Cybersecurity Terms and Glossary: Definitions and Explanations
Cyber security is the discipline of protecting computer systems, networks, devices, and data from malicious attacks. It covers identifying threats, isolating them, countering them with no or minimal data loss, and working towards threat prevention.
Everyone is affected by cybersecurity. We all share information online on a regular basis, whether for work or pleasure, via smartphones, tablets, or laptops, and with that comes a certain level of danger.
We should all have a basic awareness of how to protect our data — and what the threats are – as consumers and businesses. Nonetheless, it occasionally feels as if the content is purposefully obfuscated behind complex acronyms and technical jargon.
Even the most tech-savvy among us would find it difficult to keep up with all of the cybersecurity jargon.
The cybersecurity lexicon gives knowledge and insight into the industry's key phrases and definitions to the cybersecurity community. This glossary contains important terms.All related terms referenced on sunnyvalley.io website and commonly used in the cybersecurity field have been added. You can begin your search by looking up the key terms you'll need to know as a security professional.
Read on for a dictionary of cybersecurity terminology and acronyms if you want to know the most commonly used 180 cybersecurity terms. We'll be updating this on a regular basis, so let us know if you have any suggestions for additions.
Cybersecurity Terms with A
You can find here definitions for common cybersecurity terms starting with the letter "A"
Access Control
The process of approving or rejecting specific requests for or attempts to: 1) receive and use the information and related information processing services; and 2) get access to certain physical facilities.
Access Control List (ACL)
An object's list of permissions. The list indicates who or what is permitted access to the object, as well as what operations are permitted on it. 2. A mechanism for enumerating the system entities that are permitted to access a system resource and specifying, either implicitly or explicitly, the access modes provided to each entity in order to implement access control for that resource.
Access Control Policy
High-level requirements define how access is controlled and who has access to what information and when.
Access Management
Access Management is a set of procedures that allows only those who have been granted access to a resource to perform actions on it. Policy Administration, Authentication, and Authorization are the three most frequent Access Management services you may encounter on a daily basis without ever recognizing it.
Access Point
A device that logically connects wireless client devices in infrastructure and grants access to a distribution system.
Active Attack
A genuine attack on a system, its resources, data, or operations by an intentional threat source. Man-in-the-middle, impersonation, and session hijacking are examples of active attacks.
Active Directory
A directory service from Microsoft for managing identities in Windows domain networks.
Address Resolution Protocol (ARP)
A methodology for obtaining the physical address of a node. A client station broadcasts an ARP request onto the network with the target node's Internet Protocol (IP) address, and the node responds by sending back its physical address so that packets can be sent to it.
Advanced Encryption Standard (AES)
AES stands for Advanced Encryption Standard. A cryptographic technique that has been authorized by the US government and can be used to protect electronic data.
Advanced Persistent Threat (APT)
An adversary with advanced levels of competence and substantial resources, allowing it to create opportunities to fulfill its goals by employing many attack vectors (e.g., cyber, physical, and deception).
Adware
Adware, sometimes known as advertising-supported software, is software that earns revenue for its creator by displaying internet advertisements in the software's user interface or on a screen displayed to the user during the installation process.
American Standard Code for Information Interchange (ASCII)
The American System Code for Information Interchange, or ASCII, is a character encoding standard used in electronic communication. In computers, telecommunications equipment, and other devices, ASCII codes represent text.
Anomaly-Based Detection
The practice of identifying major deviations by comparing concepts of what constitutes normal activity with observable events.
Anonymizing proxy
An anonymizer, often known as an anonymous proxy, is a tool that aims to make online behavior untraceable. It's a proxy server computer that serves as a middleman and privacy shield between a client computer and the rest of the Internet.
Anti Spyware software
Antispyware software is a tool that focuses on identifying, preventing, and uninstalling spyware.
Anti-spam
Anti-spam software is designed to keep unsolicited and malicious emails out of company inboxes.
Anti-spoofing
Countermeasures were taken to prevent the illegal use of lawful identity and authentication (I&A) data, regardless of how it was obtained, to impersonate someone other than the attacker.
Antivirus Software
An application that monitors a computer or network for the purpose of detecting and preventing malware incidents.
Application control
Completeness and validity checks, identification, authentication, authorization, input controls, and forensic controls are all examples of application control.
Application Firewall
A firewall that analyzes network traffic for one or more applications using stateful protocol analysis.
Artificial intelligence
Artificial intelligence, as opposed to natural intelligence expressed by humans or animals, is intelligence demonstrated by robots.
Assembly Language
Assembly language, abbreviated as in computer programming, is any low-level programming language in which the instructions in the language have a very strong correlation with the architecture's machine code instructions.
Assessment plan
The control assessment objectives, as well as a detailed methodology for conducting such assessments.
Asymmetric Keys
A public key and a private key are two linked keys that are used to execute complementary activities like encryption and decryption, as well as signature production and verification.
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM) is a telecommunications standard developed by ANSI and the International Telecommunication Union (ITU) for digital transmission of multiple types of traffic, such as telephony, data, and video signals, over a single network without the use of separate overlay networks.
Attack
A breach of system integrity or an attempt to gain unauthorized access to system services, resources, or information.
Attack method
An adversary's method, tactic, or means for attacking information or an information system.
Attack signature
An unauthorized access attempt is indicated by a specified series of actions.
Attack surface
An attacker can try to access, produce an effect on, or extract data from a system, a system element, or an environment by attempting to enter, cause an effect on, or extract data from those spots on the system, system element, or environment's border.
Attack Vector
An attack vector in computer security refers to a specific path, method, or situation that can be used to break into an IT system and compromise its security.
Attacker
A malicious party, such as an insider, acts with the goal to breach a system.
Audit Trail
A track of who has accessed an information technology (IT) system and what actions they have completed during a period of time.
Authentication
Verifying a user's, process's, or device's identification, which is frequently required before granting access to resources in an information system.
Authentication Mechanism
Mechanisms based on hardware or software require users to authenticate their identity before accessing data on a device.
Authenticator
The method of confirming a user's, process's, or device's identity (e.g., user password or token).
Authorization
A system entity is given the right or authority to access a system resource.