that intercepts API requests to enforce policy before objects are persisted.

API Security

Application Security

Protection of APIs against abuse, unauthorized access, and data exposure.

API Gateway

Application Security

Entry point that enforces authentication, rate limits, and routing for API traffic.

API Abuse

Threats

Misuse of API endpoints to evade controls, scrape data, or disrupt services.

Act on the Protection of Personal Information (APPI)

Compliance

Japan privacy law governing the handling of personal data by businesses.

Australian Privacy Act 1988

Compliance

Australia federal privacy law establishing obligations for handling personal information.

B

Terms starting with B

Backdoor

Malware

Hidden method of bypassing normal authentication or controls for persistent unauthorized access.

Backup

Resilience

Protected copy of data or systems used for recovery after incidents or failures.

Bastion Host

Network Security

Hardened system exposed to untrusted networks to broker controlled administrative access.

Behavior Analytics

Detection

Analysis of user and entity behavior patterns to detect suspicious deviations.

Blue Team

Operations

Defensive security team focused on prevention, detection, and response.

Botnet

Threats

Network of compromised devices remotely controlled by an attacker.

Business Continuity Plan (BCP)

Resilience

Plan to sustain critical operations during and after disruptive events.

Business Email Compromise (BEC)

Threats

Fraud technique where attackers impersonate trusted contacts to steal money or data.

BYOD

Governance

Bring Your Own Device policy model that allows personal devices for business use.

Bring Your Own Key (BYOK)

Cryptography

Model where customers provide encryption keys for use by cloud services.

Beaconing

Threats

Periodic outbound communication from compromised hosts to command-and-control infrastructure.

Broken Access Control

Application Security

Application flaw that allows users to perform actions outside intended permissions.

Business Impact Analysis (BIA)

Resilience

Assessment that identifies critical business functions and acceptable disruption thresholds.

Business Continuity and Disaster Recovery (BCDR)

Resilience

Integrated strategy for maintaining operations and restoring technology services after incidents.

Breach Notification

Compliance

Legal obligation to notify affected parties and regulators after qualifying data breaches.

Binding Corporate Rules (BCRs)

Privacy

Internal data transfer rules approved by regulators for multinational organizations.

C

Terms starting with C

CASB

Cloud Security

Cloud Access Security Broker enforcing visibility and policy across cloud applications.

Certificate Authority (CA)

Cryptography

Trusted entity that issues and validates digital certificates.

Certificate Pinning

Cryptography

Technique that restricts trust to specific certificates or public keys to prevent interception.

Chain of Custody

Incident Response

Documented handling history of digital evidence to preserve integrity and admissibility.

Chief Information Security Officer (CISO)

Governance

Executive responsible for enterprise security strategy, governance, and risk outcomes.

CIA Triad

Concepts

Confidentiality, Integrity, and Availability principles used to frame security objectives.

CIS Controls

Frameworks

Prioritized security best practices published by the Center for Internet Security.

CNAPP

Cloud Security

Cloud-Native Application Protection Platform combining cloud posture and workload protection.

COBIT

Frameworks

Governance framework for enterprise IT management, risk, and control alignment.

Command and Control (C2)

Threats

Infrastructure and communications channel used by attackers to control compromised systems.

Compliance

Compliance

Adherence to regulatory, legal, and contractual security requirements.

Confidentiality

Concepts

Protection of data from unauthorized access or disclosure.

Configuration Drift

Operations

Unplanned deviation of system configuration from the approved secure baseline.

Container Escape

Cloud Security

Exploit that breaks out of a container to access the host or other workloads.

Credential Stuffing

Threats

Automated login attempts using leaked username-password pairs from other breaches.

Critical Infrastructure

Governance

Essential systems whose disruption would significantly impact safety, economy, or national security.

Cross-Site Request Forgery (CSRF)

Application Security

Attack that tricks a logged-in user browser into submitting unwanted authenticated actions.

Cross-Site Scripting (XSS)

Application Security

Injection attack where malicious scripts execute in a victim browser context.

Crown Jewels

Risk

Most business-critical assets or data sets that require highest protection priority.

Cryptography

Cryptography

Use of mathematical methods to secure confidentiality, integrity, and authenticity of information.

CSPM

Cloud Security

Cloud Security Posture Management for continuous misconfiguration detection in cloud environments.

CVE

Vulnerability Management

Common Vulnerabilities and Exposures identifier assigned to publicly disclosed vulnerabilities.

CVSS

Vulnerability Management

Common Vulnerability Scoring System for rating technical severity of vulnerabilities.

CWE

Application Security

Common Weakness Enumeration catalog of software weakness types.

Cyber Kill Chain

Frameworks

Model describing phases of an attack from reconnaissance to actions on objectives.

Cyber Threat Intelligence (CTI)

Threat Intelligence

Evidence-based insights about threats, actors, and tactics to inform security decisions.

Cybersecurity Maturity Model Certification (CMMC)

Compliance

US Department of Defense cybersecurity certification model for defense contractors.

Conditional Access

Identity

Policy-based access control that evaluates context such as location, device posture, and risk.

Cloud-Native Security

Cloud Security

Security practices designed for dynamic, distributed cloud-native applications and infrastructure.

Container Runtime

Cloud Security

Software component responsible for starting and managing container execution on a host.

Container Image

Cloud Security

Portable package containing application code, runtime, libraries, and configuration.

Container Image Scanning

Cloud Security

Automated analysis of container images for vulnerabilities, malware, and policy violations.

Container Registry

Cloud Security

Repository service for storing, signing, and distributing container images.

Cosign

Cloud Security

Tool for signing and verifying container images and related supply chain artifacts.

Cloud Workload Protection Platform (CWPP)

Cloud Security

Security tooling focused on protecting hosts, containers, and serverless workloads at runtime.

Customer-Managed Key (CMK)

Cryptography

Encryption key administered by the customer rather than the cloud provider.

Cloud Security Alliance (CSA)

Frameworks

Industry organization that develops guidance and best practices for cloud security.

Cobalt Strike

Threats

Legitimate adversary simulation framework frequently abused in real-world intrusions.

Credential Dumping

Threats

Extraction of password hashes or credentials from systems and memory.

California Consumer Privacy Act (CCPA)

Compliance

California law granting consumers rights over personal information collection and sharing.

California Privacy Rights Act (CPRA)

Compliance

California law that amended and expanded CCPA privacy obligations and enforcement.

Chief Privacy Officer (CPO)

Governance

Executive responsible for privacy governance, legal compliance, and data protection strategy.

Cloud Controls Matrix (CCM)

Frameworks

Cloud Security Alliance control framework for assessing cloud provider security practices.

Common Criteria (ISO/IEC 15408)

Compliance

International standard for evaluating and certifying security properties of IT products.

Confidential Computing

Cryptography

Hardware-based protection that secures data while in use within trusted execution environments.

Connecticut Data Privacy Act (CTDPA)

Compliance

Connecticut privacy law defining consumer rights and controller obligations for personal data.

Consent Management

Privacy

Processes and tooling used to capture, store, and enforce user consent choices.

Controlled Unclassified Information (CUI)

Compliance

US government information category requiring safeguarding controls but not classified handling.

Controller-Processor Model

Privacy

Privacy governance model that separates entities deciding data purpose from those processing on instruction.

COSO

Frameworks

Internal control framework commonly used for governance, financial controls, and assurance alignment.

Cross-Border Data Transfer

Privacy

Movement of personal data between countries under legal transfer safeguards.

Cyber Essentials

Compliance

UK government-backed baseline certification for fundamental cybersecurity controls.

Cyber Essentials Plus

Compliance

Advanced Cyber Essentials certification with independent technical verification testing.

Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA)

Compliance

US law creating federal cyber incident reporting requirements for covered critical infrastructure entities.

Cybersecurity and Infrastructure Security Agency (CISA)

Governance

US agency responsible for national cyber defense coordination and critical infrastructure resilience.

Cybersecurity Performance Goals (CPGs)

Frameworks

Practical baseline cybersecurity actions published to improve resilience in critical infrastructure sectors.

D

Terms starting with D

Data Classification

Data Security

Labeling data by sensitivity and business impact to guide handling controls.

Data Exfiltration

Threats

Unauthorized transfer of data outside a trusted environment.

Data Loss Prevention (DLP)

Data Security

Controls for discovering sensitive data and preventing unauthorized exposure.

Data Minimization

Privacy

Principle of collecting and retaining only the data necessary for intended purposes.

Data Residency

Privacy

Requirement for storing and processing data within specific geographic boundaries.

Data Sovereignty

Privacy

Concept that data is subject to laws of the country where it is stored or processed.

Deception Technology

Detection

Use of decoys and traps to mislead attackers and generate high-confidence alerts.

Defense in Depth

Architecture

Layered security strategy where multiple controls mitigate a single risk.

Denial of Service (DoS)

Threats

Attack that disrupts availability of a system or service.

Detection Engineering

Detection

Designing, testing, and maintaining detections for attack behaviors.

Digital Forensics

Incident Response

Collection and analysis of digital evidence to investigate incidents.

Digital Signature

Cryptography

Cryptographic proof that data came from a trusted signer and was not altered.

Distributed Denial of Service (DDoS)

Threats

DoS attack using many compromised systems to overwhelm a target.

DMARC

Email Security

Email authentication policy standard that builds on SPF and DKIM to reduce spoofing.

DNS Filtering

Network Security

Blocking malicious domains through domain name resolution controls.

DNSSEC

Network Security

DNS Security Extensions adding cryptographic integrity validation to DNS responses.

Domain Generation Algorithm (DGA)

Malware

Malware technique for creating rotating domains used for command and control.

Dynamic Application Security Testing (DAST)

Application Security

Testing running applications from the outside to detect exploitable vulnerabilities.

Digital Identity

Identity

Electronic representation of a user, device, or workload used for authentication and authorization.

DNP3

OT Security

Industrial protocol widely used in electric utility and critical infrastructure environments.

Drift Detection

Cloud Security

Identification of deviations between deployed infrastructure and approved configurations.

DLL Sideloading

Threats

Execution technique that abuses application DLL search order to load malicious libraries.

Dropper

Malware

Malware component whose primary purpose is delivering additional malicious payloads.

Dependency Confusion

Application Security

Supply chain attack that tricks build systems into pulling malicious packages.

DKIM

Email Security

DomainKeys Identified Mail standard that signs email to validate message authenticity.

Deep Packet Inspection (DPI)

Network Security

Traffic analysis method that inspects packet payloads for policy and threat enforcement.

Disaster Recovery Plan (DRP)

Resilience

Plan for restoring IT systems and services after disruptive events.

Data Processing Agreement (DPA)

Privacy

Contract defining responsibilities and safeguards when one party processes personal data for another.

Data Protection Authority (DPA)

Compliance

Regulatory body that enforces privacy and data protection laws in a jurisdiction.

Data Protection Impact Assessment (DPIA)

Privacy

Structured assessment of privacy risks for high-risk personal data processing activities.

Data Protection Officer (DPO)

Governance

Role tasked with advising on and monitoring privacy compliance obligations.

Data Retention Policy

Governance

Rules defining how long data is stored and when it must be deleted.

Data Subject Access Request (DSAR)

Privacy

Formal request from an individual to access and receive copies of personal data.

Data Transfer Impact Assessment (DTIA)

Privacy

Assessment evaluating legal and practical risks of international personal data transfers.

Defense Federal Acquisition Regulation Supplement (DFARS)

Compliance

US defense contracting regulations that include cybersecurity and incident reporting requirements.

Digital Operational Resilience Act (DORA)

Compliance

EU regulation requiring financial entities to manage ICT risk, resilience testing, and incident reporting.

E

Terms starting with E

EDR

Endpoint Security

Endpoint Detection and Response for monitoring endpoints and containing suspicious activity.

Encryption

Cryptography

Conversion of plaintext into ciphertext using keys to protect data confidentiality.

Endpoint Protection Platform (EPP)

Endpoint Security

Endpoint security suite focused on prevention controls like antivirus and policy enforcement.

Escalation Path

Incident Response

Defined chain of technical and management contacts for incident handling decisions.

Exploit

Threats

Code or technique that takes advantage of a vulnerability.

Exploit Chain

Threats

Sequence of vulnerabilities and techniques combined to achieve attacker objectives.

Exposure Management

Risk

Continuous process of identifying, prioritizing, and reducing exploitable security gaps.

External Attack Surface Management (EASM)

Risk

Discovery and monitoring of internet-facing assets and exposures.

Engineering Workstation

OT Security

Privileged OT workstation used to configure controllers and manage industrial system logic.

etcd

Cloud Security

Distributed key-value store that persists Kubernetes cluster state and configuration.

eBPF

Cloud Security

Linux kernel technology that enables efficient runtime observability and security enforcement.

East-West Traffic

Network Security

Lateral network traffic that moves between internal systems and workloads.

EU Cyber Resilience Act (CRA)

Compliance

EU legislation establishing cybersecurity requirements for connected products and software.

eIDAS

Compliance

EU framework governing electronic identification, trust services, and digital signatures.

ePrivacy Directive

Compliance

EU legal framework for electronic communications privacy, including cookies and marketing communications.

Export Administration Regulations (EAR)

Compliance

US export controls governing dual-use items, including some cybersecurity technologies.

F

Terms starting with F

False Positive

Detection

Alert that incorrectly flags benign activity as malicious.

FedRAMP

Compliance

US government program standardizing security assessment and authorization for cloud services.

File Integrity Monitoring (FIM)

Detection

Detection of unauthorized file or configuration changes on critical systems.

Firewall

Network Security

Control point that filters network traffic based on security rules.

Forensic Readiness

Incident Response

Preparedness to collect and preserve evidence efficiently during incidents.

Fuzzing

Application Security

Automated testing that feeds unexpected inputs to uncover crashes and vulnerabilities.

Federation

Identity

Trust relationship that allows identity assertions to be accepted across separate organizations or systems.

Federation Metadata

Identity

Configuration data exchanged between identity providers and service providers to establish trust.

FIDO2

Identity

Open authentication standard enabling phishing-resistant, passwordless sign-in with cryptographic authenticators.

Function as a Service (FaaS)

Cloud Security

Cloud execution model where code runs in managed functions triggered by events.

FAIR

Frameworks

Factor Analysis of Information Risk framework for quantifying cyber risk in financial terms.

Family Educational Rights and Privacy Act (FERPA)

Compliance

US law protecting student education records and related privacy rights.

Federal Information Security Modernization Act (FISMA)

Compliance

US law requiring federal agencies to implement risk-based information security programs.

Federal Trade Commission Safeguards Rule

Compliance

US rule requiring financial institutions to implement a written information security program.

FIPS 140-3

Compliance

US and Canada standard for validating cryptographic module security requirements.

G

Terms starting with G

GDPR

Compliance

General Data Protection Regulation governing personal data privacy in the European Union.

Governance, Risk, and Compliance (GRC)

Governance

Integrated discipline for policy oversight, risk management, and compliance assurance.

General Data Protection Law (LGPD)

Compliance

Brazil national privacy law governing processing of personal data.

Gramm-Leach-Bliley Act (GLBA)

Compliance

US law requiring financial institutions to protect customer financial information.

H

Terms starting with H

Hardened Baseline

Controls

Secure default configuration standard for systems and services.

Hashing

Cryptography

One-way transformation used for integrity checks and secure password storage workflows.

HIPAA

Compliance

US healthcare security and privacy requirements for protected health information.

Honeypot

Detection

Decoy system intended to attract and observe attacker behavior.

Host Intrusion Detection System (HIDS)

Endpoint Security

Host-based monitoring for suspicious activity on servers or endpoints.

Host Intrusion Prevention System (HIPS)

Endpoint Security

Host-based control that detects and blocks suspicious behavior in real time.

Human-Machine Interface (HMI)

OT Security

Operator interface used to visualize and control industrial processes.

Historian

OT Security

System that stores time-series industrial process data for monitoring and analysis.

HITRUST

Compliance

Assurance framework and certification program often used in healthcare and regulated sectors.

I

Terms starting with I

IAM

Identity

Identity and Access Management controls digital identities and access lifecycles.

Immutable Backup

Resilience

Backup that cannot be altered or deleted during a defined retention period.

Incident Response

Incident Response

Process for preparing for, detecting, containing, eradicating, and recovering from incidents.

Indicator of Attack (IOA)

Threat Intelligence

Behavioral pattern suggesting malicious activity before clear compromise evidence exists.

Indicator of Compromise (IOC)

Threat Intelligence

Observable artifact that indicates a system may have been compromised.

Industrial Control System (ICS)

OT Security

Operational technology environment used to monitor and control industrial processes.

Information Security Management System (ISMS)

Governance

Structured set of policies, processes, and controls for managing information security risk.

Insider Threat

Threats

Risk posed by internal users who intentionally or accidentally harm the organization.

Integrity

Concepts

Assurance that data is accurate, complete, and not altered without authorization.

Intrusion Detection System (IDS)

Detection

Monitoring system that identifies suspicious or malicious network and host activity.

Intrusion Prevention System (IPS)

Network Security

Control that can automatically block malicious activity detected in traffic streams.

ISO 27001

Compliance

International standard for establishing and maintaining an information security management system.

Identity Governance and Administration (IGA)

Identity

Discipline for managing identity lifecycle, access requests, certifications, and separation-of-duties policies.

Identity Proofing

Identity

Verification process that establishes confidence a digital identity belongs to a real person.

Industrial Internet of Things (IIoT)

OT Security

Connected sensors and devices used in industrial operations and telemetry collection.

IEC 62443

Frameworks

International standards series for securing industrial automation and control systems.

Image Signing

Cloud Security

Cryptographic signing of artifacts to verify software provenance and integrity.

Infrastructure as Code (IaC)

Cloud Security

Managing infrastructure with declarative code and automated deployment workflows.

Infrastructure as Code Security

Cloud Security

Practices and tooling to detect security misconfigurations in infrastructure templates before deployment.

Insecure Direct Object Reference (IDOR)

Application Security

Access control flaw exposing direct object identifiers without proper authorization checks.

Insecure Deserialization

Application Security

Vulnerability where unsafe object deserialization enables code execution or logic abuse.

Interactive Application Security Testing (IAST)

Application Security

Runtime-assisted testing approach that detects vulnerabilities with instrumentation inside the application.

India Digital Personal Data Protection Act (DPDP Act)

Compliance

India national privacy law establishing obligations for handling digital personal data.

International Traffic in Arms Regulations (ITAR)

Compliance

US export control regulations governing defense-related articles, services, and technical data.

ISO 22301

Compliance

International standard for business continuity management systems.

ISO 27017

Compliance

International code of practice for cloud security controls.

ISO 27018

Compliance

International standard for protecting personal data in public cloud services.

ISO 27701

Compliance

Privacy information management extension to ISO 27001 and ISO 27002.

J

Terms starting with J

Just-in-Time Access (JIT)

Identity

Model that grants elevated privileges only when needed and only for a limited duration.

Just-Enough Administration (JEA)

Identity

Principle and implementation approach that limits administrative sessions to the minimum required actions.

K

Terms starting with K

Key Management

Cryptography

Lifecycle management of cryptographic keys including generation, storage, rotation, and retirement.

Kubernetes

Cloud Security

Container orchestration platform used to deploy, scale, and manage containerized workloads.

Kubernetes API Server

Cloud Security

Control-plane component that validates and processes cluster API requests.

Kubelet

Cloud Security

Node agent that ensures containers are running according to Kubernetes pod specifications.

Kubernetes NetworkPolicy

Cloud Security

Kubernetes resource that controls pod-to-pod network communication flows.

Kubernetes RBAC

Cloud Security

Role-based access control model for Kubernetes API permissions.

Kubernetes Secrets

Cloud Security

Kubernetes object type for storing sensitive configuration data used by workloads.

Kubernetes Security Posture Management (KSPM)

Cloud Security

Continuous assessment of Kubernetes configurations against security best practices.

Key Management Service (KMS)

Cryptography

Managed service for creating, storing, rotating, and controlling access to encryption keys.

Keylogger

Malware

Malware or tool that records keystrokes to capture credentials and sensitive data.

L

Terms starting with L

Lateral Movement

Threats

Attacker movement across internal systems after initial compromise.

Least Privilege

Identity

Principle of granting only the minimum access required for a task.

Log Correlation

Detection

Combining events from multiple sources to identify meaningful attack patterns.

Log Retention

Governance

Policy and practice of storing logs for defined durations to support monitoring and compliance.

Landing Zone

Cloud Security

Preconfigured cloud environment with baseline identity, networking, and security controls.

Living off the Land (LotL)

Threats

Attacker tactic that uses legitimate system tools to avoid detection.

LOLBAS

Threat Intelligence

Living Off the Land Binaries and Scripts catalog of dual-use Windows utilities often abused by attackers.

Loader

Malware

Malicious program that retrieves and executes secondary payloads in memory.

Legal Hold

Governance

Process to preserve potentially relevant records for legal proceedings and investigations.

Lei Geral de Protecao de Dados (LGPD)

Compliance

Portuguese name for Brazil privacy law governing personal data processing.

M

Terms starting with M

Malicious Insider

Threats

Insider who intentionally abuses authorized access for theft, sabotage, or fraud.

Malware

Malware

Malicious software designed to disrupt operations, steal data, or gain unauthorized control.

MDR

Services

Managed Detection and Response combining monitoring, threat hunting, and active response services.

Mean Time to Detect (MTTD)

Metrics

Average time between incident occurrence and detection.

Mean Time to Respond (MTTR)

Metrics

Average time required to contain or remediate a detected incident.

Microsegmentation

Network Security

Fine-grained network policy enforcement to limit east-west movement.

MITRE ATT&CK

Frameworks

Knowledge base of real-world adversary tactics and techniques used for detection and defense.

MSSP

Services

Managed Security Service Provider delivering outsourced security monitoring and operations.

Multi-Factor Authentication (MFA)

Identity

Authentication requiring two or more distinct verification factors.

Modbus

OT Security

Legacy industrial communications protocol commonly used between PLCs and supervisory systems.

Malware Static Analysis

Malware

Examination of malware binaries without execution to identify structure, indicators, and capabilities.

Malware Dynamic Analysis

Malware

Executing malware in a controlled environment to observe runtime behavior and artifacts.

Malware Family

Malware

Group of related malware samples sharing code, behavior, or operational techniques.

Malware Sandbox

Malware

Isolated environment used to safely detonate and analyze malicious files.

Mean Time to Contain (MTTC)

Metrics

Average time required to stop attacker activity after detection.

Material Cybersecurity Incident

Compliance

Incident significant enough to influence investor decisions and trigger disclosure obligations in some regimes.

N

Terms starting with N

NAC

Network Security

Network Access Control enforcing device and user access policies before network admission.

National Vulnerability Database (NVD)

Vulnerability Management

US repository that enriches CVE records with vulnerability metadata and severity data.

NDR

Detection

Network Detection and Response focused on detecting malicious network behaviors and intrusions.

Network Segmentation

Network Security

Division of networks into isolated zones to reduce blast radius and control access.

NIS2

Compliance

European cybersecurity directive establishing stronger security and incident reporting obligations.

NIST

Frameworks

US standards body publishing widely adopted cybersecurity guidance and controls.

NIST Cybersecurity Framework (NIST CSF)

Frameworks

Framework organizing cybersecurity outcomes around governance, identify, protect, detect, respond, and recover.

NIST SP 800-53

Frameworks

Catalog of security and privacy controls for information systems and organizations.

Non-Repudiation

Cryptography

Ability to prove an action occurred so participants cannot credibly deny it.

NetFlow

Network Security

Network metadata records used for traffic visibility, anomaly detection, and forensics.

North-South Traffic

Network Security

Network traffic flowing between internal environments and external networks.

NERC CIP

Compliance

North American electric sector cybersecurity standards for bulk electric system reliability.

NIST Privacy Framework

Frameworks

Framework for managing privacy risk through governance and data processing outcomes.

Notifiable Data Breaches (NDB) Scheme

Compliance

Australia regime requiring notification of eligible data breaches.

NYDFS Part 500

Compliance

New York cybersecurity regulation for covered financial services institutions.

O

Terms starting with O

OAuth 2.0

Identity

Authorization framework allowing applications to obtain limited delegated access.

Object Lock

Data Security

Storage setting that prevents object deletion or modification for defined retention periods.

Open Web Application Security Project (OWASP)

Frameworks

Community-driven organization providing application security guidance and standards.

OWASP Top 10

Application Security

Widely used ranking of critical web application security risks.

OpenID Connect (OIDC)

Identity

Identity layer on top of OAuth 2.0 that provides standardized user authentication claims.

Operational Technology (OT)

OT Security

Systems and devices that monitor or control physical processes in industrial environments.

OPC UA

OT Security

Industrial interoperability standard that supports secure, structured machine-to-machine communication.

OT Asset Discovery

OT Security

Process of identifying industrial devices, protocols, and communications with minimal operational disruption.

Obfuscation

Malware

Deliberate transformation of code or scripts to hinder analysis and detection.

Office for Civil Rights (OCR)

Governance

US HHS office that enforces HIPAA privacy and security requirements.

P

Terms starting with P

Patch Management

Vulnerability Management

Process for evaluating, prioritizing, testing, and deploying software updates securely.

PCI DSS

Compliance

Payment Card Industry Data Security Standard for protecting cardholder data.

Penetration Testing

Offensive Security

Authorized simulation of attacker techniques to validate security controls.

Personal Identifiable Information (PII)

Privacy

Data that can identify a specific individual directly or indirectly.

Phishing

Threats

Deceptive communication used to steal credentials, data, or money.

Playbook

Incident Response

Step-by-step procedure for handling recurring security scenarios and incidents.

Posture Assessment

Risk

Evaluation of current security controls, configurations, and risk exposure.

Privileged Access Management (PAM)

Identity

Controls and workflows for securing high-privilege accounts and sessions.

Privilege Escalation

Threats

Technique used to gain higher access rights than originally granted.

Public Key Infrastructure (PKI)

Cryptography

System of certificates, keys, and policies used to enable trusted encryption and signing.

Purple Team

Operations

Collaborative practice where red and blue teams improve defenses together.

Passkey

Identity

Phishing-resistant credential based on public-key cryptography used for passwordless authentication.

Passwordless Authentication

Identity

Authentication approach that replaces passwords with stronger factors like device-bound keys or biometrics.

Policy-Based Access Control (PBAC)

Identity

Authorization approach using centralized policies to evaluate access conditions at request time.

Privileged Identity Management (PIM)

Identity

Identity controls that govern privileged role assignment, activation, and review.

Programmable Logic Controller (PLC)

OT Security

Industrial control computer used to automate mechanical and process operations.

Purdue Model

OT Security

Reference architecture that segments industrial networks into hierarchical control layers.

Pod Security Standards

Cloud Security

Kubernetes policy profiles defining baseline and restricted pod security requirements.

Packers

Malware

Tools or techniques that compress or encrypt binaries to obscure malicious code.

Process Injection

Threats

Technique that runs malicious code within another process to evade defenses.

Process Hollowing

Threats

Technique that replaces legitimate process code with malicious payloads at runtime.

Packet Capture (PCAP)

Network Security

Raw network packet recording used for troubleshooting and incident investigation.

Personal Data Protection Act (PDPA)

Compliance

Privacy law title used in multiple jurisdictions, including Singapore and Thailand.

Personal Information Protection and Electronic Documents Act (PIPEDA)

Compliance

Canada federal privacy law for private-sector personal information handling.

Personal Information Protection Law (PIPL)

Compliance

China national privacy law governing processing of personal information.

Privacy by Design

Privacy

Approach that embeds privacy requirements into systems and processes from the start.

Privacy Impact Assessment (PIA)

Privacy

Assessment process used to identify and mitigate privacy risks in systems and projects.

Protection of Personal Information Act (POPIA)

Compliance

South Africa privacy law governing lawful processing of personal information.

Pseudonymization

Privacy

Technique that reduces identifiability of personal data by replacing direct identifiers.

Q

Terms starting with Q

Quishing

Threats

Phishing attack that uses malicious QR codes to redirect victims to fraudulent destinations.

R

Terms starting with R

Ransomware

Malware

Malware that encrypts or steals data and extorts payment.

Recovery Point Objective (RPO)

Resilience

Maximum acceptable amount of data loss measured in time.

Recovery Time Objective (RTO)

Resilience

Maximum acceptable downtime before service restoration.

Red Team

Offensive Security

Offensive team emulating realistic adversary behavior to test defenses.

Remote Code Execution (RCE)

Threats

Vulnerability allowing an attacker to run arbitrary code on a target system.

Resilience

Concepts

Ability to prepare for, withstand, recover from, and adapt after cyber incidents.

Risk Appetite

Risk

Amount and type of risk an organization is willing to accept.

Risk Register

Risk

Documented inventory of risks, ratings, owners, and treatment plans.

Root Cause Analysis (RCA)

Operations

Method for identifying underlying factors that caused a security event or control failure.

Root of Trust

Architecture

Foundational hardware or software component implicitly trusted for security operations.

Rootkit

Malware

Stealth malware designed to hide malicious activity and maintain privileged persistence.

Runbook

Operations

Detailed operational guide for executing specific security procedures consistently.

Runtime Application Self-Protection (RASP)

Application Security

Application-embedded defense that detects and blocks attacks during execution.

Role-Based Access Control (RBAC)

Identity

Authorization model that assigns permissions to roles rather than individual users.

Remote Terminal Unit (RTU)

OT Security

Industrial field device that gathers telemetry and executes supervisory control commands.

Runtime Threat Detection

Detection

Detection of suspicious behavior while workloads are actively running.

Reverse Engineering

Malware

Technical process of understanding software internals to uncover behavior and vulnerabilities.

Ransomware as a Service (RaaS)

Threats

Cybercrime business model where operators rent ransomware infrastructure to affiliates.

Records of Processing Activities (RoPA)

Privacy

Required documentation of personal data processing operations under certain privacy regulations.

Right to Erasure

Privacy

Privacy right allowing individuals to request deletion of personal data under qualifying conditions.

Right to Rectification

Privacy

Privacy right allowing individuals to request correction of inaccurate personal data.

Right to Restrict Processing

Privacy

Privacy right allowing individuals to limit how their personal data is used.

Right to Data Portability

Privacy

Privacy right allowing individuals to receive personal data in a transferable format.

Risk and Control Self-Assessment (RCSA)

Governance

Structured process for teams to evaluate control effectiveness and operational risk exposure.

S

Terms starting with S

Sandboxing

Controls

Executing code in an isolated environment to limit potential damage.

SCADA

OT Security

Supervisory Control and Data Acquisition systems used for industrial process control.

Secure Access Service Edge (SASE)

Architecture

Architecture combining networking and security services delivered from the cloud edge.

Secure Boot

Endpoint Security

Startup security feature that permits only trusted, signed code during boot.

Secure by Design

Governance

Approach that builds security requirements into products from initial architecture onward.

Secure Development Lifecycle (SDLC)

Application Security

Software lifecycle model that integrates security activities into each development phase.

Secure Email Gateway (SEG)

Email Security

Email security control for filtering phishing, malware, and spoofed messages.

Secure Shell (SSH)

Cryptography

Encrypted network protocol for secure remote administration and file transfer.

Security Baseline

Controls

Minimum required control and configuration standard for systems.

Security Information and Event Management (SIEM)

Tools

Platform that aggregates, normalizes, correlates, and alerts on security telemetry.

Security Operations Center (SOC)

Operations

Centralized team and function for continuous monitoring, triage, and incident response.

Security Orchestration, Automation, and Response (SOAR)

Automation

Platform that automates security workflows and incident response playbooks.

Segregation of Duties (SoD)

Governance

Control that separates critical tasks across roles to reduce fraud and abuse risk.

Service Level Agreement (SLA)

Governance

Contractually defined performance targets such as response and resolution times.

Session Hijacking

Threats

Takeover of a valid user session token to impersonate that user.

Single Sign-On (SSO)

Identity

Authentication model where one login grants access to multiple applications.

Social Engineering

Threats

Psychological manipulation used to trick people into insecure actions.

SOC 2

Compliance

Audit framework evaluating controls for security, availability, and confidentiality.

Software Bill of Materials (SBOM)

Application Security

Inventory of software components and dependencies used in an application.

Software Composition Analysis (SCA)

Application Security

Automated detection of open-source components and known vulnerabilities in codebases.

Spam

Email Security

Unsolicited bulk messaging, often used to distribute phishing and malware.

Spear Phishing

Threats

Targeted phishing attack tailored to a specific person, team, or organization.

SQL Injection

Application Security

Injection attack that manipulates backend database queries through unsanitized input.

SSL/TLS

Cryptography

Protocols for securing data in transit over networks.

Supply Chain Attack

Threats

Compromise of trusted vendors, software, or dependencies to reach downstream targets.

SAML

Identity

Security Assertion Markup Language standard for exchanging authentication and authorization data.

SCIM

Identity

System for Cross-domain Identity Management standard for automating account provisioning and deprovisioning.

Step-Up Authentication

Identity

Requirement for stronger authentication when a user performs higher-risk actions.

Safety Instrumented System (SIS)

OT Security

Independent protection system designed to place industrial processes into a safe state.

Service Mesh

Cloud Security

Infrastructure layer that manages service-to-service communication, security, and observability.

Sidecar Proxy

Cloud Security

Companion container that provides networking or security capabilities to an application workload.

Sigstore

Cloud Security

Open source ecosystem for signing, verifying, and transparency logging of software artifacts.

Software Supply Chain Security

Application Security

Practices that protect software build, dependency, and release pipelines from tampering.

Serverless Security

Cloud Security

Security controls tailored for event-driven, function-based cloud workloads.

Shared Responsibility Model

Cloud Security

Cloud principle defining which security responsibilities belong to provider versus customer.

Secure Web Gateway (SWG)

Network Security

Security service that filters web traffic to enforce policy and block malicious destinations.

Security Service Edge (SSE)

Architecture

Cloud-delivered security stack that commonly includes SWG, CASB, and ZTNA capabilities.

Sandbox Evasion

Malware

Malware behavior designed to detect analysis environments and hide malicious actions.

Spyware

Malware

Malware designed to secretly monitor activity and exfiltrate sensitive information.

Server-Side Request Forgery (SSRF)

Application Security

Vulnerability that lets attackers coerce servers into making unintended network requests.

Secrets Management

Controls

Secure storage, distribution, and rotation of credentials, tokens, and encryption keys.

Secret Scanning

Application Security

Automated discovery of exposed credentials and sensitive tokens in code and repositories.

Static Application Security Testing (SAST)

Application Security

Code analysis technique that identifies vulnerabilities without executing the application.

SPF

Email Security

Sender Policy Framework standard that authorizes email senders for a domain.

Sinkhole

Network Security

Security control that redirects malicious traffic to controlled infrastructure for blocking or analysis.

Sarbanes-Oxley Act (SOX)

Compliance

US law requiring internal control and financial reporting assurances for public companies.

Schrems II

Compliance

European court ruling that tightened requirements for transferring personal data outside the EU.

SEC Cybersecurity Disclosure Rules

Compliance

US SEC requirements for public companies to disclose material cyber incidents and governance practices.

Service Organization Control 1 (SOC 1)

Compliance

Audit report focusing on controls relevant to financial reporting.

Service Organization Control 3 (SOC 3)

Compliance

General-use trust services report derived from SOC 2 examination results.

StateRAMP

Compliance

US program that standardizes cloud security assessments for state and local governments.

Standard Contractual Clauses (SCCs)

Privacy

Pre-approved contractual terms used to legitimize international personal data transfers.

Supply Chain Levels for Software Artifacts (SLSA)

Frameworks

Security framework for improving software supply chain integrity and provenance assurance.

System and Organization Controls

Compliance

AICPA attestation framework family including SOC 1, SOC 2, and SOC 3 reports.

T

Terms starting with T

Tabletop Exercise

Incident Response

Discussion-based simulation used to rehearse incident response and decision-making.

Tactics, Techniques, and Procedures (TTPs)

Threat Intelligence

Patterns describing how threat actors plan and execute operations.

Threat Actor

Threats

Individual or group conducting malicious cyber activity.

Threat Hunting

Detection

Proactive search for hidden adversary activity not detected by automated controls.

Threat Intelligence Platform (TIP)

Threat Intelligence

Platform that ingests, enriches, and operationalizes threat intelligence feeds.

Tokenization

Data Security

Replacing sensitive data with non-sensitive tokens while keeping data utility.

Transport Layer Security (TLS)

Cryptography

Modern cryptographic protocol used to protect data in transit.

Triaging

Operations

Prioritizing and routing alerts or incidents based on severity and business impact.

Terraform

Cloud Security

Infrastructure as code tool used to provision and manage cloud infrastructure resources.

Trojan

Malware

Malware disguised as legitimate software to trick users into execution.

Typosquatting

Threats

Malicious registration of lookalike package or domain names to trick users and systems.

Third-Party Risk Management (TPRM)

Risk

Program for assessing and monitoring security risks introduced by vendors and partners.

TISAX

Compliance

Trusted Information Security Assessment Exchange standard used in the automotive industry.

Transparency Report

Governance

Public report disclosing security incidents, law enforcement requests, and governance practices.

U

Terms starting with U

Unified Endpoint Management (UEM)

Endpoint Security

Platform for centrally managing security and configuration across endpoint device types.

User and Entity Behavior Analytics (UEBA)

Detection

Analytics for identifying anomalous user and system behavior associated with threats.

Unidirectional Gateway

OT Security

Hardware-enforced one-way network communication device used to protect critical OT environments.

UK GDPR

Compliance

United Kingdom data protection regime derived from EU GDPR and domestic law.

UK NIS Regulations

Compliance

United Kingdom regulations imposing cyber resilience requirements on essential services and digital providers.

Utah Consumer Privacy Act (UCPA)

Compliance

Utah privacy law defining baseline rights and obligations for personal data handling.

V

Terms starting with V

vCISO

Services

Virtual Chief Information Security Officer service providing fractional security leadership.

Vishing

Threats

Voice phishing attack using phone calls to trick victims into revealing sensitive data.

VPN

Network Security

Virtual Private Network creating encrypted tunnels across untrusted networks.

Vulnerability Assessment

Vulnerability Management

Systematic identification and evaluation of security weaknesses.

Vulnerability Disclosure Program (VDP)

Vulnerability Management

Formal channel for external researchers to report vulnerabilities safely and responsibly.

Vulnerability Management

Vulnerability Management

Continuous process of finding, prioritizing, remediating, and validating vulnerabilities.

Vulnerability Scanner

Vulnerability Management

Automated tool that detects known vulnerabilities and misconfigurations.

Vendor Risk Assessment

Risk

Evaluation of supplier security controls, posture, and contractual risk obligations.

Virginia Consumer Data Protection Act (VCDPA)

Compliance

Virginia privacy law granting rights and imposing data processing obligations on covered entities.

W

Terms starting with W

Watering Hole Attack

Threats

Compromising a website frequented by targets to infect visitors.

Web Application Firewall (WAF)

Application Security

Control that inspects and filters malicious HTTP and HTTPS traffic to web apps.

Whaling

Threats

Highly targeted phishing aimed at executives or high-value decision-makers.

Windows Event Forwarding (WEF)

Operations

Native Windows mechanism for centralizing event logs from endpoints and servers.

Worm

Malware

Self-replicating malware that spreads automatically across systems or networks.

WebAuthn

Identity

W3C web standard enabling strong authentication with public-key credentials.

Workload Identity

Cloud Security

Identity model that assigns cryptographically verifiable identities to applications and services.

Workload Security

Cloud Security

Protection of cloud and container workloads across build, deploy, and runtime phases.

Wiper Malware

Malware

Destructive malware intended to erase data or render systems inoperable.

X

Terms starting with X

XML External Entity (XXE)

Application Security

XML parser vulnerability that can expose data, trigger SSRF, or execute unintended actions.

XDR

Tools

Extended Detection and Response unifying detection and response across endpoint, network, and cloud.

Y

Terms starting with Y

YARA

Threat Intelligence

Rule-based pattern matching language used to identify malware families and artifacts.

Z

Terms starting with Z

Zero-Day

Threats

Previously unknown vulnerability exploited before a patch is available.

Zero Trust

Frameworks

Security model that continuously verifies identity, device posture, and context for every request.

Zombie Bot

Threats

Compromised device controlled remotely as part of a botnet.

Zone and Conduit Model

OT Security

IEC 62443 segmentation approach that organizes assets into zones and controlled communication conduits.

Zero Trust Network Access (ZTNA)

Network Security

Access model that grants application access based on identity and context instead of network location.

Step 1

Search by term or acronym to align language across teams.

Step 2

Browse categories to explore frameworks, tools, and threat concepts.

Step 3

Open linked pages for deeper guidance and provider matching.

Browse by category

Definitions organized by theme.

See full resource library

Compliance

62 terms

Threats

39 terms

Cloud Security

36 terms

Identity

32 terms

Application Security

25 terms

Privacy

21 terms

Malware

20 terms

Governance

18 terms

Network Security

17 terms

Frameworks

17 terms

OT Security

17 terms

Cryptography

16 terms

Detection

13 terms

Operations

10 terms

Risk

10 terms

Resilience

8 terms

Vulnerability Management

8 terms

Endpoint Security

7 terms

Incident Response

7 terms

Threat Intelligence

7 terms

Architecture

5 terms

Controls

5 terms

Concepts

5 terms

Email Security

5 terms

Data Security

4 terms

Services

3 terms

Metrics

3 terms

Offensive Security

2 terms

Tools

2 terms

Automation

1 terms

Ready to move fast

Get matched with cybersecurity providers in hours, not weeks.

Submit your request once. Our AI qualifies, enriches, and routes the lead to the best MSP and MSSP partners for your stack, industry, and timeline.

Optimized for faster qualification and stronger provider fit.

What you get

  • AI-qualified leads scored for budget, urgency, and compliance.
  • Provider shortlists with verified certifications and references.
  • Scheduling workflows with smart reminders and follow-up.
  • Live conversion analytics and quality trend insights.

Need cybersecurity support now?

Submit your requirements and get a vetted provider shortlist in hours.

Request Help

Growing your provider pipeline?

Join the marketplace and access higher-intent demand with stronger fit signals.

Become a Provider

Explore next

Navigate by service, industry, framework, or region.