Obsah tejto stránky momentálne bohužiaľ vo vybranom jazyku nie je k dispozícii.
Get Started
Pricing
Extras
Personal Server
Personal IP
Additional Devices
VPN for Teams
VPN For Business
VPN Unlimited Lifetime
Downloads
Desktop/Laptop
macOS
Windows
Linux
Mobile
iOS
Android
Windows Phone
Browsers
Chrome
Firefox
Opera
Edge
Online TV
Apple TV
Amazon Fire
Roku
Google Chromecast
Kodi
Manual Configuration
Routers
NAS
Help
Slovenský
English
Русский
Español
Française
Deutsche
Українська
Portuguese
فارسی
عربى
日本語
中国
Svenska
Suomalainen
Norsk
Get Started
Slovenský
English
Русский
Español
Française
Deutsche
Українська
Portuguese
فارسی
عربى
日本語
中国
Svenska
Suomalainen
Norsk
VPN Service
Help
VPN Glossary
Cybersecurity Glossary
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
0-9
128-bit encryption
2-tier architecture
256-Bit Encryption
3-Tier Architecture
3-way handshake
3DES
5G Technology
802.1Q
A
A/B Testing
A Record
ABEND
Accelerated Mobile Pages
Acceptable use policy
Access control entry
Access Control List (ACL)
Access Control
Access layer
Access management
Access Point Name
Access Point
Access Token
Accessibility
Account compromise
Account Theft
ACID
Activation code
Active attack
Active content
Active defense
Active Directory
Active Surveillance
ActiveX
Ad Blockers
Ad Fraud
Ad-Hoc Network
Adaptive authentication
Address Bus
Address space
ADFGVX cipher
Administrative privileges
Advanced evasion technique
Advanced metering infrastructure
Adversarial Attack
Adversary group naming
Adware
AES-256
AES (Advanced Encryption Standard)
Affiliate Marketing
AFTS
Aggregation Attack
Agile Business
Agile Development
AI Bias
AI Ethics
AI in Cybersecurity
AI Security
AI TRiSM
AIOps
Air gap
Airflow Management
AJAX (Asynchronous JavaScript and XML)
Alert fatigue
Algorithm
Algorithmic Fairness
Allowlist
Alpha Testing
AlphaGo
Alphanumeric password
Alternative routing
Amazon Web Services (AWS)
Amplification Attack
Analog computer
Analysis Paralysis
Android package kit
Angler phishing
Anna Kournikova virus
Anomaly Detection
Anomaly in Databases
Anonymity
Anonymization
Anonymizer
Anonymous call rejection
Anonymous hackers
Anonymous Proxy
Anonymous Reporting
Answer-seizure ratio
Anti-malware
Anti-patterns
Anti-phishing service
Anti-spam
Anti-spyware
Antivirus scanner
Antivirus
Anycast
API Keys
API (Application Programming Interface)
App Permissions
App Store
Application acceleration
Application awareness
Application-centric infrastructure
Application client
Application Control
Application delivery controller
Application delivery network
Application delivery
Application deployment
Application gateway
Application hosting
Application layer
Application-Level Gateway
Application log
Application management
Application performance monitoring
Application program
Application programming interface
Application Security
Application server
Application virtualization
Advanced Persistent Threat (APT)
Arbitrary code execution
Archiving
Area border router
Arithmetic logic unit
Arithmetic Overflow
ARM processor
ARP Spoofing
ARP
ARPANET
Artificial intelligence
AS1 (Applicability Statement 1)
AS2 (Applicability Statement 2)
ASCII
ASLR
Assembler
Asset Management
Asymmetric Encryption
Asynchronous Transfer Mode
Asynchronous transmission
Atbash Cipher
ATM jackpotting
ATM Security
Attack signature
Attack surface
Attack taxonomy
Attack Vector
Attribute-Based Access Control (ABAC)
Attribute value pair
Attribution Problem
Auction fraud
Audit log
Audit trail
Augmented intelligence
Authentication Protocol
Authentication server
Authentication
Authorization Code
Authorization
Authorized push payment fraud
Auto attendant
Automated Testing
Automatic Call Distributor (ACD)
Automatic content recognition
Automatic repeat request
Automation platform
Automation
Autonomic network
Autonomous intelligence
Autonomous system
Autonomous Vehicles
Autorun worm
Azure Active Directory (Azure AD)
B
Backbone Area
Backdoor
Backhaul
Backporting
Backpropagation
Backtracking
Backup and Recovery
Backup as a Service
Backup (n.)
Backward Compatibility
BACnet
Bad Sector
BadUSB
Baiting
Bak file
Balanced Scorecard
Bandwidth-Intensive Activities
Bandwidth Management
Bandwidth meter
Bandwidth Theft
Bandwidth
Bank Drop
Banker Trojan
Bare-metal provisioning
Base address
Baseboard management controller
Baseline configuration
Baselining
Basic Authentication
Bastion host
Batch Processing
Baud rate
Bcrypt
Beaconing
Bearer protocol
Behavior Analytics
Behavior-based Detection
Behavior monitoring
Bell-LaPadula Model
Beta Testing
BGP
BGPsec
Biba Model
Big Data
BIN Attack
Binary code analysis
Binary Code
Binary
Biometric data
Biometric Scanners
Biometric spoofing
Biometrics
BIOS password
BIOS rootkit
BIOS
Biphase Encoding
Birthday attack
Bit Error Rate
Bit-flipping attack
Bit
Bitbucket
BitLocker
Bitrate
Bitwise Operation
Black hat hacker
Black Hat SEO
BlackEnergy
Blackholing
Blacklist
Bladabindi
Blade Server
Blended threat
Bloatware
Block cipher
Block size
Block Storage
Blockchain
Blocklist
Blue hat hacker
Blue Pill attack
Blue Screen of Death (BSoD)
Blue team
BlueBorne
Bluebugging
Bluejacking
Bluesnarfing
Bluetooth Hacking
Bluetooth Sniffing
Bluetooth
Bogon filtering
Bonjour Protocol
Boolean Algebra
Boolean logic
Boolean Operators
Boot Disk
Boot Image
Boot sector virus
Bootable USB
Booter
Bootkit
Bootloader
Bot herder
Bot mitigation
Bot
Botnet
Bounce Rate
Boundary Protection
Bridge Protocol Data Units (BPDU)
Branch Prediction
Branching and Merging
Brandjacking
Bricking
Bridge ID
Bridge mode
Broadband over power line
Broadband router
Broadband
Broadcast address
Broadcast Domain
Broadcast Storm
Broadcast
Broken access control
Broken authentication attack
Browser Extension
Browser hijacker
Browser isolation
Browser sandboxing
Brute-force attack
Buffer Overflow
Bug Bounty Program
Bug
Building Automation System (BAS)
Bulk data transfer
Bullet camera
Bus Arbitration
Bus Network
Business Continuity
Business email compromise
Business Intelligence
Business Process Automation
Business Process Management (BPM)
BYOD (Bring Your Own Device)
Byte
Byzantine fault tolerance
Bundling
C
C&C server
Cache Eviction
Cache hit
Cache invalidation
Cache Memory Attacks
Cache Memory
Cache miss
Cache server
Caching proxy
Caching
Caesar Cipher
Call detail record
Call Routing
Call Stack
Call-to-Action (CTA)
Campus area network
Canary token
Canonical name
Capacity Planning
CAPTCHA
Captive portal
Capture The Flag (CTF)
Carberp
Card purchase authorization
Card testing
Cardinality
Carding
Carrier Ethernet
Catfishing
California Consumer Privacy Act (CCPA)
CCTV
CDN (Content Delivery Network)
CDR Analysis
Cellular Jamming
Cellular Network Security
Cellular network
Censorship Circumvention
Censorship
CEO fraud
Cerber ransomware
Certificate Authority (CA)
Certificate-based authentication
Certificate management
Certificate pinning
Certificate Revocation
CGNAT
ChaCha20
Chaffing and winnowing
Chain of Custody
Change Control
Change Management
Challenge Handshake Authentication Protocol (CHAP)
Character Encoding
Character set
Chargeware
Chatbot
Check-in/Check-out
Checksum
Child Exploitation
Chosen plaintext attack
Continuous Integration/Continuous Deployment (CI/CD)
CIDR
CIEM
Cipher suite
Ciphertext
Circuit-level gateway
Circuit Switching
CIS Controls
Complex Instruction Set Computing (CISC)
Cisco IOS
Civil Liberties
Clark-Wilson Model
Class A IP address
Class B IP address
Class C IP address
Class D IP address
Class E IP address
Class of Service
Classful Network
Classified Information
Clean Code
Clean fraud
Clean install
Click Fraud
Clickjacking
Clicktivism
Client-Server Model
Client-server network
Client-Side Attacks
Cloaking
Clock Speed
Clocking
Clop ransomware
Closed Source
Closed System
Cloud architecture
Cloud archiving
Cloud as a service
Cloud attack
Cloud Automation
Cloud Backup
Cloud-based supercomputing
Cloud Collaboration
Cloud Computing
Cloud containers
Cloud data platform
Cloud database
Cloud forensics
Cloud Hosting
Cloud Infrastructure
Cloud Migration
Cloud networking
Cloud operating system
Cloud security posture management
Cloud Security
Cloud server
Cloud Storage
Cloud VPN
Cloud VPS
CWPP
CloudTrust protocol
CLSID
Cluster analysis
Cluster controller
Clustering
CNAPP
Co-location
COBIT
Code Compilation
Code generator
Code injection
Code management
Code morphing
Code Optimization
Code Review
Code signing
Code Smell
Codec
Coding
Cognitive computing
Cold boot
Cold data
Cold Site
Collaboration Tools
Collaborative Filtering
Collaborative Software
Collision domain
Collision
COM Objects
COMINT
Command and Control (C2)
Command Execution
Command injection
Command-line interface
Command-Line Shell
Commit
Committed information rate
Communications system
Compatibility Testing
Compatibility
Compiler Optimization
Compiler
Compliance Audit
Compliance Framework
Compliance Management
Component-Based Development
Compressed file
Compression
Compute platforms
Compute security
Computer Malfunction
Computer network defense
Computer network operations
Computer system
Computer virus
Computer Vision
COMSEC
Concurrency control
Concurrency
Condition-Based Maintenance
Conditional Statements
Conficker
Configuration file
Configuration Management
Conflict Resolution
Connected Vehicle Technology
Connected Vehicles
Connection-oriented protocol
Connectionless Protocol
Consensus Algorithms
Consensus Mechanism
Consent Management
Constant-Time Algorithms
Consumer electronics
Contactless Payment
Container breakout
Container Format
Container isolation
Container scanning
Container Security
Containerization
Content-Based Filtering
Content Encryption
Content Filtering
Content Management System
Content Scraping
Content security policy
Context-aware Authentication
Context Delivery Architecture
Control bus
Control Flow
Control framework
Control network
Control plane
Control structure
Control unit
Converged infrastructure
Conversation hijacking
Conversion Rate Optimization (CRO)
Cookie Encryption
Cookie hash
Cookie Poisoning
Cookie stuffing
Cookie theft
Cookie
Copy-paste compromise
Copy protection
Copyright Infringement
CoreBot
Correlation Attack
Cross-Origin Resource Sharing (CORS)
Counterfeit Software
Country code top-level domain
Covert channel
CPU Bound
CPU Cache
CPU contention
CPU Cores
CPU Pipeline
CPU Scheduling
CPU utilization
CPU (Central Processing Unit)
Cracker
Crash Dump
Cyclic Redundancy Check (CRC)
Credential harvesting
Credential stuffing
Credentials
Credit Freeze
Credit Monitoring
Credit Report
Creeper virus
Creepware
Crisis Management
Critical Infrastructure Protection
Critical Infrastructure
CRLF injection
Cross-Border Data Transfer
Cross-Browser Testing
Cross-Frame Scripting
Cross-Functional Teams
Cross-platform
Crossover cable
Cryptanalysis
CryptBot
Crypto malware
Crypto shredding
Cryptocurrency Mining
Cryptocurrency
Cryptographic algorithm
Cryptographic Attack
Cryptographic Hash
Cryptographic key
Cryptographic protocol
Cryptographic Techniques
Cryptographic Vulnerability
Cryptography
Cryptojacking
Cryptosystem
Cryptovirus
Cryptowall
CSCW
CSIRT
Cross-Site Request Forgery (CSRF)
CTB locker
Curation
Custom ROMs
Customer edge router
CVE
CVSS
Cyber attribution
Cyber Communication
Cyber Deception
Cyber Forensics
Cyber harassment
Cyber Hygiene
Cyber incident
Cyber insurance
Cyber operations
Cyber-physical attack
Cyber-Physical Systems
Cyber privateering
Cyber range
Cyber Resilience
Cyber Safety
Cyber Threat Analysis
Cyber vandalism
Cyber vigilantism
Cyberattack
Cyberbullying
Cybercrime
Cyberlibel
Cyberlocker
Cybersecurity Awareness
Cybersecurity Competition
Cybersecurity ecosystem
Cybersecurity Maturity Model Certification
Cybersecurity Measures
Cybersecurity mesh
Cybersecurity Policy
Cybersecurity Risk
Cybersecurity Standards
Cybersecurity
Cyberspace
Cybersquatting
Cyberstalking
Cyberterrorism
Cyberthreat
Cyberwarrior
Cybersecurity Risks of Public Wi-Fi
D
Daemon
Daisy chain routers
Dangling pointer
Dark Fiber
Dark patterns
Dark web
DarkHotel
Darknet Marketplaces
Data access
Data acquisition
Data administration
Data aggregation
Data Analytics
Data asset
Data-at-rest Encryption
Data at rest
Data audit
Data availability
Data bank
Data Blocking
Data Blocks
Data Breach Insurance
Data breach
Data bus
Data Center Cooling
Data center design
Data Center Efficiency
Data Center Infrastructure Management (DCIM)
Data center proxy
Data Center Rack
Data center storage
Data center tiers
Data center virtualization
Data Center
Data-centric security
Data Classification
Data Cleansing
Data Cleanup
Data Consistency
Data conversion
Data corruption
Data custodian
Data deduplication
Data Definition Language (DDL)
Data diddling
Data Diode
Data-driven
Data Encryption Key (DEK)
Data Encryption Standard (DES)
Data Entry
Data Erasure
Data Exchange
Data Execution Prevention (DEP)
Data Flow Analysis
Data flow model
Data governance framework
Data Governance
Data hiding
Data in motion
Data in Transit
Data Integration
Data integrity
Data intelligence
Data key
Data lake
Data Leak
Data Lifecycle Management
Data link layer
Data Localization
Data logging
Data loss prevention
Data loss
Data Manipulation Language
Data Manipulation
Data marketplace
Data masking
Data migration
Data Minimization
Data mining
Data Normalization
Data Owner
Data plane
Data poisoning
Data Privacy
Data profiling
Data Protection Officer (DPO)
Data protection policy
Data Quality Management
Data Quality
Data Recovery
Data Redundancy
Data remanence
Data Retention Laws
Data Retention
Data retrieval
Data sanitization
Data Security
Data segregation
Data source
Data sovereignty
Data Steward
Data subject
Data terminal equipment
Data theft
Data transfer
Data transmission
Data Type
Data validation
Data vaulting
Data verification
Data Visualization
Data warehouse
Data wiping
Database Backup
Database Constraints
Database Indexing
Database Optimization
Database replication
Database Schema
Database Security
Datafication
Datagram
Datastore
Database Management System (DBMS)
Dcs1000
DD-WRT
DDoS (Distributed Denial of Service)
DDR3
DDR4
Dead-box forensics
Dead code
Debug symbols
Debugger
Decapsulation
Decentralization
Decentralized Application (DApp)
Decentralized Identifiers (DIDs)
Decentralized Network
Decentralized Systems
Decentralized Web
Declassification
Decoding
Decoherence
Decoy
Decryption Algorithm
Dedicated Internet Access
Dedicated IP
Dedicated server
Deep Learning
Deep Packet Inspection (DPI)
Deep Web
Deepfake
Default gateway
Default password
Defense In-Depth
Defense Industrial Base (DIB)
Deflection routing
Delta rule
Demand Response
Demultiplexing
Denormalization
Deobfuscate
Dependency Injection
Dependency
Deprecation
Deserialization
Deterministic System
Developer Options
Device Fingerprinting
Device Management
DevOps
DevSecOps
DFIR
DHCP attack
DHCP proxy
DHCP Snooping
DHCP
Dial-Up Connection
Dialog box
Dictionary attack
Differential Backups
Differential fault analysis attack
Differential Manchester Encoding
Differential privacy
Diffie-Hellman
Digest authentication
Digital Asset Management
Digital certificate
Digital Citizenship
Digital Communication
Digital Computer
Digital data
Digital Detox
Digital dystopia
Digital envelope
Digital Evidence
Digital exhaust
Digital Experience Monitoring
Digital fingerprint
Digital footprint
Digital Governance
Digital identity
Digital Legacy
Digital optimization
Digital Performance Management
Digital Preservation
Digital signature algorithm
Digital Signature
Digital switch
Digital twin
Digital Wallets
Digital watermarking
Digitalization
Digitization
Dijkstra Algorithm
Direct connection
Directory traversal attack
Dirty bit
Disassociation attack
Disaster Recovery as a Service (DRaaS)
Disaster Recovery
Discretionary Access Control
Disinformation
Disk-Based Storage
Disk Cloning
Disk defragmentation
Disk Forensics
Disk Partitioning
Disk Scrubbing
Distance vector
Distorting proxy
Distributed Computing
Distributed Energy Resources (DER)
Distributed firewalls
Distributed Ledger Technology (DLT)
Distributed network
Distributed system
Diverse Routing
Diversity in Cybersecurity
DKIM (DomainKeys Identified Mail)
DLL hijacking
DLL injection
DMA Attack
DMA (Direct Memory Access)
DMCA
Demilitarized Zone (DMZ)
DNS AAAA record
DNS blocking
DNS cache
DNS client
DNS encryption
DNS failover
DNS filtering
DNS firewall
DNS flushing
DNS hijacking
DNS hosting
DNS load balancing
DNS MX record
DNS port
DNS propagation
DNS proxy
DNS PTR record
DNS query
DNS rebinding attack
DNS record
DNS redundancy
DNS reflection attack
DNS round-robin
DNS sinkhole
DNS SOA record
DNS SPF record
DNS Spoofing
DNS SRV record
DNS TTL
DNS tunneling
DNS TXT record
DNS zone
DNS (Domain Name System)
DNSSEC
Docker Security
Docker
Document Management System (DMS)
Document versioning
Domain admin
Domain controller
Domain shadowing
Domain spoofing
Domain
Donationware
Dotted decimal notation
Double tagging
Downloader trojan
Downtime
Doxing
DRAM (Dynamic Random Access Memory)
Dridex
Drive-by attack
Driver
DRM-free
Digital Rights Management (DRM)
Dropper
Dropshipping
DSL (Digital Subscriber Line)
DSLAM
Dedicated Short-Range Communication (DSRC)
Dual-homed host
Dumpster diving attack
Duqu
Dwell time
Dynamic analysis
Dynamic Application Security Testing (DAST)
Dynamic Code Analysis
Dynamic DNS
Dynamic IP
Dynamic library
Dynamic Memory Allocation
Dynamic ports
Dynamic Routing
Dynamic website
Dyreza
E
E-commerce
E-government
Extensible Authentication Protocol (EAP)
East-West Traffic
Eavesdropping
Elastic Compute Cloud (EC2)
ECM
Edge caching
Edge Computing
Edge gateway
EDI (Electronic Data Interchange)
Electronic Discovery (eDiscovery)
Egosurfing
Egress filtering
Egress traffic
EHR Security
EIGRP
Elastic IP address
Electromagnetic Eavesdropping
Electromagnetic Interference (EMI)
Electronic intelligence
Electronic signature
Electronic Warfare
Elliptic-curve cryptography
Elliptic Curve Digital Signature Algorithm (ECDSA)
Elliptic-Curve Discrete Logarithm Problem
Email Attachment
Email Authentication
Email bomb
Email Filtering
Email gateway
Email retention policy
Email Security
Email signature
Email Tracking
Email virus
Embedded intelligence
Embedded Systems
Embezzlement
Emission security
Emoji
Emotet
Emoticon
Emotion recognition
Emulator
EMV Card
Encapsulating security payload
Encoding
Encrypted file transfer
Encryption Algorithm
Encryption as a service
Encryption key
Encryption Protocols
Encryption
End-of-Life (EOL)
End-to-end encryption
End-User Experience Monitoring
Endpoint Detection and Response (EDR)
Endpoint device
Endpoint security
Energy Star Certification
Enterprise Mobility Management (EMM)
Erasure coding
Error Checking
Error control
Error-Correcting Code (ECC)
Error detection and correction
Escrow Passwords
Espionage
ETags
EternalBlue
Ethernet Cable
Ethernet Frame
Ethernet Over Power (EOP)
Ethernet Passive Optical Network (EPON)
Ethernet Port
Ethernet
EtherType
Ethical Hacker
ETL (Extract, Transform, Load)
End-User License Agreement (EULA)
Evasion Attacks
Event-driven Architecture
Event log
Evil maid attack
Evil twin
Evolutionary computation
Evolutionary Robotics
Exception Handling
Exfiltration
Exif Data
Exit node
Expert system
Exploit-as-a-service (EaaS)
Exploit chain
Exploit kit
Exploit
Exploitability
Exponential Distribution
Expression language injection
Ext4 (Fourth Extended Filesystem)
Extended ACLs
Extensibility
Exterior gateway protocol
External Hard Drive
Extraction
Extranet
Extreme Programming (XP)
F
Face ID
Facebook stalking
Facial recognition
Factory Reset Protection (FRP)
Factory reset
Factory Settings
Failover
Fake antivirus
False flag
False Negative
Faraday Pouch
Fast flux
FAT32 (File Allocation Table 32)
Fault injection attack
Fault tolerance
Fiber Channel Switch
Fiber Channel
Fiber Distributed Data Interface
Fiber Optic Cable
Fiber-Optic Internet
Fiber optic switch
Fiber to the Home (FTTH)
Fiber to the Node
FIDO (Fast Identity Online)
Fieldbus
File Allocation Table
File binder
File Encryption
File format
File hash
File-hosting service
File integrity monitoring
File-Level Encryption
File Locking
File Permissions
File Sharing
File signature
File System
Fileless attacks
FileRepMalware
FileVault
Fingerprinting
Finite field
FIPS compliance
Firesheep
Firewall rules
Firewall
Firmware Attacks
Firmware over-the-air
Firmware
First-party cookie
Flaming
Flash cookies
Flash Memory
Flash
Flat file
Flooder
Flow routing
Fog computing
Footprinting
Forecasting
Foreign Key
Forensic Analysis
Fork bomb
Form authentication
Format string attack
Formjacking
Forward compatibility
Forward DNS
Forward Error Correction
Forward proxy
Forwarding Tables
FOSS
Four-way handshake
FPS
Fragment overlap attack
Frame Busting
Frame
Frape
Fraud Alert
Fraud as a Service
Fraud Detection
Fraud
Fraudulent Transactions
Freedom of information
Freemium
Freeware
Frequency Analysis
Frequency Band
Frequency-Division Multiplexing (FDM)
FTP proxy
FTP
Full Backup
Full-Disk Encryption
Full duplex
Fullz
Function as a Service (FaaS)
Functional dependency
Fuzz testing
FWaaS
G
Gamification
GandCrab
Garbage Collection
Garbage in, garbage out
Garlic routing
Gatekeeper
Gateway server
Gateway
GDPR
General packet radio service
Generative Adversarial Networks (GANs)
Generative AI
Generic routing encapsulation
Genetic Algorithm
Geo-blocking
Geo-Restrictions
Geospatial Analysis
Geotag Removal Tools
Geotagging
GHOST bug
GhostNet
Ghostware
Gigabit Ethernet
Gigabit interface converter
GIS (Geographic Information Systems)
Git
GitHub
GUID
Globbing
Gnosticplayers
Golden ticket attack
Google dorking
Gopher protocol
Government surveillance
GPS jamming
GPU Acceleration
Graphics Processing Unit (GPU)
Gradient Descent
Granularity
Gray hat hacker
Graymail
Green Data Center
Green hat hacker
Greylist
Greyware
Grid computing
Griefing
Group Policy
Groupware
Grover's Algorithm
Gated Recurrent Unit (GRU)
GSM
GSSAPI
Guessing entropy
Graphical User Interface (GUI)
H
Hackathon
Hacking
Hackintosh
Hacktivism
Half duplex
Halt and Catch Fire
Hamming Code
Hamming distance
Handshake protocol
Hard Drive
Hard link
Hard reboot
Hard reset
Hardening
Hardware acceleration
Hardware-Enforced Virtualization
Hardware Failure
Hardware identification
Hardware Security Module (HSM)
Hardware Security
Hardware virtualization
Hardware Wallet
Hash chain
Hash function
Hashing
HDMI (High-Definition Multimedia Interface)
Headless system
Health Tech
Heap spray
Heat Maps
HermeticWiper
Heuristic analysis
Heuristic virus
Hexadecimal
Hexdump
High Availability
High-Performance Computing (HPC)
High-Speed Serial Interface
Hoax
Home Automation
Home server
Homograph attack
Homomorphic encryption
HoneyMonkey
Honeynet
Honeytoken
Hop count
Host address
Host-based firewall
Host-Based Intrusion Detection System (HIDS)
Host security
Host virtual machine
Hostname
Hosts file
Hot Aisle/Cold Aisle
Hot site
Hot spare
Hotlink
Hotspot Security
HTTP Strict Transport Security (HSTS)
HTML Injection
HTML tag
HTML5
HTTP Basic Authentication
HTTP header
HTTP parameter pollution
HTTP proxy
HTTP request smuggling
HTTP Request
HTTP
HTTPOnly Cookie
HTTPS phishing
HTTPS
Hub and spoke network
Human-Computer Interaction (HCI)
Human firewall
Hybrid active directory
Hybrid attack
Hybrid Cloud
Hybrid computer
Hybrid Drive
Hybrid encryption
Hybrid firewall
Hybrid IT management
Hybrid Recommender Systems
Hyper-Threading
Hyperautomation
Hyperlink
Hyperscale
Hypervisor
I
I/O controller
I2C (Inter-Integrated Circuit)
I2P
Infrastructure as a Service (IaaS)
IAM authentication
IAM (Identity and Access Management)
Ice phishing
ICE
ICMP Flooding
ICS (Industrial Control Systems)
Idempotence
Identity cloning
Identity fabric
Identity Governance and Administration (IGA)
Identity Governance
Identity Management
Identity orchestration
Identity proofing
Identity Provider (IdP)
Identity Theft
Identity Verification
Idle Timeout
Intrusion Detection and Prevention Systems (IDPS)
Intrusion Detection System (IDS)
IEEE 802.11
IEEE 802.1X
IEEE 802
ILOVEYOU
Image Deployment
Image recognition
Image spam
IMEI Blocking
IMEI
Immutable Ledger
Impersonation attack
Implantable Medical Devices
IMSI Catcher
In-Band Management
In-Memory Computing
Incident Management
Incident Response Plan
Incident Response Team
Incident Response
Inclusive Hiring
Incremental Backup
Indexing
Indicators of Compromise (IoC)
Indicators of Attack (IoA)
Industrial IoT (Internet of Things)
Industroyer
Inetd
Inference attack
Information Literacy
Information management
Information processing
Information security policy
Information Security
Information Silos
Information System Security
Infotainment
Infrared
Infrastructure as Code (IaC)
Ingress filtering
Ingress Traffic
Initial access brokers
Initialization vector
Inline frame
Inode
Input Devices
Input layer
Input Validation
Insecure direct object references
Insertion attack
Insider Threat
InstallCore
Instruction Register (IR)
Instruction Set Architecture (ISA)
Integer overflow
Integrated circuit
Integrated drive electronics
Integrated service digital network
Integration Testing
Integrity checking
Intel Virtualization Technology
Intelligent Automation
Intelligent character recognition
Intelligent cloud
Intelligent network
Intelligent web
Interconnection agreement
Interdepartmental Communication
Interface Converter
Interface message processor
Interior gateway protocol
Intermediate Distribution Frame (IDF)
Internal Controls
Internet Addiction
Internet backbone
Internet background noise
Internet bot
Internet Control Message Protocol
Internet Exchange Point (IXP)
Internet key exchange
Internet of Bodies
Internet of Everything
Internet of Medical Things
Internet routing
Internet security
Internet worm
Internet
Interoperability
Interpreter
Interprocess Communication
Intranet
Inversion of Control
I/O Bound
I/O Memory Management Unit (IOMMU)
IoT botnet
IoT gateway
IoT middleware
IoT Security
Internet of Things (IoT)
IP Address Allocation
IP address blocking
IP Address Masking
IP Address
IP Addresses
IP camera
IP forwarding
IP hijacking
IP packet
IP reputation
IP SLA
IP surveillance
IP (Internet Protocol)
IPsec
IPv4 Address Exhaustion
IPv4
IPv6
IS-IS
iSCSI (Internet Small Computer System Interface)
ISO 27001
Isolation Levels
Isolation
ISP
IT Automation
IT Governance
IT Infrastructure
Iterative DNS query
ITIL
ITSM
ITSP (Internet Telephony Service Provider)
Interactive Voice Response (IVR)
J
Jailbreaking
Jammer
Jitter
JSON hijacking
JSON Web Token (JWT)
JSON
JSONP injection
Juice jacking
Jumbo frame
Jump server
Jurisdiction
JWT (JSON Web Token)
K
Kanban
Keepalive
Kerberos
Kerckhoffs’ principle
Kernel Level Exploit
Kernel Panic
Kernel
Key-based Encryption
Key-based routing
Key derivation function
Key Distribution Center (KDC)
Key encryption key
Key escrow
Key exchange
Key fob
Key Management
Key Performance Indicator (KPI)
Key risk indicator
Key rotation
Key schedule
Key Stretching
Keychain
Keygen
Keylogger
Keypunch machine
Killware
Kovter
KRACK attack
Kubernetes Security
Kubernetes
L
L2TP/IPsec (Layer 2 Tunneling Protocol/IPsec)
LAN party
LAN Security
LAN (Local Area Network)
Last Mile
Latency
Lateral movement
Lattice-based access control
Layer 2 Forwarding protocol
Layer 2 Switch
Layer 3 Switch
Layer 4 switch
LDAP (Lightweight Directory Access Protocol)
Leaf-spine architecture
Leakware
Lean
Leased line
Least privilege
Least Recently Used (LRU)
Least Significant Bit
Leeching
Legacy system
License Key
License
Linear-feedback shift register
Link encryption
Link Load Balancing
Link-State Database
Link State Routing
Linux
Live Forensics
Live Migration
Live USB
Liveness Detection
Living off the Land (LotL)
Load balancer
Load balancing router
Loadable kernel modules
Local area connection
Local file inclusion
Localhost
Location intelligence
Locky ransomware
Log Analysis
Log clipping
Log file
Log Integrity
Log Retention
Log Rotation
Log4Shell
Logging
Logic bomb
Logical access
Logical network
Logical Operations
Logical topology
Logjam
LOLBin
LonTalk
Loop-Free Topology
Loop Guard
Loop
Loopback address
Loopback plug
Loss Function
Lossy Compression
Low latency
Long Short-Term Memory (LSTM)
LTE (Long-Term Evolution)
LUN masking
Luring attack
Lurking
M
MAC address
MAC Spoofing
Machine Code
Machine cycle
Machine data
Machine learning
macOS
Macro virus
Madware
Magecart
Magnet link
Mail Server
Main distribution frame
Main Memory
Malicious code
Malleability
Malvertising
Malware Analysis
Malware-as-a-service
Malware Delivery Methods
Malware Injection
Malware obfuscation
Malware sandboxing
Malware
MAM
Man-in-the-Browser Attack
Man trap
Managed file transfer
Managed Hosting
Managed service provider platform
Managed Switch
Management information base
Manchester encoding
Mandatory access control
Markov Chain
MASINT
Masquerade attack
Mass Surveillance
Master boot record
Master password
MBR Malware
MD5
Media access control
Media access unit
Medical Device Security
Medical IoT Security
Melissa virus
Meltdown
Memory Address Register
Memory Address
Memory allocation
Memory Corruption
Memory data register
Memory-driven computing
Memory forensics
Memory Hierarchy
Memory Leak
Memory Management
Memory Mapping
Memory Protection
Memory rootkit
Merge Conflict
Merkle tree
Mesh Network
Mesh node
Mesh Topology
Mesh Wi-Fi System
MESI Protocol
Message broker
Message passing
Message Queue
Message switching
Metadata
MetaMask
Metamorphic Code
Metamorphic Virus
Metasploit
Metrics
Metropolitan area network
MFA bombing
Micro virtual machine
Microarchitecture
Microgrid
Microprocessor
Microsegmentation
Microservices
Midspan
MiFi
Minification
Mining
Misappropriation
Man-in-the-Middle (MitM) Attack
Mix network
Mobile ad hoc network
Mobile Banking
Mobile code
Mobile credential
Mobile Device Management (MDM)
Mobile-First Design
Mobile Hotspot
Mobile malware
Mobile network operator
Mobile Optimization
Mobile Phone Tracking
Mobile proxy
Mobile Security
Mobile Wallet
Modbus
Machine Learning Model Robustness
Model-View-Controller (MVC)
Modem
Modular Programming
Modularity
Modulation
Money Laundering
Money Mule
Monitoring software
Monoculture
Monolithic Architecture
Monte Carlo simulation
Morris worm
Most significant bit
Motherboard
Moves, adds, and changes
MPLS
MPOE
MQTT (Message Queuing Telemetry Transport)
Managed Security Service Provider (MSSP)
Muling
Multi-Cloud Strategy
Multi-Cloud Environment
Multi-core Processing
Multi-core Processor
Multi-factor Authentication (MFA)
Multi-homed
Multi-Tenancy
Multicast Address
Multicast router
Multimedia Container
Multiplayer Online Battle Arena (MOBA)
Multiplexing
Multiprocessor System
Multi-threading
Mutex (Mutual Exclusion)
Mutual authentication
Mutual exclusion
N
N-Tier Architecture
Naive Bayes Classifier
Namespace
Narrowband
NAS
NAT loopback
NAT-PMP
NAT traversal
NAT (Network Address Translation)
Need-to-Know Principle
Nested Conditional Statements
Net neutrality
NetBIOS
Netcat
NetFlow
Netiquette
Netmask
NetScaler
NetSecOps
Netsplit
Netwalker ransomware
Network access control
Network adapter
Network administrator
Network automation
Network Bandwidth
Network based IDS
Network Booting
Network bottleneck
Network bridge
Network configuration management
Network congestion
Network connectivity
Network convergence
Network database
Network degradation
Network detection and response
Network Efficiency
Network encryption
Network Enumeration
Network forensics
Network hub
Network ID
Network information system
Network infrastructure
Network intelligence
Network interface card
Network intrusion
Network Layer Protocols
Network layer
Network management system
Network Monitoring
Network node manager
Network Packet Analyzer
Network prefix
Network processor
Network resilience
Network sandboxing
Network scanning
Network Security Policies
Network Security
Network service provider
Network Slicing
Network socket
Network tap
Network Testing
Network Time Protocol (NTP)
Network topology
Network Traffic
Network virtualization
Neural Network
Newsgroup
Next hop
Near-Field Communication (NFC)
NFV
NIST Special Publications
NIST
Natural Language Processing (NLP)
Nmap
No-Logs VPN
Non-Executable Memory
Non-Volatile Memory
Nonce
Nonlinearity
Nord name
Normal Distribution
North-South Traffic
Northbound interface/Southbound interface
NoSQL
Not-a-virus
NotPetya
NPC (Non-Player Character)
NRZ (Non-Return-to-Zero)
NS Records
NTFS (New Technology File System)
NTP amplification attack
Nuker
Null session
NULL Value
O
OAuth
Obfuscation
Object Detection
Object-Oriented Programming (OOP)
Object Storage
Obsolete Technology
OCSP stapling
Odd parity
Off-Page SEO
Offensive security
Offline Attack
OffSec
OGNL injection
On-Page SEO
On-Premises Infrastructure
One ring scam
One-time pad
One-time password
One-way encryption
Onion domain
Onion Routing
Online Activism
Online Banking Security
Online data storage
Online Grooming
Online Privacy
Online Reputation Management
Online Security
Open DNS Resolvers
Open port
Open Source Security
Open Source
Open system
Open-World Games
OpenFlow
OpenID
OpenPGP
OpenVPN
Operating System Deployment
Operating System Identification
Operating System
Operational level agreement
Operational technology
OPSEC
Optical character recognition
Optical Fiber
Optical line terminal
Optical Network Terminal (ONT)
Optical Transport Network (OTN)
Optimization Algorithm
Orphaned VMs
OSI model
OSINT (Open Source Intelligence)
OSPF
Over-the-Air (OTA) Updates
Out-of-Band Management
Out-of-Order Execution
Output Devices
Overfitting
Overlay network
Overrun
OWASP
P
P2P Network
Platform as a Service (PaaS)
Package Manager
Packet capture
Packet coalescing
Packet filtering
Packet loss
Packet Radio
Packet switching
Packet
Page file
Page Speed
Paging
Pair Programming
Pan-Tilt-Zoom (PTZ) Camera
PAP (Password Authentication Protocol)
Parallel Computing
Parameter tampering
Parameterized Query
Parental controls
Parity Bit
Parity check
Parser
Pass the hash
Pass the Ticket
Passcode
Passive attack
Passive Optical Network (PON)
Passive surveillance
Passphrase
Password Cracking
Password policy
Password sniffer
Password spraying
Password vault
Password
Passwordless
Patch Panel
Patch Tuesday
Patch
Pattern recognition
Payload
Payment Fraud
Payment Gateway
PBX (Private Branch Exchange)
PCI bus
PCI DSS
PCIe Security
PCIe (Peripheral Component Interconnect Express)
Peak Demand
Peering
Penetration Testing
Pentest
Perfect Forward Secrecy (PFS)
Perfect Secrecy
Perimeter firewall
Perimeter security
Peripheral device
Persistent cookie
Personal Data
Personal firewall
Personal VPN
Personal web server
Personalization Engine
Petya
PGP encryption
Pharming
Phishing
Phlashing
PHP injection
Phreaking
Physical Access
Physical address
Physical layer
Physical Network
Physical Security
Piggybacking
PII
PIN Encryption
Ping Flood
Ping of death
Ping sweep
Ping
Pipeline Orchestration
Pipeline
Piracy
Platform-Agnostic
Platform security
Player Agency
Plug-in
Pod slurping
Point of presence (POP)
Point of Sale (POS) System
Point-to-point protocol
Pointer
Policy-Based Management
Polybius Square
Pop-up Windows
Port 80
Port address translation
Port Forwarding
Port knocking
Port mirroring
Port scanning
Port triggering
Port
Portable computer
Portal application
Point-of-Sale (POS) Malware
Post-quantum cryptography
POST (Power-On Self-Test)
Posting
Poweliks
Power-analysis attack
Power distribution unit
Power Line Communication (PLC)
Power Outage
Power over Ethernet
Power Sourcing Equipment (PSE)
Power Surge
Power usage effectiveness
Powered Device (PD)
PowerShell
PPPoE
PPTP (Point-to-Point Tunneling Protocol)
Predictive Analytics
Predictive data mining
Predictive Maintenance
Preemption
Prepared Statement
Presentation layer
Pretexting
Primary Key
Principle of Least Astonishment
Privacy by Design
Privacy Compliance
Privacy-Focused Browsers
Privacy Impact Assessment
Privacy Laws
Privacy Notice
Privacy policy
Privacy Regulations
Privacy Settings
Private Cloud
Private internet access
Privilege escalation
Privileged Access Management
Privileged access workstation
Privileged User
Proactive defense
Probability Distribution
Procedural Programming
Process Explorer
Process hollowing
Process Injection
Process Scheduling
Product Activation
Product cipher
Product Key
Production Environment
Profiling
Programmable Logic Controllers (PLCs)
Project Management Software
Project Scope Creep
Promiscuous mode
Propagation delay
Proprietary information
Proprietary software
Protocol conversion
Protocol Converter
Protocol Data Unit (PDU)
Protocol Mismatches
Protocol stack
Protocol
Provider Edge (PE) Router
Proxy Authentication
Proxy Server
Proxy surfing
Proxy
Pseudocode
Pseudonym
Pseudonymization
PsExec
Public and Private Keys
Public cloud infrastructure
Public Cloud Storage
Public Cloud
Public domain software
Public IP
Public Key Cryptography
Public key encryption
Public key infrastructure
Public proxy
Pull Request
Potentially Unwanted Programs (PUPs)
Purple team
PvE
PvP
PWN
PXE Server
Q
Qbot
QoS (Quality of Service)
QPSK (Quadrature Phase-Shift Keying)
QR code phishing
Quadrature Amplitude Modulation (QAM)
QuadRooter
Quality Assurance (QA)
Quantum cryptography
Quantum error correction
Quantum hacking
Quantum logic gates
Quantum Supremacy
Qubit
Quid pro quo attack
R
Race condition
Rack-Mountable
Radio Frequency (RF) Spectrum
RADIUS (Remote Authentication Dial-In User Service)
RAID 5
RAID
Rainbow Table
RAM scraping
RAM
Ransomware-as-a-Service (RaaS)
Ransomware Insurance
Rapid Spanning Tree Protocol (RSTP)
RARP
Rate Limiting
Role-Based Access Control (RBAC)
RC4
RC5
RC6
Relational Database Management System (RDBMS)
RDP (Remote Desktop Protocol)
Real-time communications
Real-time computing
Real-time data
Real-Time Operating System (RTOS)
Real-Time Protocol (RTP)
Real User Monitoring (RUM)
Recommendation engine
Reconnaissance
Recovery Key
Recovery mode
Recovery time objective
Recurrent neural network
Recursive DNS Query
Red hat hacker
Red team
Redaction
RedHack
Redundancy
Redundant hardware
Refactoring
Referential Integrity
Referrer-Policy
Regional internet registry
Registry editor
Registry Hives
Registry
Regression Testing
Regular Expressions
Regulatory Compliance
Reinforcement Learning
Relay Attack
Relay server
Remote access server
Remote access trojan
Remote Access VPN
Remote Access
Remote Administration
Remote attack
Remote Attestation
Remote code execution
Remote desktop
Remote infrastructure management
Remote Monitoring and Management (RMM)
Remote outdoor router
Remote Power Management
Remote procedure call
Remote Sensing
Remote shell
Remote Thread Injection
Remote Wipe
Renewable Energy
Repeater
Replay attack
Replication
Repository
Representation in Tech
Reputation Management
Reputation System
Resale Market
Reshipping
Resident virus
Residential Proxy
Residual risk
Resilience Testing
Resource exhaustion
RPKI (Resource Public Key Infrastructure)
Response time
Responsive Web Design
REST API
Retail Cybersecurity
Return-Oriented Programming (ROP)
Return-to-Zero (RZ)
Reverse DNS
Reverse engineering
Reverse-path forwarding
Reverse Proxy
REvil ransomware
RFC1918
RFID blocking
RFID Skimming
RFID tag
RFID (Radio Frequency Identification)
Rich internet application
Rijndael
Ring network
Routing Information Protocol (RIP)
RISC (Reduced Instruction Set Computing)
Risk Analysis
Risk assessment
Risk modeling
Risk monitoring
Risktool
Riskware
Robocalls
Robotic Process Automation (RPA)
Rogue access point
Rogue device
Rogue DHCP Server
Rogueware
Role-Playing Games (RPGs)
Rollback definition
Root access
Root Bridge
Root Cause Analysis
Root of trust
Root server
Root user
Rooting
Rootkit
Rotating proxy
Round Robin
Round-trip time
Route flapping
ROA (Route Origin Authorization)
Route Poisoning
Route summarization
Route Table
Router Security
Router
Routing Algorithm
Routing loop
Routing Protocol
Routing table
Routing
Rowhammer
RPG
RPO
RS-232
RSA (Rivest-Shamir-Adleman)
Rubber duck debugging
Runtime Application Self-Protection (RASP)
Runtime Monitoring
Ryuk ransomware
S
S/Key
Software as a Service (SaaS)
Sabotage
Simultaneous Authentication of Equals (SAE)
Safe mode
Salami fraud
Salting
Same-Origin Policy
SameSite Attribute
SAN (Storage Area Network)
Sandbox escape
Sandbox Games
Sandboxing
Static Application Security Testing (SAST)
SCADA (Supervisory Control and Data Acquisition)
Scalability
Scale-out storage
Scale-Up Storage
Scam
Scanning attack
Scareware
Scatternet
Scraper Bots
Screen lock
Screen scraping
Screen Time Management
Screened subnet firewall
Script Kiddie
Scripting Language
Scrum
Scunthorpe problem
SD Cards
SD-WAN
Software-Defined Networking (SDN)
Search Engine Indexing
Seasonal Adjustment
SECaaS
Second-party fraud
Secret key
Secure boot
Secure connection
Secure cookie
Secure Electronic Transactions
Secure enclave
Secure erase
Secure File Deletion
Secure File Transfer
Secure Multiparty Computation (SMC)
Secure print
Secure software development lifecycle
Secure Software Development
Security Analytics
Security assessment
Security audit
Security automation
Security Awareness Training
Security by Design
Security Clearance
Security Content Automation Protocol
Security Controls
Security domain
Security event management
Security Group
Security Headers
Security identifier (SID)
Security Incident
Security Key
Security Monitoring Systems
Security monitoring
Security Orchestration
Security policy
Security software
Security Testing
Security through obscurity
Security token
Seeding
Segment routing
Segment
Self-destructing email
Self-healing Networks
Self-signed certificate
Self-sovereign identity
Semaphore
Sensitive Data
Sentiment analysis
Separation of duties
SerDes
Serial ATA (SATA)
Serial Communication
Serial port
Serial server
Serialization Vulnerability
Serialization
Server Farm
Server hosting
Server Message Block
Server redundancy
Server Security
Server-side Attacks
Server-Side Request Forgery (SSRF)
Server
Serverless
Service Desk
Service Level Agreement (SLA)
Service Level Agreement (SLA)
Service pack
Service Ticket
Session cookie
Session Fixation
Session hijacking
Session Initiation Protocol (SIP)
Session key
Session layer
Session Persistence
Session token
Sextortion
Secure File Transfer Protocol (SFTP)
SHA-1
SHA-256
Shadow copy
Shadow Password Files
Shadowsocks
Shamoon
Shared Hosting
Shared IP
Shared Memory
Shared proxy
Shared storage
Sharenting
Shareware
Sharking
Shell
Shellcode
Shift Left
Shimming attack
Shodan search engine
Shor's Algorithm
Shoulder surfing
Shylock
Side-channel attack
Sidejacking
Sideloading
SIEM (Security Information and Event Management)
SIGINT
Signal Amplification
Signal Blocking
Signal Interception
Signal-to-Noise Ratio (SNR)
Signaling gateway
Signaling System 7 (SS7)
Signals analysis
Signature-based Detection
Signature verification
SIM Card Cloning
SIM Card
SIM Swapping
SIM toolkit
Simple Network Management Protocol (SNMP)
Single-factor authentication
Single Sign-On (SSO)
SIP proxy
SIP Trunking
SIP URI (Uniform Resource Identifier)
Site survey
Skimmer
Smart bulb
Smart card
Smart contract
Smart grid
Smart Home Hub
Smart Home Technology
Smart Home
Smart meter
SMIME
Smishing
SMS Interception
SMS spoofing
SMTP (Simple Mail Transfer Protocol)
Smurf attack
Smurfing
Snake malware
Sneaker bot
Sneakernet
SNMP Trap
SNMPv3
Snooping Protocol
Snort
Snowshoe spam
SOC as a service
SOC (Security Operations Center)
Social engineering
Social profiling
Sockets
SOCMINT
Soft copy
Soft Reboot
Softlifting
Software assurance
Software Bug
Software Composition Analysis (SCA)
Software-defined infrastructure
Software-Defined Storage (SDS)
Software Development Lifecycle (SDLC)
Software License Agreement
Software Licensing
Software package
Software piracy
Software repository
Software Security
Software Supply Chain Security
Source Code
Spam Filter
Spam
Spambot
Spanning Tree Protocol
Spatial Data
Spear phishing
Spectre
Speculative Execution
SPF (Sender Policy Framework)
SPI (Serial Peripheral Interface)
Split DNS
Split Horizon
Spoofing
Spooling
SpyEye
Spyware
SQL injection
Structured Query Language (SQL)
SSD (Solid State Drive)
SSH Key
SSH (Secure Shell)
SSID
SSL Certificate
SSL offloading
SSL Stripping
SSL VPN
SSL (Secure Sockets Layer)
Stack Canaries
Stack smashing
Stack Trace
Staging server
Stakeholder Engagement
Stalkerware
Standard ACLs
Star Network
STARTTLS
State
Stateful firewall
Stateful Packet Inspection
Static Analysis
Static data
Static IP
Static NAT
Static routing
Static Website
Stealth Malware
Stealth virus
Stealth VPN
Steganalysis
STEM
Sticky bit
Sticky session
STIX and TAXII
Stochastic Gradient Descent
Stochastic Modeling
Storage as a Service
Storage automation
Storage capacity
Storage Device
Storage over Internet Protocol
Storage virtualization
Storm worm
Stream cipher
Stream Processing
Streaming network telemetry
Stress testing
Strong authentication
Structured Cabling
Structured Data
Structured prediction
Structured Programming
Structuring
Stub network
STUN
Stuxnet
Subdomain Takeover
Subnet Mask
Subnet
Subscription-based Model
Substitution cipher
Subtyping
Super cookie
Super-Server
Supercomputing
Superkey
Supernetting
Superposition
Superuser
Supervised Learning
Supply Chain
Surveillance Cameras
Surveillance Capitalism
Surveillance
svchost.exe
Swap Space
Switch
Switching fabric
Switching loop
Sybil attack
Symbian
Symbolic Link
Symmetric Encryption
Symmetric Key Algorithm
SYN Cookies
SYN flood
Synchronization
Synchronous optical networking
Synchronous Transmission
Synthetic data
Synthetic Identity Fraud
Synthetic Media
Synthetic Monitoring
Sysinternals
Syslog
Sysmon
System Bus
System Crash
System file
System integrity protection
System migration
System Recovery
System security
System Testing
T
Tabnabbing
Tactics, Techniques, and Procedures (TTPs)
Tailgating
Taint analysis
Tamper Resistance
Tampering attack
Targeted attacks
Tarpitting
Task Manager
TCP handshake
TCP/IP
TCP reset attack
TCP Wrapper
TCP (Transmission Control Protocol)
TDD (Time Division Duplex)
Teardrop attack
Tech support scam
Technical Debt
Telecommunications equipment
Telecommunications Fraud
Telecommunications Infrastructure
Telecommunications Security
Telematics
Telemedicine Security
Telemetry
Telephony Denial of Service (TDoS)
Telnet
TEMPEST shielding
The Tempest
Template injection
Terminal adapter
Terminal emulation
Terminal master key
Terminal node controller
Terminal
Terms of Service (TOS)
Terrorist Threats
TeslaCrypt
Tethering
Text Mining
The kill chain
Thick client
Thin Client
Third-Party Assessment Organization (C3PAO)
Third-party cookie
Third-party risk management
Thrashing
Thread Priority
Thread Starvation
Threat actor
Threat assessment
Threat hunting
Threat Intelligence
Threat landscape
Threat Modeling
Threat monitoring
Throttling
Throughput
Throwing Exceptions
Thumb drive
Ticket-Granting Ticket (TGT)
Tiger team
Time bomb
Time-division multiplexing
Time Drift
Time Series Analysis
Time Synchronization
Timestamp Analysis
Timestomping
Timing attack
Timing Channel
TLD (Top-Level Domain)
TLS (Transport Layer Security)
TOCTOU attack
Token Authentication
Token ring
Tokenization
Tool kit
Top-down design
Topic Modeling
Tor
Torrent
Touch ID
Traceroute
Tracking pixel
Tracking
Traffic Analysis
Traffic Engineering
Traffic Optimization
Traffic Redirection
Traffic shaping
Transaction Laundering
Transaction
Transactional data
Transactions per second
Transceiver
Transcoding
TRANSEC
Transit Network
Transmitter
Transparent bridge
Transparent proxy
Transponder
Transport Layer Protocols
Transport layer
Transposition cipher
Trialware
TrickBot
Trivial File Transfer Protocol
Trojan
Trolling
True positives
Trunking
Trust Score
Trusted computing
Trusted Platform Module (TPM)
Trustworthy AI
Truth Tables
Try-Catch Blocks
TTL (Time to Live)
Tunneling
Two-phase commit
Type 1 Hypervisor
Typecasting
Typosquatting
U
U2F
UART (Universal Asynchronous Receiver-Transmitter)
Ubiquitous computing
UDP Flood
UDP Hole Punching
UDP (User Datagram Protocol)
UEBA
UEFI Password
UEFI rootkit
UEFI (Unified Extensible Firmware Interface)
Unauthorized access
Uncertainty Modeling
Unconscious Bias
Underfitting
Unicast address
Unicast
Unicode
Unified Communications
Unified computing system
Unified Monitoring
Uniform Resource Name (URN)
Uninterruptible Power Supply (UPS)
Unit Testing
Unix
Unknown host
Unlabeled data
Unmanaged Switch
Unstructured Data
Unsupervised Learning
Update
UPnP
Uniform Resource Identifier (URI)
URL filtering
URL hijack
URL injection
URL redirection attack
Uniform Resource Locator (URL)
Usability Testing
USB Condom
USB Data Blocker
USB debugging
USB Drive-by Attack
USB drop attack
USB Flash Drive
USB Phishing
USB Port
USB Restricted Mode
USB Rubber Ducky
USB
Use-after-free
Usenet
User Acceptance Testing (UAT)
User Access Control
User Account Control
User agent
User authentication
User-Centric Security
User Consent
User Experience (UX)
User Interface (UI)
User Provisioning
Username
UTF-8
UTM network
UUID
UXSS
V
V2Ray protocol
Vampire tap
Van Eck phreaking
Vanity domain
vCPE
Vehicle-to-Infrastructure
Vehicle-to-Vehicle (V2V)
Vehicular Ad Hoc Networks (VANETs)
Vendor Lock-In
Vendor Security
VeriChip
Verifiable Credentials
Version Control
Video Analytics
Video Surveillance
Virtual address
Virtual desktop infrastructure
Virtual environment
Virtual firewall
Virtual host
Virtual IP address
Virtual machine migration
VM Sprawl
Virtual Machine (VM)
Virtual private LAN service
Virtual routing and forwarding
Virtual Storage Area Network (VSAN)
Virtual switch
Virtual terminal
Virtualization Security
Virtualization
Virus
Vishing
Visitor-based networking
VLAN hopping
VLAN trunking protocol
VLAN (Virtual Local Area Network)
VLSM
VM escaping
vMem
Voice Assistant
Voice intrusion prevention system
Void pointer
VoIP
Volatile Memory
Volatility
Voltage Fluctuation
VPN appliance
VPN Authentication
VPN concentrator
VPN firewall
VPN gateway
VPN hardware
VPN Logging Policies
VPN Protocols
VPN Security
VPN token
Virtual Private Network (VPN)
VPNaaS
Virtual Private Server (VPS) Hosting
vRealize automation
Vulnerability assessment
Vulnerability disclosure
Vulnerability Management
Vulnerability scanner
Vulnerability
W
Wabbit
Web Application Firewall (WAF)
Wake-on-LAN (WoL)
Wallet
WAN aggregation
WAN mini port
WAN optimizer
WAN port
WAN
War driving
War texting
Warchalking
Wardialing
Wardriving
Warez
Warm boot
Warshipping
Warwalking
Waterfall Model
Watering hole attack
Watermarking
Wavelength Division Multiplexing (WDM)
Wearable computer
Web access management
Web authorization management
Web beacon
Web Browser Security
Web content management
Web Crawler
Web Filtering
Web Hosting
Web protection
Web security gateway
Web Server
Web shell
Webhook
Website defacement
WEP crack
WEP (Wired Equivalent Privacy)
Whaling
Whistleblower
White Box Testing
White hat hacker
Whitebox cryptography
Whitelist
Wi-Fi 6 (802.11ax)
Wi-Fi Direct
Wi-Fi Extender
Wi-Fi Security
Wi-Fi Sniffing
Wildcard certificate
Wildcard Characters
Windowing
Windows Deployment Services
Windows Event Log
Windows Remote Management
Windows Security
Windows Services
Wiper
Wire transfer fraud
Wired Network
Wireguard
Wireless Access Point
Wireless bridge
Wireless Broadband
Wireless Encryption
Wireless fidelity
Wireless Intrusion Detection System (WIDS)
Wiretapping
WLAN Security
WLAN (Wireless LAN)
WMI Abuse
WMN network
Word size
Workflow Automation
Workstation
World Wide Web (WWW)
Worm
WPA (Wi-Fi Protected Access)
WPAN
X
X.509
XDR
Xinetd
XML bomb
XML external entity (XXE)
XML Injection
XProtect
XSS
Y
Yak shaving
Yellow hat hacker
Ysoserial
YubiKey
Z
Z-Wave
Zero-click attack
Zero-configuration networking
Zero day
Zero-knowledge
Zero-latency enterprise
Zero trust
Zeus virus
Zigbee
Zip bomb
Zombie computer
Zombie cookies
Zone-based firewall
Zone file
Zone Transfer