<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/keepalive/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/keepalive/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/kerberos/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="de" href="https://nordvpn.com/de/cybersecurity/glossary/kerberos/"/>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/kerberos/"/>
    <xhtml:link rel="alternate" hreflang="fr" href="https://nordvpn.com/fr/cybersecurity/glossary/kerberos/"/>
    <xhtml:link rel="alternate" hreflang="ja" href="https://nordvpn.com/ja/cybersecurity/glossary/kerberos/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/kerckhoffs-principle/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/kerckhoffs-principle/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/kernel-based-virtual-machine/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/kernel-based-virtual-machine/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/kernel/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/kernel/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/key-based-routing/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/key-based-routing/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/key-derivation-function/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/key-derivation-function/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/key-distribution-center/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/key-distribution-center/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/key-encryption-key/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/key-encryption-key/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/key-escrow/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/key-escrow/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/key-exchange/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/key-exchange/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/key-fob/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/key-fob/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/key-length/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/key-length/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/key-policy-attribute-based-encryption/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/key-policy-attribute-based-encryption/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/key-risk-indicator/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/key-risk-indicator/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/key-rotation/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/key-rotation/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/key-schedule/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/key-schedule/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/keyboard-buffer/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/keyboard-buffer/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/keychain/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/keychain/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/keylogger/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/keylogger/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/keypunch-machine/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/keypunch-machine/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/killware/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/killware/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/kloc/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/kloc/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/knowledge-based-system/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/knowledge-based-system/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/kovter/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/kovter/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/krack-attack/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/krack-attack/"/>
  </url>
  <url>
    <loc>https://nordvpn.com/cybersecurity/glossary/kyc-verification/</loc>
    <lastmod>2025-12-10</lastmod>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/cybersecurity/glossary/kyc-verification/"/>
  </url>
</urlset>
