Page cover

Glossary of Security Terms

Glossary of Security Terms - UniAPT Project


chevron-rightAES-256hashtag

Advanced Encryption Standard with a 256-bit key, a symmetric encryption algorithm widely used for its strength and efficiency.

chevron-rightRSA-4096hashtag

An asymmetric encryption algorithm utilizing a 4096-bit key, known for its high level of security in public-key cryptography.

chevron-rightSSL/TLShashtag

Secure Sockets Layer/Transport Layer Security, protocols for establishing encrypted links between networked computers.

chevron-rightMulti-Factor Authentication (MFA)hashtag

A security system that requires multiple methods of authentication from independent categories of credentials to verify the user's identity.

chevron-rightRole-Based Access Control (RBAC)hashtag

A method of regulating access to computer or network resources based on the roles of individual users.

chevron-rightIntrusion Detection and Prevention Systems (IDPS)hashtag

Tools designed to identify and prevent suspicious activity within a network.

chevron-rightBlockchain Technologyhashtag

A decentralized ledger technology known for its robustness, transparency, and immutability, often used for enhancing security and trust in digital transactions.

chevron-rightGDPRhashtag

General Data Protection Regulation, a legal framework that sets guidelines for the collection and processing of personal information from individuals who live in the European Union.

chevron-rightISO/IEC 27001hashtag

An international standard on how to manage information security, providing requirements for an information security management system (ISMS).

chevron-rightAI-driven Threat Analysishashtag

The use of artificial intelligence to analyze and predict potential security threats, enhancing proactive measures and adaptive responses.

chevron-rightPublic-Key Cryptographyhashtag

A cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

chevron-rightData Obfuscationhashtag

The process of altering data to make it less recognizable and less easily understood, often used to protect sensitive information.

chevron-rightTokenizationhashtag

The substitution of sensitive data with a non-sensitive equivalent, known as a token, which has no extrinsic or exploitable meaning or value.

chevron-rightCybersecurity Audithashtag

A comprehensive review and analysis of an organization's IT infrastructure, policies, and operations to identify vulnerabilities and ensure compliance with security standards.

chevron-rightDecentralizationhashtag

The distribution of functions and powers away from a central location or authority, commonly referenced in blockchain technology for enhancing security and reducing single points of failure.

chevron-rightImmutable Ledgerhashtag

A ledger that cannot be altered or deleted, a key feature of blockchain technology ensuring data integrity and trustworthiness.

chevron-rightCompliance Standardshashtag

Set guidelines and requirements that organizations must adhere to, ensuring best practices in security and data protection are followed.

chevron-rightPredictive Threat Analysishashtag

The use of advanced algorithms and data analytics to predict potential security threats, allowing for preemptive action and enhanced security protocols.

chevron-rightEndpoint Securityhashtag

Security measures focused on protecting devices (endpoints) in a network, such as computers and mobile devices, from malicious activities and threats.

chevron-rightCryptography Hash Functionshashtag

Algorithms used to convert data into a fixed-size string of characters, which is typically a hash code. Used in ensuring data integrity and in various security applications.

chevron-rightSecure Code Practiceshashtag

Guidelines and methodologies for writing software code that is resistant to vulnerabilities and attacks, crucial in maintaining system security.

chevron-rightNetwork Segmentationhashtag

Dividing a computer network into smaller parts to limit access to sensitive information and improve performance and security.

chevron-rightPhishing Detectionhashtag

Technologies and methodologies used to identify attempts to acquire sensitive information by disguising as a trustworthy entity in digital communication.

chevron-rightPenetration Testinghashtag

Simulated cyber attacks on a computer system, performed to evaluate the security of the system.

chevron-rightIncident Response Planhashtag

A structured approach for handling and managing the aftermath of a security breach or cyber attack, with the aim of limiting damage and reducing recovery time and costs.

chevron-rightZero Trust Security Modelhashtag

A security model that requires strict identity verification for every person and device trying to access resources, regardless of whether they are within or outside of the network perimeter.

chevron-rightVulnerability Assessmenthashtag

The process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.

chevron-rightSecure Shell (SSH)hashtag

A cryptographic network protocol used for operating network services securely over an unsecured network.

chevron-rightDigital Signaturehashtag

A mathematical technique used to validate the authenticity and integrity of a message, software, or digital document.

chevron-rightFirewallhashtag

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

chevron-rightData Loss Prevention (DLP)hashtag

Strategies and tools used to prevent data loss or unauthorized access and exfiltration of sensitive information.

chevron-rightApplication Layer Securityhashtag

Security measures applied to data and application-specific protocols, like HTTP and DNS, to prevent data breaches at the application level of an IT system.

chevron-rightContent Disarm & Reconstruction (CDR)hashtag

A security technology that removes potentially malicious code from files to prevent cyber attacks.

chevron-rightIdentity and Access Management (IAM)hashtag

Frameworks and technologies used to ensure that the right individuals access the appropriate resources at the right times and for the right reasons.

chevron-rightRisk Management Framework (RMF)hashtag

A structured approach for identifying, assessing, managing, and mitigating risks to an organization’s assets and data.

chevron-rightSecurity Information and Event Management (SIEM)hashtag

Solutions that provide real-time analysis of security alerts generated by applications and network hardware.

chevron-rightHardware Security Modules (HSMs)hashtag

Physical devices designed to safeguard digital keys for strong authentication and provide crypto-processing.

chevron-rightAnomaly Detectionhashtag

The process of identifying unusual patterns or behaviors in network traffic and data, which could indicate security threats.

chevron-rightSecurity Assertion Markup Language (SAML)hashtag

An open standard for exchanging authentication and authorization data between parties, specifically between an identity provider and a service provider.

chevron-rightVirtual Private Network (VPN)hashtag

A technology that creates a safe and encrypted connection over a less secure network, such as the internet.

chevron-rightSecurity Posture Assessmenthashtag

The process of reviewing and analyzing the current security state of an information system or network.

chevron-rightCross-Site Scripting (XSS)hashtag

A security vulnerability typically found in web applications, allowing attackers to inject client-side scripts into web pages viewed by other users.

chevron-rightSecurity Orchestration, Automation, and Response (SOAR)hashtag

Technologies that enable organizations to collect inputs monitored by the security operations team.

chevron-rightMicrosegmentationhashtag

A security technique that divides data centers into distinct security segments down to the individual workload level and then defines security controls and delivers services for each unique segment.

chevron-rightContainer Securityhashtag

Security measures and protocols designed to protect the integrity, confidentiality, and availability of containers and their contents.

chevron-rightIntrusion Prevention Systems (IPS)hashtag

Network security appliances that monitor network and/or system activities for malicious activities.

chevron-rightRoot Cause Analysishashtag

The process of discovering the underlying causes of security breaches or failures.

chevron-rightData Sovereigntyhashtag

The concept that digital data is subject to the laws of the country in which it is located or stored.

chevron-rightBehavioral Analyticshashtag

The use of data analysis tools to detect abnormal behaviors that might indicate security threats.

chevron-rightCloud Access Security Broker (CASB)hashtag

Security policy enforcement points placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies.

chevron-rightEndpoint Detection and Response (EDR)hashtag

Security solutions focused on detecting, investigating, and mitigating suspicious activities on hosts and endpoints.

chevron-rightAdvanced Persistent Threats (APTs)hashtag

Prolonged and targeted cyberattacks in which an intruder gains access to a network and remains undetected for an extended period.

chevron-rightCryptography Salthashtag

Random data that is used as an additional input to a one-way function that hashes data, a password, or passphrase.

chevron-rightWhitelistinghashtag

A cybersecurity strategy where a system blocks all applications or traffic except those explicitly allowed.


Last updated