Deja, šio puslapio turinio jūsų pasirinkta kalba nėra.
·
Cybersecurity glossary
Browse thousands of cybersecurity definitions
A
- A core router
- A value-added network
- Abandonware
- ABEND
- Accelerated Mobile Pages
- Acceptable use policy
- Access control entry
- Access Control List
- Access control system
- Access layer
- Access management
- Access Point Name
- Account compromise
- Account hijacking
- Account takeover
- Activation code
- Active attack
- Active content
- Active defense
- ActiveX
- Ad hoc on-demand distance vector
- Ad-Hoc Mode
- Adaptive authentication
- Address resolution protocol cache
- Address space
- Address verification service
- ADFGVX cipher
- Administrative privileges
- Advanced evasion technique
- Advanced Message Queuing Protocol
- Advanced metering infrastructure
- Advanced penetration testing
- Advanced persistent threat
- Advanced threat detection
- Adversarial machine learning
- Adversary group naming
- Adware
- AES encryption
- AFTS
- AI as a service
- AI TRiSM
- AIOps
- Air gap
- Alert fatigue
- Allowlist
- Allowlisting
- AlphaGo
- Alphanumeric password
- Alternative routing
- Analog computer
- Android package kit
- Angler phishing
- Anna Kournikova virus
- Anomaly-based detection
- Anonymizer
- Anonymous call rejection
- Anonymous hackers
- Answer-seizure ratio
- Anti-fraud system
- Anti-malware
- Anti-phishing service
- Anti-spam
- Anti-spyware
- Antivirus
- Antivirus scanner
- Anycast DNS
- API attack
- Apple Filing Protocol
- AppleTalk
- AppleTalk Data Stream Protocol
- AppleTalk Session Protocol
- Application acceleration
- Application access management
- Application allow-listing
- Application awareness
- Application base
- Application client
- Application clustering
- Application delivery
- Application delivery controller
- Application delivery network
- Application deployment
- Application firewall
- Application gateway
- Application hosting
- Application infrastructure provider (AIP)
- Application layer
- Application log
- Application management
- Application performance monitoring
- Application program
- Application programming interface
- Application server
- Application service provider
- Application sprawl
- Application streaming
- Application virtualization
- Application-aware networking
- Application-centric infrastructure
- Arbitrary code execution
- ARCnet
- Area border router
- Arithmetic logic unit
- ARM processor
- Armored virus
- ARPANET
- Artificial general intelligence
- Artificial intelligence
- ASCII
- ASLR
- Assembler
- Asymmetric Cyberattack
- Asynchronous Transfer Mode
- Asynchronous transmission
- ATM jackpotting
- ATM skimming
- Atomicity, Consistency, Isolation, Durability (ACID)
- Attack signature
- Attack surface
- Attack surface management
- Attack taxonomy
- Attribute value pair
- Attribute-based encryption
- Auction fraud
- Audit log
- Audit trail
- Augmented intelligence
- Authentication bypass vulnerability
- Authentication header
- Authentication server
- Authorized push payment fraud
- Auto attendant
- Auto-negotiation
- Automatic content recognition
- Automatic Location Identification
- Automatic private IP addressing
- Automatic repeat request
- Automation platform
- Autonomic computing
- Autonomic network
- Autonomous intelligence
- Autonomous system
- Autorun worm
B
- Back-hack
- Backdoor
- Backhaul
- Backout plan
- Backporting
- Backpropagation
- Backtracking
- Backup (n.)
- Backup as a Service
- Backwards compatibility
- BACnet
- Bad Sector
- BadUSB
- Bait app
- Baiting
- Bak file
- Bandwidth
- Bandwidth Analyzer
- Bandwidth meter
- Bandwidth on demand
- Bank Drop
- Banker Trojan
- Bare metal environment
- Bare Metal Restore
- Bare-metal provisioning
- Base address
- Base64
- Baseboard management controller
- Baseline configuration
- Baselining
- Basic Input/Output system (BIOS)
- Bastion host
- Batch file
- Batch Processing
- Baud rate
- Bayesian filter
- Beaconing
- Bearer protocol
- Behavior monitoring
- Bespoke Software
- BGP
- Biba Model
- Big data as a service
- BIN attack
- Binary code analysis
- Binary file
- Binary File Transfer
- Binary format
- Biometric authentication
- Biometric data
- Biometric device
- Biometric engine
- Biometric security
- Biometric spoofing
- BIOS password
- BIOS rootkit
- Birthday attack
- Bit error rate
- Bit rate
- Bit rot
- Bit-flipping attack
- BitLocker
- Black box attack
- Black hat hacker
- BlackEnergy
- Blackholing
- Bladabindi
- Blended threat
- Bloatware
- Blob storage
- Block cipher
- Block size
- Block Storage
- Blockchain technology
- Blocklist
- Blue hat hacker
- Blue Pill attack
- Blue Screen of Death
- Blue team
- BlueBorne
- Bluebugging
- Bluejacking
- Bluesnarfing
- Bluetooth
- Body Area Network
- Bogon filtering
- Boltzmann machine
- Boolean logic
- Boot sector virus
- Boot sequence
- Booter
- Bootkit
- Bootloader
- Bootstrap protocol
- Bot herder
- Bot mitigation
- Botnet
- Bounced email
- Boundary Protection
- Boyce-Codd normal form
- Bricking
- Bridge connection
- Bridge mode
- Bridge protocol data unit
- Broad network access
- Broadband over power line
- Broadband remote access server
- Broadband router
- Broadcast address
- Broadcast domain
- Broadcast storm
- Broken access control
- Broken authentication attack
- Browser caching
- Browser hijacker
- Browser hijacking
- Browser isolation
- Browser sandboxing
- Browser wars
- Brute-force attack
- Buffer overflow attack
- Bug fix
- Bulk data transfer
- Bullet camera
- Bundle protocol
- Bus mastering
- Business email compromise
- Business process engine
- Byte order mark
- Byzantine fault tolerance
C
- C-SCRM
- C&C server
- Cache coherence
- Cache hit
- Cache invalidation
- Cache miss
- Cache server
- Caching proxy
- Caching server
- Caesar encryption
- Call detail record
- Call stack
- Camfecting
- Campus area network
- Canary token
- Canonical data model
- Canonical name
- CAPTCHA
- Captive portal
- Carberp
- Card purchase authorization
- Card testing
- Cardinality
- Carding
- Carrier Ethernet
- Catfishing
- CCTV
- Cell relay
- Cellular network
- Central outdoor router
- Centralized computing
- CEO fraud
- Cerber ransomware
- Certificate authority server
- Certificate management
- Certificate pinning
- Certificate-based authentication
- Certified Information Systems Security Professional
- CGNAT
- ChaCha20
- Chaffing and winnowing
- Challenge Handshake Authentication Protocol
- Challenge-response authentication
- Char
- Character set
- Chargeware
- Chatty protocol
- Checksum
- Chernobyl packet
- Chipset
- Chkdsk
- Choke packet
- Chosen plaintext attack
- CIA triad
- CIDR
- CIEM
- Cipher suite
- Ciphertext
- Ciphertext-policy attribute-based encryption
- Circuit-level gateway
- Cisco IOS
- Citrix server
- Class A IP address
- Class B IP address
- Class C IP address
- Class D IP address
- Class E IP address
- Class of Service
- Class-based queuing
- Clean boot
- Clean fraud
- Clean install
- Clickjacking
- Clicktivism
- Client
- Client access license
- Client-server network
- Clipboard hijacking attack
- Clipper chip
- Cloaking
- Clocking
- Clone phishing
- Clop ransomware
- Cloud advertising
- Cloud architecture
- Cloud archiving
- Cloud as a service
- Cloud attack
- Cloud cartography
- Cloud communications
- Cloud containers
- Cloud data platform
- Cloud database
- Cloud elasticity
- Cloud enablement
- Cloud encryption gateway
- Cloud forensics
- Cloud networking
- Cloud operating system
- Cloud operations management
- Cloud orchestration
- Cloud provisioning
- Cloud sandboxing
- Cloud security posture management
- Cloud server
- Cloud storage gateway
- Cloud VPN
- Cloud VPS
- Cloud Workload Protection Platform
- Cloud-based supercomputing
- CloudTrust protocol
- Cloudware
- CLSID
- Cluster analysis
- Cluster controller
- CNAPP
- Co-browsing
- Co-location
- Cobweb site
- Code Access Security
- Code bloat
- Code generator
- Code injection
- Code management
- Code monkey
- Code morphing
- Code signing
- Cognitive computing
- Cognitive password
- Cognitive technology
- Cold boot
- Cold boot attack
- Cold data
- Cold standby
- Collision
- Collision domain
- Command injection
- Command-line interface
- Committed information rate
- Commodity computing
- Common address redundancy protocol
- Common business-oriented language
- Common Internet File System
- Common Language Runtime
- Communication protocol
- Communications system
- Compartmented security mode
- Compatibility
- Compiler
- Composite key
- Compressed file
- Compute platforms
- Compute security
- Computer aided software engineering (CASE)
- Computer architecture
- Computer cluster
- Computer forensics
- Computer imaging
- Computer network attack
- Computer network defense
- Computer network exploitation
- Computer network operations
- Computer system
- Computer telephony integration
- Computer virus
- Computer worm
- Computer-aided software testing (CAST)
- COMSEC
- Concurrency control
- Conficker worm
- Confidential Computing
- Configuration file
- Configuration management database
- Connection admission control
- Connection-oriented protocol
- Connectionless protocol
- Consumer electronics
- Container breakout
- Container isolation
- Container scanning
- Container technology
- Content delivery network
- Content security policy
- Content spoofing
- Context Delivery Architecture
- Context-aware security
- Contextual advertising
- Continuous integration and continuous deployment
- Control bus
- Control framework
- Control network
- Control plane
- Control structure
- Control unit
- Controlled cryptographic item (CCI)
- Controller Area Network
- Converged infrastructure
- Conversation hijacking
- Conversational artificial intelligence
- Cookie hash
- Cookie stuffing
- Cookie theft
- Copy protection
- Copy-paste compromise
- Core switch
- CoreBot
- Country code top-level domain
- Covert channel
- CPU contention
- CPU utilization
- Cracker
- Credential harvesting
- Credential store
- Credential stuffing
- Credentials
- Creeper virus
- Creepware
- Critical infrastructure and key resources
- Critical security parameter
- CRLF injection
- Cross-browser fingerprinting
- Cross-platform
- Cross-site request forgery
- Crossover cable
- Cryptanalysis
- CryptBot
- Crypto malware
- Crypto shredding
- Cryptographic algorithm
- Cryptographic hash function
- Cryptographic key
- Cryptographic protocol
- Cryptolocker ransomware
- Cryptosystem
- Cryptovirology
- Cryptovirus
- Cryptowall
- CSCW
- CSIRT
- CTB locker
- Curation
- Customer edge router
- Cut-through switching
- Cutting-edge technology
- CVE
- CVSS
- cXML
- Cyber attribution
- Cyber begging
- Cyber defense
- Cyber espionage
- Cyber extortion
- Cyber forensics
- Cyber harassment
- Cyber hygiene
- Cyber incident
- Cyber incident response plan
- Cyber insurance
- Cyber operations
- Cyber Pearl Harbor
- Cyber privateering
- Cyber range
- Cyber resiliency
- Cyber threat hunting
- Cyber vandalism
- Cyber vigilantism
- Cyber warfare
- Cyber-physical attack
- Cyberattack
- Cyberbullying
- Cybercrime
- Cybercriminal
- Cyberlaw
- Cyberlibel
- Cyberlocker
- Cybersecurity ecosystem
- Cybersecurity framework
- Cybersecurity Maturity Model Certification
- Cybersecurity mesh
- Cyberspace
- Cybersquatting
- Cyberstalking
- Cyberterrorism
- Cyberthreat
- Cyberwarrior
- Cyclic redundancy check
D
- Daemon
- Daisy chain routers
- Dangling pointer
- Dark data
- Dark patterns
- Dark web
- DarkHotel
- DAST
- Data access
- Data acquisition
- Data administration
- Data aggregation
- Data analytics
- Data Archiving
- Data asset
- Data at rest
- Data audit
- Data availability
- Data backup
- Data bank
- Data binding
- Data breach
- Data breach prevention
- Data bus
- Data center architecture
- Data center design
- Data center proxy
- Data Center Rack
- Data center storage
- Data center tiers
- Data center virtualization
- Data cloud
- Data collection
- Data communications equipment
- Data conversion
- Data corruption
- Data custodian
- Data de-identification
- Data deduplication
- Data definition language
- Data dictionary
- Data diddling
- Data diode
- Data entry
- Data execution prevention
- Data exfiltration
- Data fabric
- Data feed
- Data flow model
- Data governance framework
- Data hiding
- Data in motion
- Data in use
- Data Independence
- Data integrity
- Data intelligence
- Data key
- Data lake
- Data leakage
- Data link layer
- Data logging
- Data loss
- Data loss prevention
- Data Manipulation Language
- Data marketplace
- Data mart
- Data masking
- Data migration
- Data mining
- Data mirroring
- Data modernization
- Data over cable service interface specification
- Data packet
- Data perturbation
- Data plane
- Data poisoning
- Data preprocessing
- Data processor
- Data profiling
- Data Protection as a Service
- Data protection policy
- Data purging
- Data recovery agent
- Data redundancy
- Data remanence
- Data replay
- Data resiliency
- Data retrieval
- Data sanitization
- Data scraping
- Data segregation
- Data server
- Data shadow
- Data source
- Data sovereignty
- Data subject
- Data terminal equipment
- Data theft
- Data transfer
- Data transmission
- Data validation
- Data vaulting
- Data verification
- Data warehouse
- Data wiping
- Data-centric security
- Data-driven
- Data-in-transit encryption
- Data-Sending Trojan
- Database activity monitoring
- Database administration
- Database as a service
- Database clustering
- Database dump
- Database engine
- Database management system
- Database replication
- Database report
- Database repository
- Datafication
- Datagram
- Datastore
- Dcs1000
- DD-WRT
- DDoS mitigation
- Dead code
- Dead-box forensics
- Debug symbols
- Decapsulation
- Decentralized identity
- Deception technology
- Declassification
- Decoding
- Decryption
- Dedicated IP
- Dedicated line
- Dedicated server
- Deepfake
- Default gateway
- Default password
- Default-free zone
- Defense In-Depth
- Deflection routing
- Delay-tolerant network
- Delta rule
- Demand Assigned Multiple Access (DAMA)
- Demilitarized zone
- Deobfuscate
- Deperimeterization
- Deprecation
- Deprovisioning
- Desktop Administration
- Desktop as a Service
- Desktop management interface
- Development server
- Device driver
- Device hash
- Device-agnostic
- DevOps
- DFIR
- DHCP
- DHCP attack
- DHCP proxy
- Dial-on-demand routing
- Dialog box
- Dictionary attack
- Differential fault analysis attack
- Differential privacy
- Diffie-Hellman
- Diffusing Update Algorithm
- Digest authentication
- Digital certificate
- Digital data
- Digital dystopia
- Digital envelope
- Digital exhaust
- Digital fingerprint
- Digital footprint
- Digital identity
- Digital information
- Digital optimization
- Digital piracy
- Digital signature algorithm
- Digital switch
- Digital Transmission Content Protection Over Internet Protocol
- Digital trust
- Digital twin
- Digital watermarking
- Digitalization
- Digitization
- Direct access storage device
- Direct connection
- Direct memory access
- Directory services
- Directory traversal attack
- Dirty bit
- Disaggregated storage
- Disassociation attack
- Disaster recovery as a service
- Discoverable mode
- Discretionary Access Control
- Disk cache
- Disk cloning
- Disk defragmentation
- Disk formatting
- Disk striping
- Disk-to-disk-to-cloud
- DiskPart
- Distance vector
- Distance vector multicast routing protocol
- Distance-vector routing protocol
- Distorting proxy
- Distributed cloud
- Distributed file system
- Distributed firewalls
- Distributed network
- Distributed system
- Distributed transaction
- Diverse Routing
- DLL Hell
- DLL hijacking
- DLL injection
- DNS A record
- DNS AAAA record
- DNS allowlist
- DNS amplification attack
- DNS attack
- DNS blocking
- DNS cache
- DNS client
- DNS CNAME record
- DNS encryption
- DNS failover
- DNS filtering
- DNS firewall
- DNS flushing
- DNS hijacking
- DNS hosting
- DNS load balancing
- DNS MX record
- DNS NS record
- DNS over HTTPS
- DNS port
- DNS propagation
- DNS proxy
- DNS PTR record
- DNS query
- DNS rebinding attack
- DNS record
- DNS redirection
- DNS redundancy
- DNS reflection attack
- DNS resolution
- DNS round-robin
- DNS server
- DNS sinkhole
- DNS SOA record
- DNS SPF record
- DNS SRV record
- DNS TTL
- DNS tunneling
- DNS TXT record
- DNS zone
- DNS zone transfer
- DNS-based Blackhole List
- DNSSEC
- Docker
- Document versioning
- Dolphin attack
- Domain
- Domain admin
- Domain controller
- Domain drop catching
- Domain fluxing
- Domain hijacking
- Domain Name System parking
- Domain shadowing
- Domain spoofing
- Domain tasting
- Domain-specific language
- DomainKeys Identified Mail
- Donationware
- Dongle
- Dotted decimal notation
- Double tagging
- Downloader trojan
- Doxxing
- DrDoS attack
- Dridex
- Drive-by attack
- Drive-by download
- DRM-free
- Drop address
- Dropper
- DSLAM
- Dual-homed host
- Dual-ring topology
- Dual-stack network
- Dumb terminal
- Dumpster diving attack
- Duqu
- Dwell time
- Dynamic analysis
- Dynamic data masking
- Dynamic DNS
- Dynamic IP
- Dynamic library
- Dynamic ports
- Dynamic URL
- Dynamic virtual private network
- Dynamic website
- Dyreza
E
- E-government
- Early launch anti-malware
- Eavesdropping
- Echo check
- Edge AI
- Edge caching
- Edge Datacenter
- Edge gateway
- Edge network
- Edge security
- Egosurfing
- Egress filtering
- Egress traffic
- EIGRP
- Elastic IP address
- Electronic customer relationship management
- Electronic data interchange
- Electronic document management system
- Electronic intelligence
- Electronic pickpocketing
- Electronic signature
- Electronic software distribution
- Electronically stored information
- Elk Cloner
- Elliptic-curve cryptography
- Email attack
- Email bomb
- Email gateway
- Email harvesting
- Email hoax
- Email retention policy
- Email signature
- Email spoofing
- Email virus
- Embedded intelligence
- Embedded operating system
- Embedded software
- Emission security
- Emoticon
- Emotion recognition
- Emulator
- EMV chip
- EMV Tokenization
- Encapsulating security payload
- Encoding
- Encrypted file transfer
- Encrypting File System
- Encryption as a service
- Encryption key
- End-of-Support
- End-to-end encryption
- End-user license agreement
- Endianness
- Endpoint authentication
- Endpoint device
- Endpoint protection platform
- Endpoint security
- Enterprise application
- Enterprise application security
- Enterprise as a service (EaaS)
- Enterprise Fraud Management
- Enterprise network
- Enterprise security architecture
- Entry node
- Erasure coding
- ERC-721
- Error control
- Error correction code
- Error detection and correction
- Error Log
- Escrow Passwords
- Ethernet
- Ethernet fabric
- EtherNet/IP
- EtherType
- Ethical hacking
- Even parity
- Event log
- Evergreen browser
- Evil maid attack
- Evil twin
- Evolution Data Only
- Evolutionary computation
- Evolved Packet Core
- Exception handling
- Executable file
- Execute Disable Bit
- Exit node
- Exokernel
- Expert system
- Exploit
- Exploit chain
- Exploit kit
- Exploit-as-a-service
- Expression language injection
- Extended ACLs
- Extended service set
- Extensibility
- Extensible Authentication Protocol
- Exterior gateway protocol
- External Border Gateway Protocol
- Extraction
- Extranet
F
- Face ID
- Facebook stalking
- Facial recognition
- Factory reset
- Failback
- Failover
- Fake antivirus
- False acceptance ratio
- False flag
- False rejection
- Fast flux
- FastCGI
- Fatal error
- Fatal exception
- Fault configuration accounting performance security
- Fault injection attack
- Fault tolerance
- FCFS
- FCIP
- Feistel network
- Fiber Channel over Ethernet
- Fiber Channel storage area network
- Fiber Distributed Data Interface
- Fiber optic switch
- Fiber to the Node
- Fieldbus
- File Allocation Table
- File binder
- File carving
- File Descriptor
- File eXchange protocol
- File format
- File hash
- File integrity monitoring
- File management system
- File signature
- File-hosting service
- File-infecting Virus
- Fileless attacks
- Fileless malware
- FileRepMalware
- Finite field
- FIPS compliance
- Firesheep
- Firewall
- Firewall rules
- Firmware
- Firmware over-the-air
- First-party cookie
- First-party data
- Fixed wireless access
- Flash cookies
- Flat file
- Flexible Single Master Operation
- Flooder
- Flooding
- Flow routing
- Fog computing
- Footprinting
- Forever day bug
- Fork bomb
- Form authentication
- Form grabber
- Format string attack
- Formjacking
- Forward compatibility
- Forward DNS
- Forward proxy
- FOSS
- Four-way handshake
- FPS
- Fragment overlap attack
- Frame Relay
- Frape
- Fraud as a Service
- Freedom of information
- Freeware
- Frequency-division multiple access
- FTP proxy
- Full disk encryption
- Full duplex
- Fully qualified domain name
- Fullz
- Function as a service
- Functional dependency
- Fuzz testing
- FWaaS
G
- Gamification
- GandCrab
- Garbage in, garbage out
- Garlic routing
- Gateway server
- GDPR
- General packet radio service
- Generative AI
- Generic access network
- Generic routing encapsulation
- Geo-blocking
- Geofencing
- Geotagging
- GHOST bug
- GhostNet
- Ghostware
- Gigabit interface converter
- Gigabit point of presence
- Global area network
- Global catalog
- Global File System
- Global server load balancing
- Globbing
- Gnosticplayers
- Golden ticket attack
- Google bomb
- Google dorking
- Gopher protocol
- Government surveillance
- GPRS Tunneling Protocol
- GPS jamming
- Granularity
- Graphical user interface
- Gray hat hacker
- Graymail
- Green Computing
- Green hat hacker
- Greylist
- Greyware
- Grid computing
- Group Policy
- GSM
- GSSAPI
- Guessing entropy
- Guest Operating System
H
- H.323
- Hackathon
- Hackintosh
- Hacktivism
- Hadoop cluster
- Half duplex
- Halt and Catch Fire
- Hamming code
- Hamming distance
- Handshake protocol
- Hard link
- Hard reboot
- Hard reset
- Hardening
- Hardware acceleration
- Hardware as a service
- Hardware identification
- Hardware security module
- Hardware virtualization
- Hash chain
- Hash function
- Hash list
- Hashing
- Headless system
- Heap spray
- Heap spraying
- HermeticWiper
- Heuristic analysis
- Heuristic virus
- Hexdump
- High anonymity proxy
- High availability cluster
- High-level data link control
- High-performance file system
- High-performance radio local area network
- Hoax
- Hold down timer
- Home server
- Homograph attack
- Homomorphic encryption
- HoneyMonkey
- Honeypot
- Honeytoken
- Hop count
- Host address
- Host identity protocol
- Host intrusion prevention system
- Host operating system
- Host security
- Host virtual machine
- Host-based firewall
- Host-based intrusion detection system
- Hosted virtual desktop
- Hostname
- Hosts file
- Hot data
- Hot plugging
- Hot potato routing
- Hot server
- Hot site
- Hot spare
- Hotlink
- Hotspot
- HTML Injection
- HTML tag
- HTML5
- HTTP
- HTTP header
- HTTP parameter pollution
- HTTP proxy
- HTTP request smuggling
- HTTP Strict Transport Security
- HTTPS
- HTTPS phishing
- HTTPS proxy
- Hub and spoke network
- Hug of death
- Human firewall
- Human-machine interface
- Hybrid active directory
- Hybrid attack
- Hybrid cloud management
- Hybrid cloud networking
- Hybrid cloud security
- Hybrid cloud storage
- Hybrid computer
- Hybrid encryption
- Hybrid firewall
- Hybrid hard drive
- Hybrid IT management
- Hybrid routing protocol
- Hybrid WAN
- Hyperautomation
- Hyperlink
- Hyperscale
- Hypervisor
I
- I/O controller
- I2P
- IAM authentication
- IAST
- iBeacon
- Ice phishing
- IDE
- Idempotence
- Identity and access management
- Identity cloning
- Identity fabric
- Identity life cycle
- Identity orchestration
- Identity proofing
- Identity-based encryption
- IEEE 802
- ILOVEYOU
- Image recognition
- Image spam
- IMEI
- Immutable ledger
- Impersonation attack
- In-memory database
- Incremental backups
- Indicator of compromise
- Industrial internet of Things (IIoT)
- Industroyer
- Inetd
- Inference attack
- Information assurance
- Information hiding
- Information management
- Information processing
- Information security management system
- Information security policy
- Infotainment
- Infrared
- Infrastructure security
- Infrastructure software
- Ingress filtering
- INI file
- Initial access brokers
- Initial fraud alert
- Initial sequence numbers
- Initialization vector
- Inline deduplication
- Inline frame
- Input layer
- Input validation attack
- Input/output operations per second
- Insecure deserialization
- Insecure direct object references
- Insertion attack
- Insider attack
- InstallCore
- Integer overflow
- Integrated circuit
- Integrated drive electronics
- Integrated service digital network
- Integrated threat management
- Integration architecture
- Integration platform as a service
- Integrity checking
- Intel Virtualization Technology
- Intelligent agent
- Intelligent character recognition
- Intelligent cloud
- Intelligent network
- Intelligent Platform Management Interface
- Intelligent virtual assistant
- Intelligent web
- Intent-based networking
- Interception attacks
- Interconnection agreement
- Interface message processor
- Interior gateway protocol
- Internet Assigned Numbers Authority
- Internet backbone
- Internet background noise
- Internet bot
- Internet connection sharing
- Internet content adaptation protocol
- Internet Control Message Protocol
- Internet exchange point
- Internet Inter-ORB Protocol
- Internet key exchange
- Internet of Bodies
- Internet of Everything
- Internet of Medical Things
- Internet Protocol address
- Internet protocol private branch exchange
- Internet Protocol switching
- Internet routing
- Internet security
- Internet telephony
- Internet transit
- Internet troll
- Internet worm
- Internetworking
- Interoperability testing
- Intranet
- Intrusion detection system
- Inverse multiplexer
- IoT botnet
- IoT gateway
- IoT middleware
- IP address blocking
- IP camera
- IP Centrex
- IP forwarding
- IP hijacking
- IP multicast
- IP Multimedia Subsystem
- IP Network
- IP packet
- IP reputation
- IP SLA
- IP spoofing
- IP surveillance
- ipconfig
- IPsec
- IPv4
- IPX/SPX
- IS-IS
- Isolated storage
- ISP
- IT Asset Life Cycle Management
- IT governance framework
- IT security
- Iterative DNS query
- ITSM
J
K
- Keepalive
- Kerberos
- Kerckhoffs’ principle
- Kernel
- Kernel-based Virtual Machine
- Key derivation function
- Key distribution center
- Key encryption key
- Key escrow
- Key exchange
- Key fob
- Key length
- Key risk indicator
- Key rotation
- Key schedule
- Key-based routing
- Key-policy attribute-based encryption
- Keyboard buffer
- Keychain
- Keylogger
- Keypunch machine
- Killware
- KLOC
- Knowledge-Based System (KBS)
- Kovter
- KRACK attack
- KYC verification
L
- L1 cache
- L2 cache
- Label Edge Router
- LAN Manager Hash
- LAN party
- LAN Switching
- Lateral movement
- Lattice-based access control
- Layer 2 Forwarding protocol
- Layer 4 switch
- Leaf-spine architecture
- Leakware
- Leapfrog Attack
- Leased line
- Least privilege
- Least privilege access
- Least Significant Bit
- Legacy system
- Level 3 cache
- Lights out data center
- Lightweight Directory Access Protocol
- Likejacking
- Linear discriminant analysis
- Linear-feedback shift register
- Link Aggregation Control Protocol
- Link encryption
- Link layer discovery protocol
- Link-state routing protocol
- Living off the land attack
- LMHOSTS file
- Load balancer
- Load balancing router
- Loadable kernel modules
- Local area connection
- Local file inclusion
- Localhost
- Location intelligence
- Locator ID Separation Protocol
- Locky ransomware
- Log
- Log clipping
- Log file
- Log shipping
- Log4Shell
- Logic bomb
- Logical access
- Logical network
- Logical topology
- Logical unit number (LUN)
- Logjam
- LOLBin
- Long-term evolution
- Long-Term Evolution Advanced
- LonTalk
- LonWorks
- Loopback address
- Loopback plug
- Low latency
- LSDB
- LulzSec
- LUN masking
- Luring attack
- Lurking
M
- MAC address
- Machine cycle
- Machine data
- Machine learning
- Machine to Machine
- Machine vision
- Macro virus
- Madware
- Magecart
- Magnet link
- Mail exchange record
- Main distribution frame
- Malicious active content
- Malicious code
- Malleability
- Malvertising
- Malware obfuscation
- Malware sandboxing
- Malware-as-a-service
- MAM
- Man trap
- Man-in-the-middle attack
- Managed data center
- Managed file transfer
- Managed service provider platform
- Managed Video as a Service
- Management information base
- Manchester encoding
- Mandatory access control
- Masquerade attack
- Massively parallel processing
- MAST
- Master boot record
- Master password
- Maximum segment size
- MD5
- Mean time between failures
- Mean time between repair
- Mean time to acknowledge
- Mean time to contain
- Mean time to detect
- Mean time to failure
- Mean time to patch
- Mean time to recovery
- Mean time to repair
- Mean Time to Resolution
- Mean time to respond
- Media access control
- Media access unit
- Media Dispatch Protocol
- Melissa virus
- Meltdown vulnerability
- Member server
- Memory Address Register
- Memory allocation
- Memory bottleneck
- Memory cache
- Memory compression
- Memory data register
- Memory dump
- Memory forensics
- Memory leak
- Memory refresh
- Memory rootkit
- Memory-driven computing
- Merkle tree
- Mesh networking
- Mesh node
- Mesh topology
- Message broker
- Message passing
- Message switching
- Message-oriented middleware
- Metadirectory
- MetaMask
- Metamorphic malware
- Metasploit
- Metered connection
- Metropolitan area network
- MFA bombing
- Micro virtual machine
- Micro-segmentation
- Microarchitecture
- Microbrowser
- Middleware
- MiFi
- Minification
- Mix network
- MLOps
- Mobile ad hoc network
- Mobile Application Security Testing
- Mobile cloud computing
- Mobile code
- Mobile credential
- Mobile malware
- Mobile network operator
- Mobile proxy
- Mobile station international subscriber directory number
- Mobile tagging
- Mobile virtual network operator
- Mobile web
- Mobile workforce
- Mobile-to-Mobile Convergence
- Mode of attack
- Modem
- Modular software architecture
- Monitoring as a service
- Monitoring software
- Monoculture
- Monte Carlo simulation
- Morris worm
- Most significant bit
- Moves, adds, and changes
- MPLS
- MPOE
- MSAU
- Muling
- Multi-authority attribute-based encryption
- Multi-cloud storage
- Multi-domain SSL
- Multi-homed
- Multi-Purpose Internet Mail Extensions
- Multi-tier application
- Multicast router
- Multidimensional database
- Multilayer perceptron
- Multilayer switch
- Multipartite virus
- Multiple input and multiple output
- Multiprotocol label switching
- Multiprotocol Over ATM
- Multitenancy
- Mutual authentication
- Mutual exclusion
N
- N-tier architecture
- Name resolution
- Nano kernel
- Narrowband
- NAS
- NAT loopback
- NAT traversal
- NAT64
- Nearline storage
- Neighbor discovery protocol
- Net neutrality
- NetBEUI
- NetBIOS
- Netcat
- NetFlow
- Netiquette
- Netmask
- NetScaler
- NetSecOps
- Netsplit
- Netwalker ransomware
- NetWare Core Protocol
- Network access control
- Network access control lists
- Network access server
- Network adapter
- Network administrator
- Network automation
- Network backup
- Network based application recognition
- Network based IDS
- Network bottleneck
- Network bridge
- Network configuration management
- Network congestion
- Network connectivity
- Network convergence
- Network database
- Network degradation
- Network detection and response
- Network discovery
- Network drive
- Network encryption
- Network File System
- Network forensics
- Network frame
- Network function virtualization
- Network hub
- Network ID
- Network information system
- Network infrastructure
- Network intelligence
- Network interface card
- Network intrusion
- Network intrusion protection system
- Network layer
- Network management system
- Network map
- Network Meltdown
- Network node manager
- Network on a chip
- Network operating system
- Network operations center (NOC)
- Network optimization
- Network port
- Network prefix
- Network processor
- Network protocols
- Network resilience
- Network sandboxing
- Network scanning
- Network security architecture
- Network security protocols
- Network segment
- Network service provider
- Network slicing
- Network sniffing
- Network socket
- Network software
- Network tap
- Network telescope
- Network termination unit
- Network throughput
- Network Time Protocol
- Network topology
- Network traffic analysis
- Network transparency
- Network virtualization
- Network-to-network interface
- Next hop
- Next-Generation Firewall
- NFC tag
- Nmap
- Node
- Non-Return-to-Zero
- Nonce
- Nonlinearity
- Nord name
- Northbound interface/Southbound interface
- Not-a-virus
- NotPetya
- NTP amplification attack
- Nuker
- Null authentication
- Null session
O
- OAuth
- Obfuscation
- Object request broker
- Object-oriented programming
- OCSP stapling
- Odd parity
- Offensive security
- Offline Attack
- OffSec
- OGNL injection
- On-premises software
- One ring scam
- One-time pad
- One-time password
- One-way encryption
- Onion domain
- Online Certificate Status Protocol
- Online data storage
- Open port
- Open relay
- Open system
- Open Virtualization Format
- OpenPGP
- OpenSSH
- Operation Shady Rat
- Operational database
- Operational level agreement
- Operational technology
- Operational testing
- OPSEC
- Optical character recognition
- Optical line terminal
- OSI model
- OSPF
- OST file
- Out-of-band authentication
- Over-the-Top Application
- Overflow error
- Overlay network
- Overrun
- Overwriting virus
- OWASP
P
- P2P fraud
- Packet buffer
- Packet capture
- Packet coalescing
- Packet filtering
- Packet loss
- Packet monkey
- Packet sniffer
- Packet sniffing
- Packet switching
- Packet-switched network
- Pad character
- Pagejacking
- Parallel data transmission
- Parallel processing
- Parameter tampering
- Parasite Hosting
- Paravirtualization
- Parental controls
- Parity check
- Parser
- Particle swarm optimization
- Pass the hash
- Passcode
- Passive attack
- Passive biometrics
- Passive File Transfer Protocol
- Passive Optical Network
- Passive reconnaissance
- Passive surveillance
- Passkey
- Passphrase
- Password authentication protocol
- Password hardening
- Password policy
- Password protection
- Password salting
- Password sniffer
- Password spraying
- Password vault
- Passwordless
- Patch
- Patch management
- Patch Tuesday
- Pathname
- PathPing
- Pattern recognition
- Payload
- Payment Card Industry Data Security Standard
- PCI bus
- Peer-to-peer
- Peering
- Pentest
- Perceptual Computing
- Perimeter firewall
- Perimeter security
- Peripheral device
- Permalink
- Permanent virtual circuit
- Persistent cookie
- Personal area network
- Personal firewall
- Personal VPN
- Personal web server
- Personally identifiable information
- Petya
- PGP encryption
- Pharming
- Phase-shift keying
- Phish-prone percentage
- Phishing kit
- Phlashing
- PHP injection
- Phreaking
- Physical address
- Physical layer
- Physical to virtual
- Piggybacking
- PIM-SSM
- Ping
- Ping of death
- Ping sweep
- Pipeline
- Pirated software
- Platform agnostic
- Platform For Privacy Preferences Project
- Platform security
- Playfair cipher
- Pod slurping
- Point of presence (POP)
- Point-to-multipoint communication
- Point-to-Point Encryption
- Point-to-point protocol
- Point-to-Point T1
- Polled Interrupt
- Polymorphic malware
- Polymorphic virus
- Port 80
- Port address translation
- Port knocking
- Port mapper
- Port mirroring
- Port scanning
- Port triggering
- Port-to-Application Mapping
- Portable computer
- Portable operating system interface
- Portal application
- Post Office Protocol
- Post-inoculation attack
- Post-quantum cryptography
- Postel’s Prescription
- Potentially unwanted application
- Poweliks
- Power distribution unit
- Power over Ethernet
- Power usage effectiveness
- Power-analysis attack
- Power-on self-test
- PowerShell
- PPPoE
- Predictive data mining
- Predictive maintenance
- Preemption
- Preprocessor directive
- Presentation layer
- Pretexting
- Primary DNS server
- Primary storage device
- Privacy policy
- Private branch exchange
- Private cloud storage
- Private internet access
- Private IP
- Private proxy
- Privilege escalation
- Privileged access workstation
- Privileged account
- Proactive defense
- Process hollowing
- Product cipher
- Production Server
- Programmable network
- Promiscuous mode
- Propagation delay
- Proprietary information
- Proprietary software
- Protected health information
- Protected mode
- Protocol Buffer
- Protocol conversion
- Protocol stack
- Protocol-independent multicast
- Proxy agent
- Proxy surfing
- Proxy Trojan
- Pseudocode
- Pseudonym
- Pseudonymization
- Pseudoransomware
- Pseudowire
- PsExec
- Public cloud infrastructure
- Public domain software
- Public IP
- Public key encryption
- Public key infrastructure
- Public Network
- Public proxy
- Public switched telephone network
- Pulsing zombie attack
- Purple team
- Push to Talk Over Cellular
- PvE
- PvP
- PWN
Q
R
- Race condition
- Radio over Internet Protocol
- RAID 0
- RAID 1
- RAID 10
- RAID 2
- RAID 3
- RAID 4
- RAID 5
- RAID 51
- RAID 5EE
- RAID 6
- Rail fence cipher
- Rainbow table attack
- RAM scraping
- Random access memory
- Random forest
- RARP
- Raspberry Robin
- Raw device mapping
- RC4
- RC5
- RC6
- RDF database
- Read-only memory
- Real Time Streaming Protocol
- Real-time communications
- Real-time computing
- Real-time data
- Real-time data streaming
- Real-time Transport Control Protocol
- Recommendation engine
- Reconnaissance
- Recovery mode
- Recovery time objective
- Recurrent neural network
- Red hat hacker
- Red Screen of Death
- Red team
- RedHack
- Redundant hardware
- Reference architecture
- Regional internet registry
- Relay node
- Relay server
- Remote access server
- Remote access trojan
- Remote attack
- Remote code execution
- Remote computer
- Remote desktop
- Remote desktop protocol
- Remote device
- Remote Direct Memory Access (RDMA)
- Remote infrastructure management
- Remote monitoring and management
- Remote outdoor router
- Remote procedure call
- Remote shell
- Remote user
- Remote wipe
- Repeater
- Replay attack
- Request for Comments
- Reshipping
- Resident virus
- Residual risk
- Resource exhaustion
- Resource Reservation Protocol
- Response time
- Responsible AI
- RESTful API
- Reverse brute-force attack
- Reverse DNS
- Reverse domain name hijacking
- Reverse engineering
- Reverse proxy
- Reverse-path forwarding
- REvil ransomware
- RF jamming
- RFC1918
- RFID blocking
- RFID tag
- Rich internet application
- Right of access
- Right to be informed
- Right to data portability
- Right to erasure
- Right to object
- Right to restrict processing
- Rijndael
- Ring network
- Risk assessment
- Risk modeling
- Risk monitoring
- Risk-based access control
- Risktool
- Riskware
- Robocopy
- Rogue access point
- Rogue device
- Rogue security software
- Rogueware
- Role-Based Access Control
- Rollback
- Root access
- Root Node
- Root of trust
- Root server
- Root user
- Rooting
- Rotating proxy
- Round Robin DNS
- Round-trip time
- Route flapping
- Route poisoning
- Route summarization
- Routing Information Field
- Routing Information Protocol
- Routing loop
- Routing table
- Rowhammer
- RPG
- RPO
- Rubber duck debugging
- Rubber ducky attack
- Runtime system
- Ryuk ransomware
S
- S/Key
- Safe mode
- Salami fraud
- Salting
- Sandbox escape
- Sandbox gaming
- Sandboxing
- SAST
- SCA scanning
- Scale-out storage
- Scam
- Scanning attack
- Scareware
- Scatternet
- Screen lock
- Screen scraping
- Screened subnet firewall
- Script Kiddie
- Scripting language
- Scumware
- Scunthorpe problem
- SECaaS
- Second-party fraud
- Secret key
- Secure boot
- Secure coding
- Secure connection
- Secure cookie
- Secure copy protocol
- Secure destruction
- Secure Electronic Transactions
- Secure enclave
- Secure erase
- Secure File Transfer Protocol
- Secure Hash Algorithm 1
- Secure Hash Algorithm 2
- Secure print
- Secure Shell
- Secure software development lifecycle
- Security Assertion Markup Language
- Security assessment
- Security audit
- Security automation
- Security certificate
- Security Content Automation Protocol
- Security domain
- Security event management
- Security hardening
- Security identifier (SID)
- Security incident and event management
- Security monitoring
- Security operations center
- Security patch
- Security perimeter
- Security policy
- Security software
- Security through obscurity
- Security token
- Segment routing
- Segmentation fault
- Selective backup
- Self-destructing email
- Self-provisioning
- Self-replicating machine
- Self-signed certificate
- Self-sovereign identity
- Semantic network
- Sensitive information
- Sentiment analysis
- Separation of duties
- Sequenced packet exchange
- SerDes
- Serial communication
- Serial port
- Serial server
- Serial Storage Architecture
- Server farm
- Server hosting
- Server Message Block
- Server mirroring
- Server redundancy
- Server software
- Server virtualization
- Server-based computing
- Serverless
- Service broker
- Service control manager
- Service Location Protocol
- Service pack
- Session border controller
- Session Control Protocol
- Session cookie
- Session Description Protocol
- Session fixation attack
- Session hijacking
- Session key
- Session layer
- Session token
- Sextortion
- Shadow copy
- Shadow Password Files
- Shadow profile
- Shadowsocks
- Shamoon
- Shared call appearance
- Shared IP
- Shared proxy
- Shared resources
- Shared Secret
- Shared storage
- Shared-key authentication
- Sharenting
- Sharking
- Shellcode
- Shimming attack
- Shodan search engine
- Short Message Peer-to-Peer
- Shortest path bridging
- Shoulder surfing
- Showstopper bug
- Shylock
- Side-channel attack
- Sidejacking
- Sideloading
- SIGMA rules
- Signaling gateway
- Signals analysis
- Signature verification
- SIM toolkit
- Simple Network Management Protocol (SNMP)
- Simple Network Management Protocol version 2
- Simple network management protocol version 3 (SNMPv3)
- Simple network time protocol
- Single sign-on
- SIP proxy
- Site survey
- Skimming attack
- Smart bulb
- Smart card
- Smart contract
- Smart device
- Smart dust
- Smart grid
- Smart meter
- SMIME
- Smishing
- SMS spoofing
- SMTP proxy
- Smurf attack
- Smurfing
- Snake malware
- Sneaker bot
- Sneakernet
- Snowshoe spam
- SOC as a service
- Social engineering
- Social profiling
- SOCMINT
- Soft copy
- Soft token
- Softlifting
- Software assurance
- Software bug
- Software interrupt
- Software library
- Software package
- Software piracy
- Software RAID
- Software repository
- Software-defined infrastructure
- Software-defined networking
- Software-defined security
- Solid-state drive
- Soundex
- Source code
- Source code analysis tool
- Source code escrow
- Source routing
- Sovereign cloud
- Space shifting
- Spam and Open Relay Blocking System
- Spam blog
- Spam over Internet Telephony
- Spambot
- Spamming
- Spamware
- Spanning Tree Protocol
- Spatial data mining
- Spatial multiplexing
- SPDY Protocol
- Spear phishing
- Spectre vulnerability
- Spectrum Efficiency
- Splinternet
- Split DNS
- Spoofing attack
- Spooling
- SpyEye
- Spyware
- SQL injection
- SQL injection scanner
- SQL injection tool
- SSID
- SSL encryption
- SSL offloading
- SSL stripping attack
- SSL VPN (Secure socket layer virtual private network)
- SSL/TLS proxy
- Stack frame
- Stack smashing
- Staging server
- Stalkerware
- Standalone server
- Standard generalized markup language
- Standard Operating Environment
- STARTTLS
- State
- Stateful firewall
- Stateful inspection
- Stateless firewall
- Stateless protocol
- Static code analysis
- Static data
- Static IP
- Static linking
- Static NAT
- Static routing
- Static URL
- Stealth virus
- Stealth VPN
- Steganalysis
- Steganography
- STEM
- Sticky bit
- Sticky session
- STIX and TAXII
- Storage area network server
- Storage as a Service
- Storage automation
- Storage bottleneck
- Storage capacity
- Storage management
- Storage Management Initiative Specification (SMI-S)
- Storage over Internet Protocol
- Storage performance platform
- Storage provisioning
- Storage virtualization
- Store-and-forward manager
- Storm worm
- Stream cipher
- Stream control transmission protocol
- Streaming network telemetry
- Stress testing
- Strict SSL
- Strong authentication
- Structured prediction
- Structured systems analysis and design method
- Stub network
- STUN
- STUN server
- Subnet
- Subnetting
- Subnetwork Access Protocol
- Substitution cipher
- Subtyping
- Super cookie
- Superkey
- Supernetting
- Superuser
- Supervised machine learning
- Supply chain security
- Suspicious activity report
- svchost.exe
- Switching fabric
- Switching loop
- Sybil attack
- Symbian
- Symmetric key authentication
- SYN flood
- Synchronization
- Synchronous data transmission
- Synchronous optical networking
- Syntax error
- Synthetic data
- Synthetic identity theft
- Sysinternals
- Syslog
- Sysmon
- System bus
- System file
- System integration testing
- System integrity protection
- System migration
- System security
- System software
- System unit
T
- T1 line
- T3 line
- Tabletop exercise
- Tabnabbing
- Tactics, techniques, and procedures
- Taint analysis
- Tampering attack
- Targeted attacks
- Tarpitting
- TCP handshake
- TCP reset attack
- TCP Wrapper
- Teardrop attack
- Tech support scam
- Technical debt
- Telecommunications equipment
- Telnet
- TEMPEST shielding
- Template injection
- Temporal key integrity protocol
- Temporary file
- Terminal Access Controller Access Control System
- Terminal adapter
- Terminal emulation
- Terminal master key
- Terminal node controller
- TeslaCrypt
- Tethering
- Text data mining
- The kill chain
- The Right to Rectification
- Thick client
- Thick provisioning
- Thin client
- Thin provisioning
- Third normal form
- Third-party cookie
- Third-party fraud
- Third-party risk management
- Thrashing
- Threat actor
- Threat assessment
- Threat hunting
- Threat landscape
- Threat monitoring
- Threat vector
- Three-schema architecture
- Throughput
- Thumb drive
- Tiger team
- Time bomb
- Time division duplex
- Time to live
- Time-division multiplexing
- Time-sharing
- Timestomping
- Timing attack
- TLS Handshake
- TOCTOU attack
- Token ring
- Token ring network
- Tokenization
- Tool kit
- Top-down design
- Touch ID
- Tracking cookie
- Tracking pixel
- Traffic shaping
- Training data
- Transactional data
- Transactions per second
- Transceiver
- Transcoding
- TRANSEC
- Transmitter
- Transparent bridge
- Transparent Data Encryption
- Transparent proxy
- Transponder
- Transport layer
- Transposition cipher
- Triangulation fraud
- TrickBot
- Triple DES
- Trivial File Transfer Protocol
- Trojan
- True positives
- Trunk port
- Trust anchor
- Trusted computing
- Trusted computing base
- Trusted data format
- Tunneling
- Tunneling Virus
- Turing-complete
- Twishing
- Two-factor authentication
- Two-phase commit
- Typosquatting
U
- U2F
- Ubiquitous computing
- UEBA
- UEFI
- UEFI rootkit
- Unauthorized access
- Unicast address
- Unified computing system
- Unified storage
- Uniform resource identifier
- Uniform Resource Name
- Unique constraint
- Universally unique identifier
- Unix box
- Unix-to-Unix Copy
- Unknown host
- Unlabeled data
- Unsupervised machine learning
- UPnP
- URL encoding
- URL filtering
- URL hijack
- URL injection
- URL redirection attack
- USB debugging
- USB drop attack
- USB Restricted Mode
- Use-after-free
- Usenet
- User Account Control
- User agent
- User authentication
- User Datagram Protocol
- Username
- UTM network
- UXSS
V
- V2Ray protocol
- Vampire tap
- Van Eck phreaking
- Vanity domain
- vCPE
- Vectored Interrupt
- Vehicle-to-Infrastructure
- Velocity checks
- Vendor email compromise
- Vendor patch
- VeriChip
- Verification
- Vertical Cloud
- Very high-speed digital subscriber line
- Virtual address
- Virtual channel identifier
- Virtual data room
- Virtual database
- Virtual Dedicated Server
- Virtual desktop infrastructure
- Virtual device
- Virtual device driver
- Virtual drive
- Virtual environment
- Virtual File Allocation Table
- Virtual file system
- Virtual firewall
- Virtual hard disk
- Virtual host
- Virtual IP address
- Virtual machine cluster
- Virtual machine configuration
- Virtual machine hyper jumping
- Virtual machine migration
- Virtual machine snapshot
- Virtual Network Adapter
- Virtual networking
- Virtual office
- Virtual path identifier
- Virtual private cloud
- Virtual private data center
- Virtual Private Dial-Up Network
- Virtual private LAN service
- Virtual private server
- Virtual Router Redundancy Protocol
- Virtual routing and forwarding
- Virtual storage area network
- Virtual storage portal
- Virtual switch
- Virtual tape library
- Virtual teletype
- Virtual terminal
- Virtual to physical
- Virtualization security
- Virus signature
- Vishing
- Visitor-based networking
- VLAN hopping
- VLAN tagging
- VLAN trunking protocol
- VLSM
- VM escaping
- VM Sprawl
- vMem
- Voice intrusion prevention system
- Voice over long-term evolution
- Voice over wireless local area network
- Void pointer
- VoIP
- VoIP caller ID
- VoIP gateway
- Volatile data
- Volatile storage
- Volume Boot Record
- Volume Shadow Copy Service
- VPN appliance
- VPN Authentication
- VPN concentrator
- VPN firewall
- VPN gateway
- VPN hardware
- VPN token
- VPNaaS
- vRealize automation
- Vulnerability
- Vulnerability assessment
- Vulnerability disclosure
- Vulnerability management system
- Vulnerability scanner
- VxWorks
W
- Wabbit
- Wake-on-LAN (WoL)
- Walled garden
- WAN
- WAN aggregation
- WAN mini port
- WAN optimizer
- WAN port
- Wangiri fraud
- War driving
- War texting
- Warchalking
- Wardialing
- Warez
- Warm boot
- Warm data
- Warshipping
- Watering hole attack
- Wearable computer
- Web access management
- Web authorization management
- Web beacon
- Web cache poisoning
- Web client
- Web content filtering
- Web content management
- Web filter
- Web mapping
- Web mining
- Web protection
- Web security gateway
- Web server
- Web server security
- Web Service
- Web Services Interoperability Technologies
- Web shell
- Web-based application
- Web-Oriented Architecture
- Web3
- Webhook
- Webpage
- Website architecture
- Website defacement
- Website spoofing
- WEP crack
- Whaling
- Whistleblower
- White hat hacker
- White team
- Whitebox cryptography
- Wi-Fi Direct
- Wi-Fi protected access pre-shared key
- Wi-Fi protected setup
- Wideband Code Division Multiple Access
- WiGig (60 GHz Wi-Fi)
- Wildcard certificate
- Wildcard mask
- Windowing
- Windows Deployment Services
- Windows Registry
- Windows Remote Management
- Windows service
- Wire fraud
- Wire transfer fraud
- Wired equivalent privacy
- Wired equivalent privacy 2
- Wireguard
- Wireless application service provider
- Wireless bridge
- Wireless fidelity
- Wireless intrusion prevention system
- Wireless local area network
- Wireless network security
- Wireless wide area network
- WMN network
- Word size
- Workgroup bridge
- Workstation
- World Wide Name
- WPA key
- WPA-Enterprise
- WPAN
- Write-back cache
X
Y
Z
0-9
Watch it explained: 10 cybersecurity terms you should know
Start your journey into cybersecurity. In this video, our experts explain 10 common cybersecurity terms that you hear frequently online