111 terms
Security concept terms
The security concept terms include methods and techniques used to safeguard online systems from cyber threats. In this glossary you’ll find definitions of the most common cybersecurity tools, testing methods, and security principles.
Vulnerability scanning
Vulnerability scanning is an automated process used to identify potential security weaknesses in computer networks, systems, and applications.
Broadcast flag
A broadcast flag was a digital signal used in TV broadcasts to stop unauthorized recording and sharing of high-quality digital content.
Single sign-on
Single sign-on (SSO) refers to an authentication process that allows a user to access multiple applications with one set of login credentials, such as a username and password.
Security Assertion Markup Language
Security assertion markup language (or SAML for short) is a way for different systems to securely exchange authentication and authorization information.
YubiKey
YubiKey is a hardware security token used for authentication in multi-factor authentication.
Wardialing
Wardialing is the practice of using technology to automatically scan a range of phone numbers in order to reveal connected devices such as computers, modems, and office appliances.
Trusted computing base
The trusted computing base (TCB) is a set of components in a computer system that are critical to a system's security.
Touch ID
Touch ID is a fingerprint recognition feature designed and released by Apple Inc., first introduced for the iPhone 5 and later incorporated in other Apple devices like iPads and Macbooks.
TEMPEST shielding
TEMPEST shielding is both the act and the material that stops electromagnetic emanations from transferring to equipment and reaching sensitive information.
TCP Wrapper
TCP Wrapper is a security tool that controls access to network services based on the source of incoming connections.
System security
System security is the practice of protecting information systems from unauthorized access, modification, or destruction.
Steganography
Steganography is a method or technique that both cybercriminals and ordinary organizations use to hide information within regular files or messages.
SQL injection scanner
SQL injection scanner refers to a security tool designed to analyze an API, application, or website and evaluate if they are vulnerable to a SQL injection attack.
Software-defined security
Software-defined security is a model that implements and controls protective measures through software instead of physical hardware.
Soft token
A software token, often called a soft token, is a security tool in the form of an app on devices like phones or computers.
Smart card
A smart card is a physical card with an embedded integrated circuit (IC) chip that has the same function as a security token.
Shodan search engine
The Shodan search engine, also known as shodan.io or simply shodan, is a search engine specifically designed to discover and index devices connected to the internet, such as servers, routers, webcams, and other Internet of Things (IoT) devices.
Security token
A security token is a physical peripheral required to access a system, usually as part of multi-factor authentication (MFA).
Security through obscurity
Security through obscurity refers to the practice of securing systems by making the system or its underlying implementation hidden.
Security software
Security software refers to computer programs that aim to protect data, systems, and networks from unauthorized access, damage, theft, or other security threats.
Security patch
A security patch, known as a software update or hotfix, represents a software module crafted to resolve vulnerabilities, bugs, or inconsistencies in existing software infrastructure.
Security Content Automation Protocol
The Security Content Automation Protocol is a safety framework that automates tasks to enhance system protection.
Scunthorpe problem
A Scunthorpe problem is a type of content filtering issue that occurs when a word or phrase is mistakenly blocked or flagged as inappropriate due to an unintentional presence of a substring with offensive meaning.
Sandboxing
Sandboxing is a security technique that isolates running programs, usually in order to test or analyze them.
S/Key
S/Key is a security authentication system that enhances the protection of user accounts and sensitive information.
Risktool
Risktool refers to a risk management or cybersecurity tool used to identify, assess, and manage risks within an organization or system.
RFID blocking
RFID blocking is the process of using special wallets, sleeves, passport covers, and other objects that limit RFID scanning.
Remote wipe
A Remote wipe is a security feature that lets a user remotely delete information from a device.
Privileged access workstation
A privileged access workstation (PAW) is a dedicated computing environment that is used to secure virtual or physical workstations that handle sensitive tasks and data from cyberattacks and other threats.
Platform security
Platform security is a security process used to ensure the safety of a computing platform, including its architecture, software, and procedures.
Passive biometrics
Passive biometrics recognizes people by their natural behaviors.
Parental controls
Parental controls are features or software that enable you to limit and monitor what another person does or watches online and track their web browsing history.
Obfuscation
Obfuscation is the purposeful concealment or distortion of computer code to protect it from human and machine tampering.
Network sandboxing
Network sandboxing, sometimes called network security sandboxing or network traffic sandboxing, is a safeguarding method that segregates potentially dangerous network traffic within a virtual space, inhibiting it from making contact with the primary network.
Network intrusion protection system
A network intrusion protection system is hardware or software measures to protect networks from cyber attacks.
Metasploit
Metasploit is a popular open-source penetration testing framework used by cybersecurity professionals and ethical hackers to assess network and system vulnerabilities.
Managed file transfer
Managed file transfer (MFT) refers to a type of software or service that provides a secure and controlled way of transferring files from one computer to another over a network.
Man trap
A man trap is a special security area between the protected premises and the outside world.
Logical access
Logical access refers to using software-based security measures to manage user access to an app, computer system, or network.
Least privilege access
Least privilege access is a cybersecurity principle that restricts user access rights to the minimum necessary for performing tasks.
Keychain
Keychain is free password management software for Mac OS 8.6+ and iOS 7+ devices.
Key fob
A key fob is a small device programmed to provide access to a physical object (e.g., a computer system, car, restricted room or area, network service, or mobile device).
Key distribution center
A key distribution center (KDC) is a network component that helps control who can access what in a network.
IT security
IT security (or information technology security) is a set of measures and practices that organizations use to keep digital information safe from various risks and threats.
Integrity checking
Integrity checking is testing software and files to check if they've been tampered with.
Information hiding
Information hiding refers to the process of limiting the user's access to certain features to prevent changes or modifications.
Information assurance
Information assurance is an umbrella term for the measures that preserve data confidentiality, integrity, and availability within an organization or system.
IDE
Regarding cybersecurity, IDE, or 'Integrated Development Environment', could be defined as a software platform that gives developers different tools and applications that facilitate the whole software development process, from coding, testing, debugging, and deployment.
IAM authentication
IAM authentication, short for identity and access management authentication, is a security process that ensures only authorized entities can access certain network resources.
Hybrid active directory
A hybrid active directory (AD) is a combination of on-premises AD and cloud-based Azure AD, used to manage and authenticate users, devices, and resources across both environments.
Hosts file
A hosts file is a computer file that maps hostnames to IP addresses, which organizations sometimes need to edit to block some websites or malicious activities overall.
Host intrusion prevention system
A host intrusion prevention system (HIPS) is software that detects and blocks malicious activities.
Hexdump
Hexdump is a tool that shows data from a file or data source in an easy-to-read way.
Heuristic analysis
Heuristic analysis is a technique for detecting unknown malware (or new variations of known malware) based on behavioral patterns.
Hash list
A hash list is a list of hash values corresponding to individual data pieces.
Fuzz testing
Fuzz testing is an automated software testing method that bombards a program with invalid, unexpected, or random inputs.
Freeware
Freeware is proprietary software that is released for free to the public.
File signature
File signature is a specific sequence of bytes in a file enabling programs to identify the file type without relying on the file extension.
False rejection
A false rejection is when an authentication system denies access to someone who should be allowed in.
False acceptance ratio
False acceptance ratio (FAR) is a biometric security metric that measures the rate at which a biometric authentication system incorrectly accepts an unauthorized user's attempt as valid.
Endpoint protection platform
An Endpoint Protection Platform is a solution that secures network endpoints, such as laptops and mobile devices, against cyber threats.
Emission security
Emission security (EMSEC) is the protection of classified, sensitive, or proprietary information from being accessed by unauthorized parties through electronic emissions from systems or devices.
Electronic signature
An electronic signature is a digital version of a person’s signature that they can use to authenticate and validate electronic documents or transactions.
Digital watermarking
Digital watermarking is the use of a marker discreetly embedded in a digital medium, such as music, video, or a picture, to allow individuals to determine the source of the copyright or the owner of the copyright.
Digest authentication
Digest authentication is a method used to verify the identity of a user or device requesting access to a secure system, such as a website or network.
Desktop Administration
In terms of cybersecurity, “Desktop Administration” is the practice of managing the security of all individual desktop computers in the organization’s network.
Data transfer
Data transfer consists of gathering, replicating, and exchanging large data files between systems or organizations in the form of bits and bytes.
Data loss prevention
Data loss prevention (DLP) is a strategy for protecting sensitive data from being lost, stolen, or exposed to unauthorized users.
Data integrity
Data integrity refers to the accuracy, completeness, and consistency of data over its entire life cycle, from creation or acquisition to deletion.
Data in use
Data in use refers to information that's being processed by a computer.
Data hiding
Data hiding is the practice of concealing information within other data, structures, or media to prevent unauthorized users from detecting or accessing the information.
Data-centric security
Data-centric security focuses on securing the data itself rather than the network or system it resides in.
Data access
Data access is the ability of authorized users or apps to view or retrieve data from systems or databases.
DAST
Dynamic application security testing (DAST) is a process that identifies security vulnerabilities in a running application.
Cybersecurity mesh
A cybersecurity mesh is an adaptable approach to cybersecurity, focusing on creating a more flexible and interconnected security infrastructure.
Cyber defense
Cyber defense refers to the practices, strategies, and technologies companies and individuals use to protect their systems from cyber threats.
Cutting-edge technology
In a broader context, cutting-edge technology applies to the IT sector and describes the development of technological devices, software, or techniques.
Credential store
A credential store is a secure digital repository that functions as a library of security data.
Copy protection
Copy protection is the process of preventing digital or analog content from being copied without the appropriate authorization to any other device on the same network in the realm of data security.
Container scanning
Container scanning, also known as container image scanning, refers to examining and reviewing container images for potential vulnerabilities, threats, and inconsistencies in their code.
Code signing
Code signing refers to the process of digitally signing software in order to verify its authenticity and integrity.
Code morphing
Code morphing is a software obfuscation technique that protects code from reverse engineering, analysis, and cracking by constantly changing its structure.
Code generator
A code generator is software that automates the process of generating source code based on input data or predefined templates.
Cloud sandboxing
Cloud sandboxing is a security technique that isolates a potentially malicious code execution in a virtual environment, preventing it from interacting with the underlying system.
CCTV
CCTV is a TV system where signals are monitored instead of broadcasted, typically for security reasons.
Browser wars
Browser wars refer to the competition among web browser companies to gain dominance in the market by creating faster, more user-friendly, and feature-rich browsers.
Boundary Protection
In the field of cybersecurity, boundary protection refers to technologies and sets of measures employed to secure the whole network’s perimeter by preventing unauthorized access from various external sources.
Blocklist
A blocklist is a security tool that identifies and prevents unwanted or harmful entities, such as IP addresses, websites, applications, or email addresses, from accessing a network or system.
Biometric security
Biometric security is a way of identification using biometric data.
Biometric engine
Biometric engines work by processing and analyzing unique physical or behavioral characteristics of people to verify their identity or authenticate their access to services and devices.
Biometric device
A biometric device uses measurements of a person's unique biological characteristics (such as a fingerprint) to accomplish tasks like user authentication and the recording of health and fitness data.
Biometric data
Biometric data is information about a person that can be used to identify them based on their unique physical features.
Biometric authentication
Biometric authentication is an authentication method that uses biometric data to verify a user’s identity.
Binary format
The binary format is a way of representing data using only two digits, usually 0 and 1.
Biba Model
The Biba Model is a set of rules for a computer system that helps keep information safe and accurate.
Bespoke Software
In general, Bespoke Software, also known as custom software, is software developed and designed for a specific purpose, organization, functionality, or individual user.
Application allow-listing
Application allow-listing is a list of applications that are allowed to exist or perform any actions on a device.
Application access management
Application access management, often abbreviated as AAM, manages and secures user access to applications within an organization.
Antivirus
Antivirus is cybersecurity software designed to prevent, detect, and remove viruses from computers.
Antivirus scanner
An antivirus scanner is a cybersecurity tool specifically tasked with identifying viruses on a device.
Anti-spyware
Anti-spyware is a cybersecurity tool designed to detect and remove spyware (malware that is secretly installed on a device to collect data about the user).
Anti-malware
Anti-malware is the umbrella term for software and policies designed to protect systems from malware (malicious software like computer viruses).
Allowlisting
Allowlisting is a security process in which users can only access a network, device, or system if they’re on a pre-approved list.
Allowlist
An allowlist is a security measure that specifies a set of trusted entities, such as IP addresses, websites, applications, or email addresses, that are granted permission to access a particular system or network.
Air gap
An air gap is a security measure that involves isolating a computer or computer system and preventing it from connecting wirelessly and/or physically to other computers, devices, or unsecured networks, such as the internet or a local area network.
Advanced penetration testing
Advanced penetration testing is a type of cybersecurity test that can help discover and get rid of vulnerabilities and security weaknesses in IT systems.
Adaptive authentication
Adaptive authentication is an authentication method or system that organizations use to verify user identity and authorization levels.
Activation code
Activation code refers to a code used for user authentication.
Access management
Access management is the branch of cybersecurity dealing with software, hardware, and policies that control user access to computer systems.
The importance of security concepts terminology
Knowing the basic security concept terms and their definitions is a gateway to improving your online security. While these may be the basics of cybersecurity, learning and understanding the common security concept terms can make you more vigilant when browsing online.
Boost your knowledge
The glossary contains detailed explanations on how basic cybersecurity concepts work.
Understand the ins and outs of cybersecurity
Learning the definitions of the security concepts will improve your understanding on how to correctly fortify your online systems.
Bring peace of mind into your online life
Basic understanding of security concept terms can reduce the risk of online threats, providing a safer browsing experience.
Online security starts with a click.
Stay safe with the world’s leading VPN
Explore related glossary categories
Can’t find an answer to your question?
Ask the questions that matter to you — and get answers from our cybersecurity experts.