抱歉,该网页上的内容不能以您选择的语言提供。
·
Cybersecurity glossary
Browse thousands of cybersecurity definitions
A
- Address verification service
- Access Control List
- Asymmetric Cyberattack
- A core router
- Autorun worm
- Autonomous system
- Autonomous intelligence
- Autonomic network
- Autonomic computing
- Automation platform
- Automatic repeat request
- Automatic private IP addressing
- Automatic Location Identification
- Automatic content recognition
- Auto-negotiation
- Auto attendant
- Authorized push payment fraud
- Authentication server
- Authentication header
- Authentication bypass vulnerability
- Augmented intelligence
- Audit trail
- Audit log
- Auction fraud
- Attribute value pair
- Attribute-based encryption
- Attack taxonomy
- Attack surface
- Attack surface management
- Attack signature
- Atomicity, Consistency, Isolation, Durability (ACID)
- ATM skimming
- ATM jackpotting
- Asynchronous transmission
- Asynchronous Transfer Mode
- Assembler
- ASLR
- ASCII
- Artificial intelligence
- Artificial general intelligence
- ARPANET
- Armored virus
- ARM processor
- Arithmetic logic unit
- Area border router
- ARCnet
- Arbitrary code execution
- Application virtualization
- Application streaming
- Application sprawl
- Application service provider
- Application server
- Application programming interface
- Application program
- Application performance monitoring
- Application management
- Application log
- Application layer
- Application infrastructure provider (AIP)
- Application hosting
- Application gateway
- Application firewall
- Application deployment
- Application delivery
- Application delivery network
- Application delivery controller
- Application clustering
- Application client
- Application-centric infrastructure
- Application base
- Application awareness
- Application-aware networking
- Application allow-listing
- Application access management
- Application acceleration
- AppleTalk
- AppleTalk Session Protocol
- AppleTalk Data Stream Protocol
- Apple Filing Protocol
- API attack
- Anycast DNS
- Antivirus
- Antivirus scanner
- Anti-spyware
- Anti-spam
- Anti-phishing service
- Anti-malware
- Anti-fraud system
- Answer-seizure ratio
- Anonymous hackers
- Anonymous call rejection
- Anonymizer
- Anomaly-based detection
- Anna Kournikova virus
- Angler phishing
- Android package kit
- Analog computer
- Alternative routing
- Alphanumeric password
- AlphaGo
- Allowlisting
- Allowlist
- Alert fatigue
- Air gap
- AIOps
- AI TRiSM
- AI as a service
- AFTS
- AES encryption
- Adversary group naming
- Adversarial machine learning
- Advanced threat detection
- Advanced persistent threat
- Advanced penetration testing
- Advanced metering infrastructure
- Advanced Message Queuing Protocol
- Advanced evasion technique
- Administrative privileges
- ADFGVX cipher
- Address space
- Address resolution protocol cache
- Adaptive authentication
- Ad hoc on-demand distance vector
- Ad-Hoc Mode
- ActiveX
- Active defense
- Active content
- Active attack
- Activation code
- Account takeover
- Account hijacking
- Account compromise
- Access Point Name
- Access management
- Access layer
- Access control system
- Access control entry
- Acceptable use policy
- Accelerated Mobile Pages
- ABEND
- Abandonware
- Adware
- A value-added network
B
- Binary File Transfer
- Bandwidth Analyzer
- Body Area Network
- Bare Metal Restore
- Business continuity and disaster recovery
- B2 security
- Broadcast flag
- Browser modifier
- Broadband wireless access
- B1 security
- Bohr bug
- Byzantine fault tolerance
- Byte order mark
- Business process engine
- Business email compromise
- Bus mastering
- Bundle protocol
- Bullet camera
- Bulk data transfer
- Bug fix
- Buffer overflow attack
- Brute-force attack
- Browser wars
- Browser sandboxing
- Browser isolation
- Browser hijacking
- Browser hijacker
- Browser caching
- Broken authentication attack
- Broken access control
- Broadcast storm
- Broadcast domain
- Broadcast address
- Broadband router
- Broadband remote access server
- Broadband over power line
- Broad network access
- Bridge protocol data unit
- Bridge mode
- Bridge connection
- Bricking
- Boyce-Codd normal form
- Boundary Protection
- Bounced email
- Botnet
- Bot mitigation
- Bot herder
- Bootstrap protocol
- Bootloader
- Bootkit
- Booter
- Boot sequence
- Boot sector virus
- Boolean logic
- Boltzmann machine
- Bogon filtering
- Bluetooth
- Bluesnarfing
- Bluejacking
- Bluebugging
- BlueBorne
- Blue team
- Blue Screen of Death
- Blue Pill attack
- Blue hat hacker
- Blocklist
- Blockchain technology
- Block Storage
- Block size
- Block cipher
- Blob storage
- Bloatware
- Blended threat
- Bladabindi
- Blackholing
- BlackEnergy
- Black hat hacker
- Black box attack
- BitLocker
- Bit rot
- Bit rate
- Bit-flipping attack
- Bit error rate
- Birthday attack
- BIOS rootkit
- BIOS password
- Biometric spoofing
- Biometric security
- Biometric engine
- Biometric device
- Biometric data
- Biometric authentication
- Binary format
- Binary file
- Binary code analysis
- BIN attack
- Big data as a service
- Biba Model
- BGP
- Bespoke Software
- Behavior monitoring
- Bearer protocol
- Beaconing
- Bayesian filter
- Baud rate
- Batch Processing
- Batch file
- Bastion host
- Basic Input/Output system (BIOS)
- Baselining
- Baseline configuration
- Baseboard management controller
- Base64
- Base address
- Bare-metal provisioning
- Bare metal environment
- Banker Trojan
- Bank Drop
- Bandwidth
- Bandwidth on demand
- Bandwidth meter
- Bak file
- Baiting
- Bait app
- BadUSB
- Bad Sector
- BACnet
- Backwards compatibility
- Backup (n.)
- Backup as a Service
- Backtracking
- Backpropagation
- Backporting
- Backout plan
- Backhaul
- Backdoor
- Back-hack
C
- CERT record
- Certificate authority
- Child partition
- Cloud application portability
- CPU interrupt code
- Certified Secure Software Lifecycle Professional
- Cloud sprawl
- Cloud spanning
- Cloud automation
- Crypto anarchism
- Cloud printing
- Context-aware security
- Content spoofing
- Cloud orchestration
- Cloud Workload Protection Platform
- Confidential Computing
- Circuit-level gateway
- Cyclic redundancy check
- Cyberwarrior
- Cyberthreat
- Cyberterrorism
- Cyberstalking
- Cybersquatting
- Cyberspace
- Cybersecurity mesh
- Cybersecurity Maturity Model Certification
- Cybersecurity framework
- Cybersecurity ecosystem
- Cyberlocker
- Cyberlibel
- Cyberlaw
- Cybercriminal
- Cybercrime
- Cyberbullying
- Cyberattack
- Cyber warfare
- Cyber vigilantism
- Cyber vandalism
- Cyber threat hunting
- Cyber resiliency
- Cyber range
- Cyber privateering
- Cyber-physical attack
- Cyber Pearl Harbor
- Cyber operations
- Cyber insurance
- Cyber incident
- Cyber incident response plan
- Cyber hygiene
- Cyber harassment
- Cyber forensics
- Cyber extortion
- Cyber espionage
- Cyber defense
- Cyber begging
- Cyber attribution
- cXML
- CVSS
- CVE
- Cutting-edge technology
- Cut-through switching
- Customer edge router
- Curation
- CTB locker
- CSIRT
- CSCW
- Cryptowall
- Cryptovirus
- Cryptovirology
- Cryptosystem
- Cryptolocker ransomware
- Cryptographic protocol
- Cryptographic key
- Cryptographic hash function
- Cryptographic algorithm
- Crypto shredding
- Crypto malware
- CryptBot
- Cryptanalysis
- Crossover cable
- Cross-site request forgery
- Cross-platform
- Cross-browser fingerprinting
- CRLF injection
- Critical security parameter
- Critical infrastructure and key resources
- Creepware
- Creeper virus
- Credentials
- Credential stuffing
- Credential store
- Credential harvesting
- Cracker
- CPU utilization
- CPU contention
- Covert channel
- Country code top-level domain
- CoreBot
- Core switch
- Copy protection
- Copy-paste compromise
- Cookie theft
- Cookie stuffing
- Cookie hash
- Conversational artificial intelligence
- Conversation hijacking
- Converged infrastructure
- Controller Area Network
- Controlled cryptographic item (CCI)
- Control unit
- Control structure
- Control plane
- Control network
- Control framework
- Control bus
- Continuous integration and continuous deployment
- Contextual advertising
- Context Delivery Architecture
- Content security policy
- Content delivery network
- Container technology
- Container scanning
- Container isolation
- Container breakout
- Consumer electronics
- Connectionless protocol
- Connection-oriented protocol
- Connection admission control
- Configuration management database
- Configuration file
- Conficker worm
- Concurrency control
- COMSEC
- Computer worm
- Computer virus
- Computer telephony integration
- Computer system
- Computer network operations
- Computer network exploitation
- Computer network defense
- Computer network attack
- Computer imaging
- Computer forensics
- Computer cluster
- Computer architecture
- Computer-aided software testing (CAST)
- Computer aided software engineering (CASE)
- Compute security
- Compute platforms
- Compressed file
- Composite key
- Compiler
- Compatibility
- Compartmented security mode
- Communications system
- Communication protocol
- Common Language Runtime
- Common Internet File System
- Common business-oriented language
- Common address redundancy protocol
- Commodity computing
- Committed information rate
- Command-line interface
- Command injection
- Collision
- Collision domain
- Cold standby
- Cold data
- Cold boot
- Cold boot attack
- Cognitive technology
- Cognitive password
- Cognitive computing
- Code signing
- Code morphing
- Code monkey
- Code management
- Code injection
- Code generator
- Code bloat
- Code Access Security
- Cobweb site
- Co-location
- Co-browsing
- CNAPP
- Cluster controller
- Cluster analysis
- CLSID
- Cloudware
- CloudTrust protocol
- Cloud VPS
- Cloud VPN
- Cloud storage gateway
- Cloud server
- Cloud security posture management
- Cloud sandboxing
- Cloud provisioning
- Cloud operations management
- Cloud operating system
- Cloud networking
- Cloud forensics
- Cloud encryption gateway
- Cloud enablement
- Cloud elasticity
- Cloud database
- Cloud data platform
- Cloud containers
- Cloud communications
- Cloud cartography
- Cloud-based supercomputing
- Cloud attack
- Cloud as a service
- Cloud archiving
- Cloud architecture
- Cloud advertising
- Clop ransomware
- Clone phishing
- Clocking
- Cloaking
- Clipper chip
- Clipboard hijacking attack
- Client
- Client-server network
- Client access license
- Clicktivism
- Clickjacking
- Clean install
- Clean fraud
- Clean boot
- Class of Service
- Class E IP address
- Class D IP address
- Class C IP address
- Class-based queuing
- Class B IP address
- Class A IP address
- Citrix server
- Cisco IOS
- Circuit-level gateway
- Ciphertext
- Ciphertext-policy attribute-based encryption
- Cipher suite
- CIEM
- CIDR
- CIA triad
- Chosen plaintext attack
- Choke packet
- Chkdsk
- Chipset
- Chernobyl packet
- Checksum
- Chatty protocol
- Chargeware
- Character set
- Char
- Challenge-response authentication
- Challenge Handshake Authentication Protocol
- Chaffing and winnowing
- ChaCha20
- CGNAT
- Certificate pinning
- Certificate management
- Certificate-based authentication
- Certificate authority server
- Cerber ransomware
- CEO fraud
- Centralized computing
- Central outdoor router
- Cellular network
- Cell relay
- CCTV
- C&C server
- Catfishing
- Carrier Ethernet
- Carding
- Cardinality
- Card testing
- Card purchase authorization
- Carberp
- Captive portal
- CAPTCHA
- Canonical name
- Canonical data model
- Canary token
- Campus area network
- Camfecting
- Call stack
- Call detail record
- Caesar encryption
- Caching server
- Caching proxy
- Cache server
- Cache miss
- Cache invalidation
- Cache hit
- Cache coherence
- C-SCRM
- Certified Information Systems Security Professional
D
- Demand Assigned Multiple Access (DAMA)
- Domain tasting
- Domain drop catching
- DiskPart
- Data de-identification
- Dyreza
- Dynamic website
- Dynamic virtual private network
- Dynamic URL
- Dynamic ports
- Dynamic library
- Dynamic IP
- Dynamic DNS
- Dynamic data masking
- Dynamic analysis
- Dwell time
- Duqu
- Dumpster diving attack
- Dumb terminal
- Dual-stack network
- Dual-ring topology
- Dual-homed host
- DSLAM
- Dropper
- Drop address
- DRM-free
- Drive-by download
- Drive-by attack
- Dridex
- DrDoS attack
- Doxxing
- Downloader trojan
- Double tagging
- Dotted decimal notation
- Dongle
- Donationware
- DomainKeys Identified Mail
- Domain
- Domain spoofing
- Domain-specific language
- Domain shadowing
- Domain Name System parking
- Domain hijacking
- Domain fluxing
- Domain controller
- Domain admin
- Dolphin attack
- Document versioning
- Docker
- DNSSEC
- DNS zone
- DNS zone transfer
- DNS TXT record
- DNS tunneling
- DNS TTL
- DNS SRV record
- DNS SPF record
- DNS SOA record
- DNS sinkhole
- DNS server
- DNS resolution
- DNS reflection attack
- DNS redundancy
- DNS redirection
- DNS record
- DNS rebinding attack
- DNS query
- DNS PTR record
- DNS proxy
- DNS propagation
- DNS port
- DNS over HTTPS
- DNS NS record
- DNS MX record
- DNS load balancing
- DNS hosting
- DNS hijacking
- DNS flushing
- DNS firewall
- DNS filtering
- DNS failover
- DNS encryption
- DNS CNAME record
- DNS client
- DNS cache
- DNS blocking
- DNS-based Blackhole List
- DNS attack
- DNS allowlist
- DNS AAAA record
- DNS A record
- DLL injection
- DLL hijacking
- DLL Hell
- Diverse Routing
- Distributed transaction
- Distributed system
- Distributed network
- Distributed firewalls
- Distributed file system
- Distributed cloud
- Distorting proxy
- Distance vector
- Distance-vector routing protocol
- Distance vector multicast routing protocol
- Disk-to-disk-to-cloud
- Disk striping
- Disk formatting
- Disk defragmentation
- Disk cloning
- Disk cache
- Discretionary Access Control
- Discoverable mode
- Disaster recovery as a service
- Disassociation attack
- Disaggregated storage
- Dirty bit
- Directory traversal attack
- Directory services
- Direct memory access
- Direct connection
- Direct access storage device
- Digitization
- Digitalization
- Digital watermarking
- Digital twin
- Digital trust
- Digital Transmission Content Protection Over Internet Protocol
- Digital switch
- Digital signature algorithm
- Digital piracy
- Digital optimization
- Digital information
- Digital identity
- Digital footprint
- Digital fingerprint
- Digital exhaust
- Digital envelope
- Digital dystopia
- Digital data
- Digital certificate
- Digest authentication
- Diffusing Update Algorithm
- Diffie-Hellman
- Differential privacy
- Differential fault analysis attack
- Dictionary attack
- Dialog box
- Dial-on-demand routing
- DHCP
- DHCP proxy
- DHCP attack
- DFIR
- DevOps
- Device hash
- Device driver
- Device-agnostic
- Development server
- Desktop management interface
- Desktop as a Service
- Desktop Administration
- Deprovisioning
- Deprecation
- Deperimeterization
- Deobfuscate
- Demilitarized zone
- Delta rule
- Delay-tolerant network
- Deflection routing
- Defense In-Depth
- Default password
- Default gateway
- Default-free zone
- Deepfake
- Dedicated server
- Dedicated line
- Dedicated IP
- Decryption
- Decoding
- Declassification
- Deception technology
- Decentralized identity
- Decapsulation
- Debug symbols
- Dead code
- Dead-box forensics
- DDoS mitigation
- DD-WRT
- Dcs1000
- Datastore
- Datagram
- Datafication
- Database repository
- Database report
- Database replication
- Database management system
- Database engine
- Database dump
- Database clustering
- Database as a service
- Database administration
- Database activity monitoring
- Data wiping
- Data warehouse
- Data verification
- Data vaulting
- Data validation
- Data transmission
- Data transfer
- Data theft
- Data terminal equipment
- Data subject
- Data sovereignty
- Data source
- Data shadow
- Data server
- Data-Sending Trojan
- Data segregation
- Data scraping
- Data sanitization
- Data retrieval
- Data resiliency
- Data replay
- Data remanence
- Data redundancy
- Data recovery agent
- Data purging
- Data protection policy
- Data Protection as a Service
- Data profiling
- Data processor
- Data preprocessing
- Data poisoning
- Data plane
- Data perturbation
- Data packet
- Data over cable service interface specification
- Data modernization
- Data mirroring
- Data mining
- Data migration
- Data masking
- Data mart
- Data marketplace
- Data Manipulation Language
- Data loss
- Data loss prevention
- Data logging
- Data link layer
- Data leakage
- Data lake
- Data key
- Data intelligence
- Data integrity
- Data Independence
- Data in use
- Data-in-transit encryption
- Data in motion
- Data hiding
- Data governance framework
- Data flow model
- Data feed
- Data fabric
- Data exfiltration
- Data execution prevention
- Data entry
- Data-driven
- Data diode
- Data diddling
- Data dictionary
- Data definition language
- Data deduplication
- Data custodian
- Data corruption
- Data conversion
- Data communications equipment
- Data collection
- Data cloud
- Data-centric security
- Data center virtualization
- Data center tiers
- Data center storage
- Data Center Rack
- Data center proxy
- Data center design
- Data center architecture
- Data bus
- Data breach
- Data breach prevention
- Data binding
- Data bank
- Data backup
- Data availability
- Data audit
- Data at rest
- Data asset
- Data Archiving
- Data analytics
- Data aggregation
- Data administration
- Data acquisition
- Data access
- DAST
- DarkHotel
- Dark web
- Dark patterns
- Dark data
- Dangling pointer
- Daisy chain routers
- Daemon
E
- EMV chip
- Extranet
- Extraction
- External Border Gateway Protocol
- Exterior gateway protocol
- Extensible Authentication Protocol
- Extensibility
- Extended service set
- Extended ACLs
- Expression language injection
- Exploit
- Exploit kit
- Exploit chain
- Exploit-as-a-service
- Expert system
- Exokernel
- Exit node
- Execute Disable Bit
- Executable file
- Exception handling
- Evolved Packet Core
- Evolutionary computation
- Evolution Data Only
- Evil twin
- Evil maid attack
- Evergreen browser
- Event log
- Even parity
- Ethical hacking
- EtherType
- Ethernet
- EtherNet/IP
- Ethernet fabric
- Escrow Passwords
- Error Log
- Error detection and correction
- Error correction code
- Error control
- ERC-721
- Erasure coding
- Entry node
- Enterprise security architecture
- Enterprise network
- Enterprise Fraud Management (EFM)
- Enterprise as a service (EaaS)
- Enterprise application
- Enterprise application security
- Endpoint security
- Endpoint protection platform
- Endpoint device
- Endpoint authentication
- Endianness
- End-user license agreement
- End-to-end encryption
- End-of-Support
- Encryption key
- Encryption as a service
- Encrypting File System
- Encrypted file transfer
- Encoding
- Encapsulating security payload
- EMV Tokenization
- Emulator
- Emotion recognition
- Emoticon
- Emission security
- Embedded software
- Embedded operating system
- Embedded intelligence
- Email virus
- Email spoofing
- Email signature
- Email retention policy
- Email hoax
- Email harvesting
- Email gateway
- Email bomb
- Email attack
- Elliptic-curve cryptography
- Elk Cloner
- Electronically stored information
- Electronic software distribution
- Electronic signature
- Electronic pickpocketing
- Electronic intelligence
- Electronic document management system
- Electronic data interchange
- Electronic customer relationship management
- Elastic IP address
- EIGRP
- Egress traffic
- Egress filtering
- Egosurfing
- Edge security
- Edge network
- Edge gateway
- Edge Datacenter
- Edge caching
- Edge AI
- Echo check
- Eavesdropping
- Early launch anti-malware
- E-government
F
- File eXchange protocol
- Filter evasion
- Fraud
- FWaaS
- Fuzz testing
- Functional dependency
- Function as a service
- Fullz
- Fully qualified domain name
- Full duplex
- Full disk encryption
- FTP proxy
- Frequency-division multiple access
- Freeware
- Freedom of information
- Fraud as a Service
- Frape
- Frame Relay
- Fragment overlap attack
- FPS
- Four-way handshake
- FOSS
- Forward proxy
- Forward DNS
- Forward compatibility
- Formjacking
- Format string attack
- Form grabber
- Form authentication
- Fork bomb
- Forever day bug
- Footprinting
- Fog computing
- Flow routing
- Flooding
- Flooder
- Flexible Single Master Operation
- Flat file
- Flash cookies
- Fixed wireless access
- First-party data
- First-party cookie
- Firmware
- Firmware over-the-air
- Firewall
- Firewall rules
- Firesheep
- FIPS compliance
- Finite field
- FileRepMalware
- Fileless malware
- Fileless attacks
- File signature
- File management system
- File integrity monitoring
- File-infecting Virus
- File-hosting service
- File hash
- File format
- File Descriptor
- File carving
- File binder
- File Allocation Table
- Fieldbus
- Fiber to the Node
- Fiber optic switch
- Fiber Distributed Data Interface
- Fiber Channel storage area network
- Fiber Channel over Ethernet
- Feistel network
- FCIP
- FCFS
- Fault tolerance
- Fault injection attack
- Fault configuration accounting performance security
- Fatal exception
- Fatal error
- FastCGI
- Fast flux
- False rejection
- False flag
- False acceptance ratio
- Fake antivirus
- Failover
- Failback
- Factory reset
- Facial recognition
- Facebook stalking
- Face ID
G
- GPRS Tunneling Protocol
- Guest Operating System
- Guessing entropy
- GSSAPI
- GSM
- Group Policy
- Grid computing
- Greyware
- Greylist
- Green hat hacker
- Green Computing
- Graymail
- Gray hat hacker
- Graphical user interface
- Granularity
- GPS jamming
- Government surveillance
- Gopher protocol
- Google dorking
- Google bomb
- Golden ticket attack
- Gnosticplayers
- Globbing
- Global server load balancing
- Global File System
- Global catalog
- Global area network
- Gigabit point of presence
- Gigabit interface converter
- Ghostware
- GhostNet
- GHOST bug
- Geotagging
- Geofencing
- Geo-blocking
- Generic routing encapsulation
- Generic access network
- Generative AI
- General packet radio service
- GDPR
- Gateway server
- Garlic routing
- Garbage in, garbage out
- GandCrab
- Gamification
H
- Hybrid WAN
- Hardware security module
- Hadoop cluster
- Hindenbug
- Heisenbug
- Hypervisor
- Hyperscale
- Hyperlink
- Hyperautomation
- Hybrid routing protocol
- Hybrid IT management
- Hybrid hard drive
- Hybrid firewall
- Hybrid encryption
- Hybrid computer
- Hybrid cloud storage
- Hybrid cloud security
- Hybrid cloud networking
- Hybrid cloud management
- Hybrid attack
- Hybrid active directory
- Human-machine interface
- Human firewall
- Hug of death
- Hub and spoke network
- HTTPS
- HTTPS proxy
- HTTPS phishing
- HTTP
- HTTP Strict Transport Security
- HTTP request smuggling
- HTTP proxy
- HTTP parameter pollution
- HTTP header
- HTML5
- HTML tag
- HTML Injection
- Hotspot
- Hotlink
- Hot spare
- Hot site
- Hot server
- Hot potato routing
- Hot plugging
- Hot data
- Hosts file
- Hostname
- Hosted virtual desktop
- Host virtual machine
- Host security
- Host operating system
- Host intrusion prevention system
- Host identity protocol
- Host-based intrusion detection system
- Host-based firewall
- Host address
- Hop count
- Honeytoken
- Honeypot
- HoneyMonkey
- Homomorphic encryption
- Homograph attack
- Home server
- Hold down timer
- Hoax
- High-performance radio local area network
- High-performance file system
- High-level data link control
- High availability cluster
- High anonymity proxy
- Hexdump
- Heuristic virus
- Heuristic analysis
- HermeticWiper
- Heap spraying
- Heap spray
- Headless system
- Hashing
- Hash list
- Hash function
- Hash chain
- Hardware virtualization
- Hardware identification
- Hardware as a service
- Hardware acceleration
- Hardening
- Hard reset
- Hard reboot
- Hard link
- Handshake protocol
- Hamming distance
- Hamming code
- Halt and Catch Fire
- Half duplex
- Hacktivism
- Hackintosh
- Hackathon
- H.323
I
- Inline deduplication
- iBeacon
- ITSM
- Iterative DNS query
- IT security
- IT governance framework
- IT Asset Life Cycle Management
- ISP
- Isolated storage
- IS-IS
- IPX/SPX
- IPv4
- IPsec
- ipconfig
- IP surveillance
- IP spoofing
- IP SLA
- IP reputation
- IP packet
- IP Network
- IP Multimedia Subsystem (IMS)
- IP multicast
- IP hijacking
- IP forwarding
- IP Centrex
- IP camera
- IP address blocking
- IoT middleware
- IoT gateway
- IoT botnet
- I/O controller
- Inverse multiplexer
- Intrusion detection system
- Intranet
- Interoperability testing
- Internetworking
- Internet worm
- Internet troll
- Internet transit
- Internet telephony
- Internet security
- Internet routing
- Internet Protocol switching
- Internet protocol private branch exchange
- Internet Protocol address
- Internet of Medical Things
- Internet of Everything
- Internet of Bodies
- Internet key exchange
- Internet Inter-ORB Protocol
- Internet exchange point
- Internet Control Message Protocol
- Internet content adaptation protocol
- Internet connection sharing
- Internet bot
- Internet background noise
- Internet backbone
- Internet Assigned Numbers Authority
- Interior gateway protocol
- Interface message processor
- Interconnection agreement
- Interception attacks
- Intent-based networking
- Intelligent web
- Intelligent virtual assistant
- Intelligent Platform Management Interface
- Intelligent network
- Intelligent cloud
- Intelligent character recognition
- Intelligent agent
- Intel Virtualization Technology
- Integrity checking
- Integration platform as a service
- Integration architecture
- Integrated threat management
- Integrated service digital network
- Integrated drive electronics
- Integrated circuit
- Integer overflow
- InstallCore
- Insider attack
- Insertion attack
- Insecure direct object references
- Insecure deserialization
- Input validation attack
- Input/output operations per second
- Input layer
- Inline frame
- Initialization vector
- Initial sequence numbers
- Initial fraud alert
- Initial access brokers
- INI file
- Ingress filtering
- Infrastructure software
- Infrastructure security
- Infrared
- Infotainment
- Information security policy
- Information security management system
- Information processing
- Information management
- Information hiding
- Information assurance
- Inference attack
- Inetd
- Industroyer
- Industrial internet of Things (IIoT)
- Indicator of compromise
- Incremental backups
- In-memory database
- Impersonation attack
- Immutable ledger
- IMEI
- Image spam
- Image recognition
- ILOVEYOU
- IEEE 802
- Identity proofing
- Identity orchestration
- Identity life cycle
- Identity fabric
- Identity cloning
- Identity-based encryption
- Identity and access management
- Idempotence
- IDE
- Ice phishing
- IAST
- IAM authentication
- I2P
J
K
- KYC verification
- KRACK attack
- Kovter
- Knowledge-Based System (KBS)
- KLOC
- Killware
- Keypunch machine
- Keylogger
- Keychain
- Keyboard buffer
- Key schedule
- Key rotation
- Key risk indicator
- Key-policy attribute-based encryption
- Key length
- Key fob
- Key exchange
- Key escrow
- Key encryption key
- Key distribution center
- Key derivation function
- Key-based routing
- Kernel
- Kernel-based Virtual Machine
- Kerckhoffs’ principle
- Kerberos
- Keepalive
L
- LOC record
- Leapfrog Attack
- Locator ID Separation Protocol
- Likejacking
- Long-Term Evolution Advanced
- LulzSec
- Lurking
- Luring attack
- LUN masking
- LSDB
- Low latency
- Loopback plug
- Loopback address
- LonWorks
- LonTalk
- Long-term evolution
- LOLBin
- Logjam
- Logical unit number (LUN)
- Logical topology
- Logical network
- Logical access
- Logic bomb
- Log4Shell
- Log
- Log shipping
- Log file
- Log clipping
- Locky ransomware
- Location intelligence
- Localhost
- Local file inclusion
- Local area connection
- Loadable kernel modules
- Load balancing router
- Load balancer
- LMHOSTS file
- Living off the land attack
- Link-state routing protocol
- Link layer discovery protocol
- Link encryption
- Link Aggregation Control Protocol
- Linear-feedback shift register
- Linear discriminant analysis
- Lightweight Directory Access Protocol
- Lights out data center
- Level 3 cache
- Legacy system
- Least Significant Bit
- Least privilege
- Least privilege access
- Leased line
- Leakware
- Leaf-spine architecture
- Layer 4 switch
- Layer 2 Forwarding protocol
- Lattice-based access control
- Lateral movement
- LAN Switching
- LAN party
- LAN Manager Hash
- Label Edge Router
- L2 cache
- L1 cache
M
- Mobile Application Security Testing
- Mobile-to-Mobile Convergence
- Mutual exclusion
- Mutual authentication
- Multitenancy
- Multiprotocol Over ATM
- Multiprotocol label switching
- Multiple input and multiple output
- Multipartite virus
- Multilayer switch
- Multilayer perceptron
- Multidimensional database
- Multicast router
- Multi-tier application
- Multi-Purpose Internet Mail Extensions
- Multi-homed
- Multi-domain SSL
- Multi-cloud storage
- Multi-authority attribute-based encryption
- Muling
- MSAU
- MPOE
- MPLS
- Moves, adds, and changes
- Most significant bit
- Morris worm
- Monte Carlo simulation
- Monoculture
- Monitoring software
- Monitoring as a service
- Modular software architecture
- Modem
- Mode of attack
- Mobile workforce
- Mobile web
- Mobile virtual network operator
- Mobile tagging
- Mobile station international subscriber directory number
- Mobile proxy
- Mobile network operator
- Mobile malware
- Mobile credential
- Mobile code
- Mobile cloud computing
- Mobile ad hoc network
- MLOps
- Mix network
- Minification
- MiFi
- Middleware
- Microbrowser
- Microarchitecture
- Micro virtual machine
- Micro-segmentation
- MFA bombing
- Metered connection
- Metasploit
- Metamorphic malware
- MetaMask
- Metadirectory
- Message switching
- Message passing
- Message-oriented middleware
- Message broker
- Mesh topology
- Mesh node
- Mesh networking
- Merkle tree
- Memory rootkit
- Memory refresh
- Memory leak
- Memory forensics
- Memory dump
- Memory-driven computing
- Memory data register
- Memory compression
- Memory cache
- Memory bottleneck
- Memory allocation
- Memory Address Register
- Member server
- Meltdown vulnerability
- Melissa virus
- Media Dispatch Protocol
- Media access unit
- Media access control
- Mean time to respond
- Mean Time to Resolution
- Mean time to repair
- Mean time to recovery
- Mean time to patch
- Mean time to failure
- Mean time to detect
- Mean time to contain
- Mean time to acknowledge
- Mean time between repair
- Mean time between failures
- MD5
- Maximum segment size
- Master password
- Master boot record
- MAST
- Massively parallel processing
- Masquerade attack
- Mandatory access control
- Manchester encoding
- Management information base
- Managed Video as a Service
- Managed service provider platform
- Managed file transfer
- Managed data center
- Metropolitan area network
- Man trap
- Man-in-the-middle attack
- MAM
- Malware sandboxing
- Malware obfuscation
- Malware-as-a-service
- Malvertising
- Malleability
- Malicious code
- Malicious active content
- Main distribution frame
- Magnet link
- Magecart
- Madware
- Macro virus
- Machine vision
- Machine to Machine
- Machine learning
- Machine data
- Machine cycle
- MAC address
N
- NSEC record
- Nonpublic personal information
- Network Meltdown
- Next-Generation Firewall
- Null session
- Null authentication
- Nuker
- NTP amplification attack
- NotPetya
- Not-a-virus
- Northbound interface/Southbound interface
- Nord name
- Nonlinearity
- Nonce
- Non-Return-to-Zero
- Node
- Nmap
- NFC tag
- Next hop
- Network virtualization
- Network transparency
- Network traffic analysis
- Network topology
- Network-to-network interface
- Network Time Protocol
- Network throughput
- Network termination unit
- Network telescope
- Network tap
- Network software
- Network socket
- Network sniffing
- Network slicing
- Network service provider
- Network segment
- Network security protocols
- Network security architecture
- Network scanning
- Network sandboxing
- Network resilience
- Network protocols
- Network processor
- Network prefix
- Network port
- Network optimization
- Network operations center (NOC)
- Network operating system
- Network on a chip
- Network node manager
- Network map
- Network management system
- Network layer
- Network intrusion
- Network intrusion protection system
- Network interface card
- Network intelligence
- Network infrastructure
- Network information system
- Network ID
- Network hub
- Network function virtualization
- Network frame
- Network forensics
- Network File System
- Network encryption
- Network drive
- Network discovery
- Network detection and response
- Network degradation
- Network database
- Network convergence
- Network connectivity
- Network congestion
- Network configuration management
- Network bridge
- Network bottleneck
- Network based IDS
- Network based application recognition
- Network backup
- Network automation
- Network administrator
- Network adapter
- Network access server
- Network access control
- Network access control lists
- NetWare Core Protocol
- Netwalker ransomware
- Netsplit
- NetSecOps
- NetScaler
- Netmask
- Netiquette
- NetFlow
- Netcat
- NetBIOS
- NetBEUI
- Net neutrality
- Neighbor discovery protocol
- Nearline storage
- NAT64
- NAT traversal
- NAT loopback
- NAS
- Narrowband
- Nano kernel
- Name resolution
- N-tier architecture
O
- Operation Shady Rat
- OWASP
- Overwriting virus
- Overrun
- Overlay network
- Overflow error
- Over-the-Top Application
- Out-of-band authentication
- OST file
- OSPF
- OSI model
- Optical line terminal
- Optical character recognition
- OPSEC
- Operational testing
- Operational technology
- Operational level agreement
- Operational database
- OpenSSH
- OpenPGP
- Open Virtualization Format
- Open system
- Open relay
- Open port
- Online data storage
- Online Certificate Status Protocol
- Onion domain
- One-way encryption
- One-time password
- One-time pad
- One ring scam
- On-premises software
- OGNL injection
- OffSec
- Offline Attack
- Offensive security
- Odd parity
- OCSP stapling
- Object request broker
- Object-oriented programming
- Obfuscation
- OAuth
P
- Pop-up
- Payment Card Industry Data Security Standard
- Parasite Hosting
- Protocol Buffer
- Postel’s Prescription
- Polled Interrupt
- Phishing kit
- Point-to-Point T1
- Pulsing zombie attack
- Perceptual Computing
- Point-to-Point Encryption
- Push to Talk Over Cellular
- Port-to-Application Mapping
- Platform For Privacy Preferences Project
- Phantom domain
- Protected health information
- Password hardening
- PWN
- PvP
- PvE
- Purple team
- Public switched telephone network
- Public proxy
- Public Network
- Public key infrastructure
- Public key encryption
- Public IP
- Public domain software
- Public cloud infrastructure
- PsExec
- Pseudowire
- Pseudoransomware
- Pseudonymization
- Pseudonym
- Pseudocode
- Proxy Trojan
- Proxy surfing
- Proxy agent
- Protocol stack
- Protocol-independent multicast
- Protocol conversion
- Protected mode
- Proprietary software
- Proprietary information
- Propagation delay
- Promiscuous mode
- Programmable network
- Production Server
- Product cipher
- Process hollowing
- Proactive defense
- Privileged account
- Privileged access workstation
- Privilege escalation
- Private proxy
- Private IP
- Private internet access
- Private cloud storage
- Private branch exchange
- Privacy policy
- Primary storage device
- Primary DNS server
- Pretexting
- Presentation layer
- Preprocessor directive
- Preemption
- Predictive maintenance
- Predictive data mining
- PPPoE
- PowerShell
- Power usage effectiveness
- Power over Ethernet
- Power-on self-test
- Power distribution unit
- Power-analysis attack
- Poweliks
- Potentially unwanted application
- Post-quantum cryptography
- Post Office Protocol
- Post-inoculation attack
- Portal application
- Portable operating system interface
- Portable computer
- Port triggering
- Port scanning
- Port mirroring
- Port mapper
- Port knocking
- Port address translation
- Port 80
- Polymorphic virus
- Polymorphic malware
- Point-to-point protocol
- Point-to-multipoint communication
- Point of presence (POP)
- Pod slurping
- Playfair cipher
- Platform security
- Platform agnostic
- Pirated software
- Pipeline
- Ping
- Ping sweep
- Ping of death
- PIM-SSM
- Piggybacking
- Physical to virtual
- Physical layer
- Physical address
- Phreaking
- PHP injection
- Phlashing
- Phish-prone percentage
- Phase-shift keying
- Pharming
- PGP encryption
- Petya
- Personal web server
- Personal VPN
- Personally identifiable information
- Personal firewall
- Personal area network
- Persistent cookie
- Permanent virtual circuit
- Permalink
- Peripheral device
- Perimeter security
- Perimeter firewall
- Pentest
- Peering
- Peer-to-peer
- PCI bus
- Payload
- Pattern recognition
- PathPing
- Pathname
- Patch
- Patch Tuesday
- Patch management
- Passwordless
- Password vault
- Password spraying
- Password sniffer
- Password salting
- Password protection
- Password policy
- Password authentication protocol
- Passphrase
- Passkey
- Passive surveillance
- Passive reconnaissance
- Passive Optical Network
- Passive File Transfer Protocol
- Passive biometrics
- Passive attack
- Passcode
- Pass the hash
- Particle swarm optimization
- Parser
- Parity check
- Parental controls
- Paravirtualization
- Parameter tampering
- Parallel processing
- Parallel data transmission
- Pagejacking
- Pad character
- Packet switching
- Packet-switched network
- Packet sniffing
- Packet sniffer
- Packet monkey
- Packet loss
- Packet filtering
- Packet coalescing
- Packet capture
- Packet buffer
- Peer-to-peer (P2P) fraud
Q
R
- RP record
- Reverse proxy
- RESTful API
- Remote Direct Memory Access (RDMA)
- Ryuk ransomware
- Runtime system
- Rubber ducky attack
- Rubber duck debugging
- RPO
- RPG
- Rowhammer
- Routing table
- Routing loop
- Routing Information Protocol
- Routing Information Field
- Route summarization
- Route poisoning
- Route flapping
- Round-trip time
- Rotating proxy
- Rooting
- Root user
- Root server
- Root of trust
- Root Node
- Root access
- Rollback
- Role-Based Access Control
- Rogueware
- Rogue security software
- Rogue device
- Rogue access point
- Robocopy
- Riskware
- Risktool
- Risk monitoring
- Risk modeling
- Risk-based access control
- Risk assessment
- Ring network
- Rijndael
- Right to restrict processing
- Right to object
- Right to erasure
- Right to data portability
- Right to be informed
- Right of access
- Rich internet application
- RFID tag
- RFID blocking
- RFC1918
- RF jamming
- REvil ransomware
- Reverse-path forwarding
- Reverse engineering
- Reverse domain name hijacking
- Reverse DNS
- Reverse brute-force attack
- Responsible AI
- Response time
- Resource Reservation Protocol
- Resource exhaustion
- Residual risk
- Resident virus
- Reshipping
- Request for Comments
- Replay attack
- Repeater
- Remote wipe
- Remote user
- Remote shell
- Remote procedure call
- Remote outdoor router
- Remote monitoring and management
- Remote infrastructure management
- Remote device
- Remote desktop
- Remote desktop protocol
- Remote computer
- Remote code execution
- Remote attack
- Remote access trojan
- Remote access server
- Relay server
- Relay node
- Regional internet registry
- Reference architecture
- Redundant hardware
- RedHack
- Red team
- Red Screen of Death
- Red hat hacker
- Recurrent neural network
- Recovery time objective
- Recovery mode
- Reconnaissance
- Recommendation engine
- Real-time Transport Control Protocol
- Real Time Streaming Protocol
- Real-time data
- Real-time data streaming
- Real-time computing
- Real-time communications
- Read-only memory
- RDF database
- RC6
- RC5
- RC4
- Raw device mapping
- Raspberry Robin
- RARP
- Random forest
- Random access memory
- RAM scraping
- Rainbow table attack
- Rail fence cipher
- RAID 0
- RAID 6
- RAID 5EE
- RAID 51
- RAID 5
- RAID 4
- RAID 3
- RAID 2
- RAID 10
- RAID 1
- Radio over Internet Protocol
- Race condition
- Round-robin DNS
S
- Sensitive personal information
- SEO poisoning
- Schrödinbug
- Single sign-on
- Security Assertion Markup Language
- Spectrum Efficiency
- Serial Storage Architecture
- Soundex
- Session Description Protocol
- Spam and Open Relay Blocking System
- System unit
- System software
- System security
- System migration
- System integrity protection
- System integration testing
- System file
- System bus
- Sysmon
- Syslog
- Sysinternals
- Synthetic identity theft
- Synthetic data
- Syntax error
- Synchronous optical networking
- Synchronous data transmission
- Synchronization
- SYN flood
- Symmetric key authentication
- Symbian
- Sybil attack
- Switching loop
- Switching fabric
- svchost.exe
- Suspicious activity report
- Supply chain security
- Supervised machine learning
- Superuser
- Supernetting
- Superkey
- Super cookie
- Subtyping
- Substitution cipher
- Subnetwork Access Protocol
- Subnetting
- Subnet
- STUN
- STUN server
- Stub network
- Structured systems analysis and design method
- Structured prediction
- Strong authentication
- Strict SSL
- Stress testing
- Streaming network telemetry
- Stream control transmission protocol
- Stream cipher
- Storm worm
- Store-and-forward manager
- Storage virtualization
- Storage provisioning
- Storage performance platform
- Storage over Internet Protocol
- Storage management
- Storage Management Initiative Specification (SMI-S)
- Storage capacity
- Storage bottleneck
- Storage automation
- Storage as a Service
- Storage area network server
- STIX and TAXII
- Sticky session
- Sticky bit
- STEM
- Steganography
- Steganalysis
- Stealth VPN
- Stealth virus
- Static URL
- Static routing
- Static NAT
- Static linking
- Static IP
- Static data
- Static code analysis
- Stateless protocol
- Stateless firewall
- Stateful inspection
- Stateful firewall
- State
- STARTTLS
- Standard Operating Environment
- Standard generalized markup language
- Standalone server
- Stalkerware
- Staging server
- Stack smashing
- Stack frame
- SSL VPN (Secure socket layer virtual private network)
- SSL/TLS proxy
- SSL stripping attack
- SSL offloading
- SSL encryption
- SSID
- SQL injection
- SQL injection tool
- SQL injection scanner
- Spyware
- SpyEye
- Spooling
- Spoofing attack
- Split DNS
- Splinternet
- Spectre vulnerability
- Spear phishing
- SPDY Protocol
- Spatial multiplexing
- Spatial data mining
- Spanning Tree Protocol
- Spamware
- Spamming
- Spambot
- Spam over Internet Telephony
- Spam blog
- Space shifting
- Sovereign cloud
- Source routing
- Source code
- Source code escrow
- Source code analysis tool
- Solid-state drive
- Software repository
- Software RAID
- Software piracy
- Software package
- Software library
- Software interrupt
- Software-defined security
- Software-defined networking
- Software-defined infrastructure
- Software bug
- Software assurance
- Softlifting
- Soft token
- Soft copy
- SOCMINT
- Social profiling
- Social engineering
- SOC as a service
- Snowshoe spam
- Sneakernet
- Sneaker bot
- Snake malware
- Smurfing
- Smurf attack
- SMTP proxy
- SMS spoofing
- Smishing
- SMIME
- Smart meter
- Smart grid
- Smart dust
- Smart device
- Smart contract
- Smart card
- Smart bulb
- Skimming attack
- Site survey
- SIP proxy
- Simple network time protocol
- Simple Network Management Protocol (SNMP)
- Simple network management protocol version 3 (SNMPv3)
- Simple Network Management Protocol version 2
- SIM toolkit
- Signature verification
- Signals analysis
- Signaling gateway
- SIGMA rules
- Sideloading
- Sidejacking
- Side-channel attack
- Shylock
- Showstopper bug
- Shoulder surfing
- Shortest path bridging
- Short Message Peer-to-Peer
- Shodan search engine
- Shimming attack
- Shellcode
- Sharking
- Sharenting
- Shared storage
- Shared Secret
- Shared resources
- Shared proxy
- Shared-key authentication
- Shared IP
- Shared call appearance
- Shamoon
- Shadowsocks
- Shadow profile
- Shadow Password Files
- Shadow copy
- Sextortion
- Session token
- Session layer
- Session key
- Session hijacking
- Session fixation attack
- Session cookie
- Session Control Protocol
- Session border controller
- Service pack
- Service Location Protocol
- Service control manager
- Service broker
- Serverless
- Server virtualization
- Server software
- Server redundancy
- Server mirroring
- Server Message Block
- Server hosting
- Server farm
- Server-based computing
- Serial server
- Serial port
- Serial communication
- SerDes
- Sequenced packet exchange
- Separation of duties
- Sentiment analysis
- Sensitive information
- Semantic network
- Self-sovereign identity
- Self-signed certificate
- Self-replicating machine
- Self-provisioning
- Self-destructing email
- Selective backup
- Segmentation fault
- Segment routing
- Security token
- Security through obscurity
- Security software
- Security policy
- Security perimeter
- Security patch
- Security operations center
- Security monitoring
- Security incident and event management
- Security identifier (SID)
- Security hardening
- Security event management
- Security domain
- Security Content Automation Protocol
- Security certificate
- Security automation
- Security audit
- Security assessment
- Secure software development lifecycle
- Secure Shell
- Secure print
- Secure Hash Algorithm 2
- Secure Hash Algorithm 1
- Secure File Transfer Protocol
- Secure erase
- Secure enclave
- Secure Electronic Transactions
- Secure destruction
- Secure copy protocol
- Secure cookie
- Secure connection
- Secure coding
- Secure boot
- Secret key
- Second-party fraud
- SECaaS
- Scunthorpe problem
- Scumware
- Scripting language
- Script Kiddie
- Screened subnet firewall
- Screen scraping
- Screen lock
- Scatternet
- Scareware
- Scanning attack
- Scam
- Scale-out storage
- SCA scanning
- SAST
- Sandboxing
- Sandbox gaming
- Sandbox escape
- Salting
- Salami fraud
- Safe mode
- S/Key
T
- T1 line
- TLS Handshake
- Tactics, techniques, and procedures
- Tunneling Virus
- Typosquatting
- Two-phase commit
- Two-factor authentication
- Twishing
- Turing-complete
- Tunneling
- Trusted data format
- Trusted computing
- Trusted computing base
- Trust anchor
- Trunk port
- True positives
- Trojan
- Trivial File Transfer Protocol
- Triple DES
- TrickBot
- Triangulation fraud
- Transposition cipher
- Transport layer
- Transponder
- Transparent proxy
- Transparent Data Encryption
- Transparent bridge
- Transmitter
- TRANSEC
- Transcoding
- Transceiver
- Transactions per second
- Transactional data
- Training data
- Traffic shaping
- Tracking pixel
- Tracking cookie
- Touch ID
- Top-down design
- Tool kit
- Tokenization
- Token ring
- Token ring network
- TOCTOU attack
- Timing attack
- Timestomping
- Time to live
- Time-sharing
- Time-division multiplexing
- Time division duplex
- Time bomb
- Tiger team
- Thumb drive
- Throughput
- Three-schema architecture
- Threat vector
- Threat monitoring
- Threat landscape
- Threat hunting
- Threat assessment
- Threat actor
- Thrashing
- Third-party risk management
- Third-party fraud
- Third-party cookie
- Third normal form
- Thin provisioning
- Thin client
- Thick provisioning
- Thick client
- The kill chain
- Text data mining
- Tethering
- TeslaCrypt
- Terminal node controller
- Terminal master key
- Terminal emulation
- Terminal adapter
- Terminal Access Controller Access Control System
- Temporary file
- Temporal key integrity protocol
- Template injection
- TEMPEST shielding
- Telnet
- Telecommunications equipment
- Technical debt
- Tech support scam
- Teardrop attack
- TCP Wrapper
- TCP reset attack
- TCP handshake
- Tarpitting
- Targeted attacks
- Tampering attack
- Taint analysis
- Tabnabbing
- Tabletop exercise
- T3 line
- The Right to Rectification
U
- UXSS
- UTM network
- Username
- User Datagram Protocol
- User authentication
- User agent
- User Account Control
- Usenet
- Use-after-free
- USB Restricted Mode
- USB drop attack
- USB debugging
- URL redirection attack
- URL injection
- URL hijack
- URL filtering
- URL encoding
- UPnP
- Unsupervised machine learning
- Unlabeled data
- Unknown host
- Unix-to-Unix Copy
- Unix box
- Universally unique identifier
- Unique constraint
- Uniform Resource Name
- Uniform resource identifier
- Unified storage
- Unified computing system
- Unicast address
- Unauthorized access
- UEFI
- UEFI rootkit
- UEBA
- Ubiquitous computing
- U2F
V
- Vectored Interrupt
- Virtual Private Dial-Up Network
- Volume Boot Record
- VxWorks
- Vulnerability
- Vulnerability scanner
- Vulnerability management system
- Vulnerability disclosure
- Vulnerability assessment
- vRealize automation
- VPNaaS
- VPN token
- VPN hardware
- VPN gateway
- VPN firewall
- VPN concentrator
- VPN Authentication
- VPN appliance
- Volume Shadow Copy Service
- Volatile storage
- Volatile data
- VoIP
- VoIP gateway
- VoIP caller ID
- Void pointer
- Voice over wireless local area network
- Voice over long-term evolution
- Voice intrusion prevention system
- vMem
- VM Sprawl
- VM escaping
- VLSM
- VLAN trunking protocol
- VLAN tagging
- VLAN hopping
- Visitor-based networking
- Vishing
- Virus signature
- Virtualization security
- Virtual to physical
- Virtual terminal
- Virtual teletype
- Virtual tape library
- Virtual switch
- Virtual storage portal
- Virtual storage area network
- Virtual routing and forwarding
- Virtual Router Redundancy Protocol
- Virtual private server
- Virtual private LAN service
- Virtual private data center
- Virtual private cloud
- Virtual path identifier
- Virtual office
- Virtual networking
- Virtual Network Adapter
- Virtual machine snapshot
- Virtual machine migration
- Virtual machine hyper jumping
- Virtual machine configuration
- Virtual machine cluster
- Virtual IP address
- Virtual host
- Virtual hard disk
- Virtual firewall
- Virtual file system
- Virtual File Allocation Table
- Virtual environment
- Virtual drive
- Virtual device
- Virtual device driver
- Virtual desktop infrastructure
- Virtual Dedicated Server
- Virtual database
- Virtual data room
- Virtual channel identifier
- Virtual address
- Very high-speed digital subscriber line
- Vertical Cloud
- Verification
- VeriChip
- Vendor patch
- Vendor email compromise
- Velocity checks
- Vehicle-to-Infrastructure
- vCPE
- Vanity domain
- Van Eck phreaking
- Vampire tap
- V2Ray protocol
W
- Write-back cache
- WPAN
- WPA key
- WPA-Enterprise
- World Wide Name
- Workstation
- Workgroup bridge
- Word size
- WMN network
- Wireless wide area network
- Wireless network security
- Wireless local area network
- Wireless intrusion prevention system
- Wireless fidelity
- Wireless bridge
- Wireless application service provider
- Wireguard
- Wired equivalent privacy
- Wired equivalent privacy 2
- Wire transfer fraud
- Wire fraud
- Windows service
- Windows Remote Management
- Windows Registry
- Windows Deployment Services
- Windowing
- Wildcard mask
- Wildcard certificate
- WiGig (60 GHz Wi-Fi)
- Wideband Code Division Multiple Access
- Wi-Fi protected setup
- Wi-Fi protected access pre-shared key
- Wi-Fi Direct
- Whitebox cryptography
- White team
- White hat hacker
- Whistleblower
- Whaling
- WEP crack
- Website spoofing
- Website defacement
- Website architecture
- Webpage
- Webhook
- Web3
- Web shell
- Web Services Interoperability Technologies
- Web Service
- Web server
- Web server security
- Web security gateway
- Web protection
- Web-Oriented Architecture
- Web mining
- Web mapping
- Web filter
- Web content management
- Web content filtering
- Web client
- Web cache poisoning
- Web beacon
- Web-based application
- Web authorization management
- Web access management
- Wearable computer
- Watering hole attack
- Warshipping
- Warm data
- Warm boot
- Warez
- Wardialing
- Warchalking
- War texting
- War driving
- WAN
- WAN port
- WAN optimizer
- WAN mini port
- WAN aggregation
- Walled garden
- Wake-on-LAN (WoL)
- Wabbit
X
Y
Z
0-9
Watch it explained: 10 cybersecurity terms you should know
Start your journey into cybersecurity. In this video, our experts explain 10 common cybersecurity terms that you hear frequently online
