Glossary
Over 301 definitions covering cybersecurity, IT infrastructure, and cloud computing. Complex IT concepts explained in plain language.
A
Access Management
Access Management is the process of controlling and monitoring who has access to an organization's IT resources and to what extent. It includes managing user identities, permissions, and access policies to ensure that only authorized individuals can access data and systems.
AI Act
AI Act is an EU regulation establishing requirements for artificial intelligence systems. AI Act classifies AI systems by risk (unacceptable, high, limited, minimal) and introduces obligations for providers and users, including transparency, testing, and human oversight requirements.
AI Security
AI Security is a cybersecurity discipline focused on protecting artificial intelligence systems from attacks and securing organizations against threats arising from AI usage.
Amazon Web Services (AWS)
Amazon Web Services (AWS) is a comprehensive and widely adopted cloud platform offered by Amazon. AWS provides a broad range of infrastructure services such as compute power, data storage, databases, analytics, networking, mobile tools, developer tools, management and monitoring, security, and enterprise applications.
Anonymization
Anonymization is the process of transforming personal data in such a way that the person to whom the data relates cannot be identified, even with the use of additional information. The goal of anonymization is to protect individuals' privacy by removing or modifying identifying data, making it impossible to link them to specific persons.
Anti-DDoS
Anti-DDoS is a set of technologies and strategies designed to protect networks, servers, and applications from Distributed Denial of Service (DDoS) attacks. DDoS attacks involve overloading network or server resources by simultaneously sending massive amounts of traffic from multiple infected devices, leading to service disruption or complete shutdown.
Antimalware
Antimalware is software designed to detect, prevent, and remove malicious software (malware) from computer systems. Malware includes viruses, trojans, worms, spyware, adware, ransomware, and other harmful programs that can damage computer systems, steal data, or disrupt normal device operation.
Antivirus
Antivirus is software designed to detect, neutralize, and remove computer viruses and other malicious programs such as trojans, worms, spyware, or adware. Antivirus protects computer systems from infections that can cause file damage, data theft, system slowdown, or other IT security problems.
API
API (Application Programming Interface) is a set of rules and protocols enabling communication between different applications. API allows for data and function exchange between software, enabling system integration and creation of new applications based on existing services.
API Security Testing
API security testing is the process of evaluating and verifying the security of Application Programming Interfaces (APIs) to detect and fix potential vulnerabilities and threats. These tests aim to ensure that APIs are resistant to attacks and unauthorized access, protecting application data and resources.
Application Security
Application security encompasses a set of practices, tools, and processes aimed at identifying, preventing, and responding to potential threats to applications. It applies to web, mobile, and desktop applications. The goal is protection against unauthorized access, modification, or destruction of data, and ensuring application continuity.
APT Attack
APT (Advanced Persistent Threat) is an advanced, long-term cyber attack conducted by highly skilled actors, often state-sponsored. APT attacks are characterized by sophisticated techniques, targeted approach, and multi-month or multi-year presence in victim systems.
Artificial Intelligence
Artificial Intelligence (AI) is a field of computer science focused on creating systems and algorithms that can perform tasks requiring human intelligence. AI encompasses machines' ability to learn, reason, solve problems, recognize patterns, understand natural language, and make decisions.
Attack Surface
Attack Surface is the sum of all points through which an unauthorized user can attempt to enter data or extract information from a system. The larger the attack surface, the more potential attack vectors.
Attack Surface Management
Attack surface management is the process of identifying, analyzing, monitoring, and minimizing all potential entry points through which attackers can gain unauthorized access to an organization's systems, networks, and data. It includes a holistic view of external and internal IT resources that may be exposed to cyber attacks.
Authentication
Authentication is the process of verifying the identity of a user, device, or system attempting to access digital resources. It is a key element of cybersecurity, aimed at ensuring that only authorized entities can use protected resources.
Authorization
Authorization is the process of granting users permissions to access specific resources in information systems. It involves determining what actions a user can perform after successful authentication. Authorization is a key element of access management, ensuring that only authorized individuals can use specific functions, data, or services.
B
Backdoor
A backdoor is a hidden method of bypassing standard authentication or encryption mechanisms in a computer system, application, network, or device. Backdoors can be intentionally built in by developers for future system access or installed by cybercriminals to gain unauthorized access.
Backup
Backup, also known as a backup copy or safety copy, is the process of creating a duplicate of data to protect it from loss. Backup involves copying files, folders, databases, or entire systems to a separate medium or location to enable data recovery in case of loss, damage, or unavailability.
Baiting
Baiting is an advanced form of psychological manipulation in which an attacker exploits deeply rooted human desires and emotions. The goal is to create a situation where the victim, driven by curiosity, greed, or other strong impulses, takes actions potentially harmful to themselves or their organization.
Blue Team
Blue Team is a group of cybersecurity specialists responsible for defending an organization's information systems against cyberattacks. This team focuses on detecting, analyzing, and responding to security threats, as well as strengthening the organization's overall security posture.
Bot
A bot is a computer program designed to perform repetitive tasks in an automated manner. The name 'bot' comes from the word 'robot.' Bots are based on artificial intelligence algorithms and aim to mimic human behaviors, especially in the context of online interactions.
Botnet
A botnet is a network of infected computer devices (called bots or zombies) that are remotely controlled by cybercriminals. The name botnet comes from combining the words 'robot' and 'network'. Botnets consist of many devices - from personal computers to IoT devices - that have been infected with malware allowing the attacker (botmaster) to take control of them without the owners' knowledge.
Breach and Attack Simulation
Breach and Attack Simulation (BAS) is an innovative approach to cybersecurity that uses automated tools to continuously simulate a full attack cycle on an organization's infrastructure. BAS allows organizations to test their defenses against simulated cyberattacks, identify security gaps, and evaluate the effectiveness of existing protective mechanisms.
Brute Force
A brute force attack is a security-breaking method that involves systematically checking all possible combinations to discover the correct password or key. The attacker tries to 'guess' the password by testing various combinations one by one until finding the right one.
Business Continuity Management
Business Continuity Management (BCM) is a comprehensive management process that identifies potential threats to an organization and their impact on business operations. BCM provides a framework for building organizational resilience and the ability to effectively respond to crisis situations, protecting the interests of key stakeholders, reputation, and brand of the organization.
Business Email Compromise
Business Email Compromise (BEC) is an advanced type of phishing attack in which cybercriminals impersonate trusted individuals or organizations to induce victims to perform specific actions, most commonly money transfers or disclosure of confidential information. BEC uses social engineering techniques and often relies on thorough reconnaissance of the attacked company's structure and processes.
BYOD (Bring Your Own Device)
BYOD, or Bring Your Own Device, is a policy that allows employees to use their own devices, such as laptops, smartphones, and tablets, for work purposes. The BYOD policy has gained popularity in recent years, enabling employees greater flexibility and convenience at work.
C
CASB
CASB (Cloud Access Security Broker) is a security solution positioned between users and cloud service providers. CASB provides visibility into SaaS usage, protects data in the cloud, detects threats, and enforces security policies for cloud applications.
Change Management
Change management is a systematic process of planning, implementing, monitoring, and evaluating changes in an organization to minimize disruptions and maximize benefits from these changes. It includes managing technological, process, organizational, and cultural changes to ensure smooth transition and adaptation to new conditions.
CIEM
CIEM (Cloud Infrastructure Entitlement Management) is a cloud security solution category that manages permissions and access in multi-cloud environments. CIEM detects excessive permissions, unused accounts, and risky IAM configurations in AWS, Azure, and GCP.
CIS (Center for Internet Security)
CIS is an organization dedicated to creating and promoting best practices in cybersecurity. It develops globally recognized standards, tools, and resources that help organizations protect against cyber threats.
CIS Security Audit
A CIS security audit is a thorough assessment of an organization's IT systems based on Center for Internet Security (CIS) standards. CIS is a non-profit organization that develops and promotes cybersecurity best practices. The CIS security audit aims to detect security vulnerabilities, assess compliance with CIS guidelines, and ensure the organization follows best information security practices.
Cloud Data Protection
Cloud data protection refers to a set of practices, technologies, and policies aimed at securing data stored and processed in cloud environments from unauthorized access, loss, modification, and other threats. This includes both data at rest and data in transit.
Cloud Environment Management
Cloud environment management is a comprehensive process of overseeing, optimizing, and controlling cloud resources and services used by an organization. It includes a range of activities aimed at ensuring effective functioning of cloud infrastructure, including performance monitoring, cost management, security and compliance assurance, and resource utilization optimization.
Cloud Environment Security
Cloud environment security refers to the technologies, procedures, policies, and control mechanisms used to protect cloud-based data, applications, and services. The goal is to ensure the confidentiality, integrity, and availability of cloud resources, as well as protection against unauthorized access, attacks, and other threats.
Cloud Management
Cloud management is the process of administering, controlling, and optimizing cloud resources such as servers, storage, networks, and applications to ensure their efficient and secure operation. This includes managing cloud infrastructure, cloud services, and data stored in the cloud.
Cloud Migration
Cloud migration is the process of moving data, applications, computing power, and other digital resources from local data centers to a cloud service provider's infrastructure. This can include moving applications, databases, development platforms, and other technologies supporting organizational operations to the cloud.
Cloud Solutions
Cloud solutions are a model of delivering IT services in which computing resources, storage, applications, and other IT services are provided over the internet. Instead of locally storing and processing data on their own servers, users can use resources delivered by external cloud service providers.
CNAPP
CNAPP (Cloud-Native Application Protection Platform) is an integrated platform combining multiple cloud security tools: CSPM, CWPP, CIEM, and container security. CNAPP provides comprehensive protection for cloud-native applications from development to runtime.
Code Review
Code review, also known as code inspection or code review, is the process of systematic source code analysis by other developers to detect errors, improve code quality, and share knowledge within the team. It is a key element of the software development process, involving verification of code before its inclusion in the main project branch.
Computer Network
A computer network is a system of interconnected electronic devices that can exchange data and resources. It enables communication between computers, servers, smartphones, and other devices, allowing them to share information, applications, and hardware resources.
Computer Virus
A computer virus is a type of malicious software designed for self-replication and spreading to other computers. Computer viruses can modify or destroy data, disrupt computer system operations, and utilize system resources without user consent.
Configuration Management
Configuration management is the process of identifying, controlling, maintaining, and verifying the configuration of hardware, software, and documentation in an organization's IT systems. It includes tracking and managing configuration changes, ensuring consistency and integrity of IT systems.
Configuration Review
Configuration review is a systematic process of evaluating and verifying settings and configurations of IT systems, network devices, and applications to ensure they comply with security policies, industry standards, and best practices. The goal of configuration review is to identify and correct potential vulnerabilities and non-compliance that may pose a threat to IT security.
Consulting Services
Consulting services in the field of cybersecurity are professional advice and support offered to organizations to improve their information security level. Cybersecurity consultants help companies identify, assess, and manage risks related to cyber threats, as well as develop and implement effective protection strategies.
Cracking
Cracking is the process of breaking software security to gain unauthorized access to systems, data, or services. Cracking is often associated with reverse engineering, involving analysis and modification of compiled programs to bypass their protections without access to source code. Cracking is usually illegal and involves copyright infringement.
Credential Stuffing
Credential stuffing is an automated attack using stolen username/password combinations from data breaches to attempt logins on other services. The attack exploits password reuse by users across different platforms.
Crisis Management
Crisis management is a systematic process of preparation, response, and recovery of control in crisis situations that may threaten the functioning of an organization, its reputation, or security. In the context of cybersecurity, crisis management focuses on minimizing the effects of incidents related to information and IT system security.
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS) is a type of attack on web applications in which an attacker injects malicious code (usually JavaScript scripts) into website content, which is then displayed to other users. The goal of XSS attacks is data theft, user session hijacking, content manipulation, or other malicious activities.
Cryptojacking
Cryptojacking is the unauthorized use of computing resources (servers, computers, browsers) for cryptocurrency mining. Attackers install cryptominers on compromised systems or inject mining scripts into websites to profit at the expense of victims.
CSPM (Cloud Security Posture Management)
CSPM (Cloud Security Posture Management) is a category of cloud security tools that automatically detect and remediate misconfigurations, compliance violations, and security risks in IaaS, PaaS, and SaaS environments.
CVE
CVE (Common Vulnerabilities and Exposures) is an international system for identifying and cataloging publicly known security vulnerabilities. Each vulnerability receives a unique CVE identifier that allows unambiguous reference to a specific security issue.
CWPP
CWPP (Cloud Workload Protection Platform) is a security solution that protects workloads in the cloud - virtual machines, containers, and serverless functions. CWPP provides runtime protection, vulnerability management, and compliance for workloads regardless of location.
Cyber Hygiene
Cyber hygiene is a set of fundamental practices and behaviors that users and organizations should regularly follow to maintain the security of systems, networks, and data. The NIS2 Directive requires implementation of cyber hygiene practices as one of the mandatory risk management measures.
Cyber Kill Chain
Cyber Kill Chain is an attack model developed by Lockheed Martin describing seven stages of a cyber attack: Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control, Actions on Objectives. The model helps understand and break the attack chain.
Cyber Resilience Act
Cyber Resilience Act (CRA) is an EU regulation establishing cybersecurity requirements for products with digital elements. CRA requires manufacturers to implement security by design, provide security updates, and report vulnerabilities throughout the product lifecycle.
Cyber Resilience Services
Cyber resilience services are a set of actions, strategies, and technologies aimed at increasing an organization's ability to protect against cyber threats, respond quickly to incidents, and minimize the effects of attacks. The goal of these services is to strengthen the overall resilience of the organization against cyber threats.
Cyberattack
A cyberattack is the deliberate use of computer technology to damage, disrupt, or gain unauthorized access to computer systems, networks, or data. Cyberattacks can include various activities such as installing malware, data theft, conducting Denial-of-Service (DoS) attacks, and manipulating communication between users.
Cybersecurity
Cybersecurity is a collection of techniques, processes, and practices used to protect computer systems, networks, devices, programs, and data from attacks, damage, or unauthorized access. Cybersecurity encompasses various protection measures aimed at ensuring the confidentiality, integrity, and availability of information processed in cyberspace.
Cybersecurity Incident Management
Cybersecurity incident management is the process of identifying, analyzing, responding to, and restoring normal operations after incidents related to information security. These incidents may include hacker attacks, data breaches, malware, phishing, and other cyber threats.
D
DaaS (Desktop as a Service)
DaaS (Desktop as a Service) is a cloud-based virtual desktop delivery model in which a service provider hosts the desktop virtualization back-end infrastructure. DaaS enables users to access a fully functional desktop environment from any device and location via the internet.
Dark Web
The Dark Web is a part of the internet not accessible through standard browsers, requiring special software (e.g., Tor) for access. It is used for both anonymous communication and illegal activities.
Darknet
Darknet is a hidden part of the internet that is not accessible through standard web browsers and requires special tools to access, such as Tor, I2P, or Freenet. Darknet is characterized by a high degree of anonymity and privacy, which makes it often used for both legal and illegal purposes.
DAST (Dynamic Application Security Testing)
DAST (Dynamic Application Security Testing) is a method of application security testing by simulating attacks on a running application from the outside, without access to source code, detecting runtime vulnerabilities such as configuration errors, authentication problems, or dependency vulnerabilities.
Data Center
A Data Center is a specially designed facility or group of facilities intended for storing, processing, and managing large amounts of data and IT infrastructure. Data centers are a key element of modern digital infrastructure, ensuring the continuity of critical information systems.
Data Classification
Data classification is the process of categorizing an organization's data by sensitivity level and protection requirements. Classification enables applying appropriate security controls for different data types and is the foundation of information protection programs.
Data Loss Prevention (DLP)
Data Loss Prevention (DLP) is a comprehensive approach to data protection, encompassing a set of processes, procedures, and tools aimed at preventing loss, misuse, or unauthorized access to sensitive information. DLP focuses on identifying, monitoring, and protecting data in three key states: in use, in transit, and at rest.
Data Protection
Data protection is a set of practices, policies, and technologies aimed at securing data from unauthorized access, use, disclosure, modification, or destruction. It includes both personal data and business data that are crucial for organizational operations.
Data Recovery
Data recovery is the process of restoring data that has been lost, deleted, damaged, or become inaccessible for various reasons. This process can include recovering data from various media such as hard drives, SSDs, USB drives, memory cards, as well as from file systems and databases.
DDoS
DDoS (Distributed Denial of Service) is a type of cyberattack that overloads a system or network service by flooding it with an enormous amount of fake traffic, leading to resource unavailability for legitimate users.
Deepfake
Deepfake is a technology that uses artificial intelligence and deep learning to create realistic but fake video, audio, or image materials in which people's faces or voices are replaced or synthetically generated.
Desktop Application Security Testing
Desktop application security testing is the process of evaluating and verifying the security of computer programs installed and run locally on user computers. The goal of these tests is to identify and eliminate potential security vulnerabilities that could be exploited by attackers to gain unauthorized access to the system or user data.
DevOps
DevOps is a methodology that combines software development and IT operations to improve collaboration, automate processes, and shorten the lifecycle of information systems. DevOps emphasizes continuous delivery, integration, and automation, enabling faster and more reliable deployment of software changes.
DevSecOps
DevSecOps, an acronym for Development, Security, and Operations, is an approach to software development that integrates security practices at every stage of the application lifecycle. DevSecOps brings together development, operations, and security teams to ensure security is considered from the very beginning, not added at the end.
Disaster Recovery
Disaster Recovery (DR) is a set of processes, policies, and procedures aimed at restoring an organization's critical IT infrastructure after a natural or man-made disaster. The goal of DR is to minimize downtime and data loss, enabling the organization to quickly return to normal operations.
Disk Array
A disk array is an advanced data storage system that combines multiple hard drives into a single logical unit. This enables managing large amounts of data more efficiently and securely. Disk arrays are used to ensure high availability, performance, and data redundancy.
DKIM
DKIM (DomainKeys Identified Mail) is an email authentication method using digital signatures. The sending server signs messages with a private key, and the recipient verifies the signature using a public key in DNS. DKIM confirms message integrity and sender authenticity.
DMARC
DMARC (Domain-based Message Authentication, Reporting and Conformance) is an email authentication standard that builds on SPF and DKIM. DMARC enables domain owners to specify how unauthenticated messages should be handled (none, quarantine, reject) and receive reports on sender verification.
DNS Attack
DNS (Domain Name System) is a system that translates domain names (e.g., nflo.pl) into IP addresses (e.g., 192.168.1.1), enabling web browsers and other applications to communicate with servers. DNS attacks target this critical infrastructure to disrupt services, redirect users, or steal data.
DNS Poisoning
DNS poisoning (also known as DNS cache poisoning) is a type of cyber attack in which an attacker introduces false information into the cache of a DNS server. The goal of this attack is to redirect users to malicious websites by manipulating DNS responses.
Docker
Docker is an open-source platform that enables creating, deploying, and managing applications in containers. Containers are lightweight, self-contained units that contain everything needed to run an application, including code, libraries, system tools, and settings.
Domain Spoofing
Domain spoofing is a type of cyberattack in which an attacker impersonates a legitimate internet domain to deceive users and trick them into revealing confidential information or performing harmful actions.
DORA
DORA (Digital Operational Resilience Act) is a European Union regulation establishing uniform requirements for digital operational resilience in the financial sector. The regulation imposes obligations regarding ICT risk management, incident reporting, and resilience testing.
Doxing
Doxing, also known as 'doxxing', is a practice of collecting and publicly disclosing private information about a specific person without their consent. The term 'doxing' comes from the English words 'docs' (documents) and 'dropping', referring to the publication of documents containing private data.
DRaaS
DRaaS (Disaster Recovery as a Service) is a cloud service model that provides organizations with a comprehensive disaster recovery solution. DRaaS enables companies to replicate and host their entire IT infrastructure, including servers, applications, and data, in a secure cloud environment provided by the service provider.
DSPM
DSPM (Data Security Posture Management) is a security solution category that automatically discovers, classifies, and protects data in cloud and on-premise environments. DSPM identifies where sensitive data is located, who has access to it, and whether it's properly secured.
E
Edge Computing
Edge Computing, also known as edge processing, is a data processing model in which computations are performed closer to the data source, at the 'edge' of the network, instead of in centralized data centers or the cloud. The goal is to bring data processing and applications closer to users and devices that generate and use them.
Email Spoofing
Email spoofing is a cyberattack technique involving falsifying the sender's email address to hide the true source and impersonate trusted individuals or organizations. Attackers manipulate email headers to make messages appear to originate from a credible source.
Encryption
Encryption is the process of converting data from a human-readable format to ciphertext, which is unreadable without the appropriate decryption key. Encryption is a form of cryptography aimed at protecting data confidentiality by preventing access to unauthorized persons.
Endpoint Detection and Response
Endpoint Detection and Response (EDR) is an advanced cybersecurity solution that monitors, analyzes, and responds to threats on network endpoints such as computers, laptops, and mobile devices. EDR combines continuous real-time monitoring, data analysis, and automatic response to detected threats.
Endpoint Management
Endpoint management is the process of monitoring, managing, and securing endpoint devices such as desktop computers, laptops, smartphones, and tablets that have access to an organization's network and resources. It includes control over configuration, software, security, and access to these devices.
Endpoint Security
Endpoint security is a set of practices, processes, and technologies aimed at protecting network endpoints, such as computers, laptops, smartphones, and tablets, from cyberattacks and unauthorized access. It includes securing both hardware and software of these devices, which represent potential entry points to an organization's network.
Essential Entity
An essential entity under NIS2 is a large organization operating in a sector of high criticality (energy, transport, banking, healthcare, digital infrastructure), subject to the highest cybersecurity requirements and proactive supervision by competent authorities.
Ethical Hacker
An ethical hacker, also known as a 'white hat hacker', is a cybersecurity specialist who uses their skills and knowledge to identify and fix security vulnerabilities in IT systems. Unlike cybercriminals, ethical hackers operate with consent and on behalf of organizations to improve their cybersecurity.
Exploit
An exploit is a piece of software, script, or command sequence that takes advantage of a vulnerability in a computer system, application, or network. The goal of an exploit is to take control of a system, gain unauthorized access to data, or disrupt normal system operation.
Extended Detection and Response
Extended Detection and Response (XDR) is an advanced cybersecurity technology that integrates and analyzes data from multiple layers of IT infrastructure to detect, investigate, and respond to cyber threats. XDR extends the capabilities of traditional Endpoint Detection and Response (EDR), covering not only endpoints but also network, cloud, applications, and other IT environment elements.
F
Fake Mail
Fake mail, also known as fake email, is an email message that has been crafted to appear as if sent from a trusted source, when in reality it comes from a fraudster. The purpose of fake mail is typically to extract confidential information, spread malicious software, or deceive recipients.
FIDO2
FIDO2 is an open authentication standard developed by FIDO Alliance, enabling passwordless login using cryptographic keys, biometrics, or physical security keys. It is the successor to U2F and UAF standards.
Fileless Malware
Fileless malware is a type of malicious software that operates entirely in memory without writing files to disk. Fileless malware uses legitimate system processes and tools, making detection by traditional antivirus software extremely difficult.
Firewall
A firewall, also known as a network firewall or security barrier, is a security system that monitors and controls network traffic based on predetermined security rules. Its main task is to protect the internal network from unauthorized access from external networks, such as the Internet.
Forensics
Forensics, also known as forensic science or criminalistics, is an interdisciplinary field of science that applies scientific methods to collect, analyze, and interpret evidence to support legal and investigative proceedings.
G
GDPR (General Data Protection Regulation)
GDPR (General Data Protection Regulation) is a comprehensive European Union regulation concerning the protection of personal data and privacy of EU citizens. It came into effect on May 25, 2018, and applies in all EU member states and to organizations processing EU citizens' data, regardless of their location.
Google Cloud Platform
Google Cloud Platform (GCP) is a suite of cloud services offered by Google that enables building, testing, and deploying applications on reliable and scalable infrastructure. GCP runs on the same infrastructure used by the most popular Google services, such as Google Search and YouTube.
H
Hacker
A hacker is a person with advanced technical IT skills who uses them to explore computer systems. Depending on intent, hackers are classified as ethical (white hat), malicious (black hat), or in the grey zone (grey hat).
Hacking
Hacking is the activity of exploiting vulnerabilities in computer systems or networks to gain unauthorized access. It includes analyzing, modifying, and manipulating IT systems, often in ways that go beyond the intended use by their creators.
Helpdesk
Helpdesk is technical support that ensures efficient and smooth operation for a company. It is the first line of IT support, whose main task is to solve current technical problems and provide assistance to customers or company employees. Helpdesk handles managing problem reports, resolving issues, reporting, and escalating to appropriate departments when needed.
Honeypot
A honeypot is a computer system or resource deliberately exposed to cyberattacks. It is a type of trap designed to attract potential attackers so their actions and methods can be studied. A honeypot simulates a poorly secured system, containing seemingly attractive but fake data.
Hybrid Cloud
Hybrid cloud is a cloud computing model that combines on-premises infrastructure (private cloud) with public cloud. This enables organizations to move data and applications between these two environments, allowing for flexible resource management and cost optimization.
Hypervisor
Hypervisor, also known as a virtual machine monitor (VMM), is software that enables creating and managing virtual machines (VMs). Hypervisor acts as an abstraction layer between physical hardware and operating systems, allowing multiple operating systems to run on a single physical server.
I
IAST
IAST (Interactive Application Security Testing) is an application security testing technique combining SAST and DAST elements. IAST uses an agent inside the application to analyze code during test execution, offering precise vulnerability detection with exact code location.
Identity and Access Management
Identity and Access Management (IAM) is a set of processes, policies, and technologies that enable organizations to manage digital identities and control access to resources and systems. IAM ensures that the right people have the right access to the right resources at the right time and for the right reasons.
Identity Management
Identity Management is a set of processes, policies, and technologies that enable organizations to manage digital user identities and control their access to resources and systems. It includes procedures that determine who can access information resources and what they can do with those resources.
Incident Management
Incident Management is a key process in IT service management, whose main goal is to restore normal service operation as quickly as possible after an incident occurs and minimize its negative impact on business operations.
Incident Response
Incident Response (IR) is an organized process of detecting, analyzing, and responding to security incidents such as cyberattacks, data breaches, or system failures. The goal of IR is to minimize damage, limit incident duration, and reduce costs associated with its consequences.
Industrial Security
Industrial Security is a set of practices, technologies, and procedures aimed at protecting industrial automation and control systems (IACS) from cyber and physical threats. It includes securing industrial infrastructure, data, and personnel from theft, sabotage, espionage, and other forms of attacks.
Information Security
Information security encompasses a set of principles, procedures, tools, and practices aimed at protecting information throughout its lifecycle. This applies to both data stored electronically and on paper. The goal is to ensure that information is protected against various threats, both internal and external.
Information Security Architecture
Information Security Architecture (ISA) is a structural approach to designing, implementing, and managing information security in an organization. ISA includes a set of principles, standards, processes, and tools aimed at protecting the confidentiality, integrity, and availability of data and IT systems.
Internet of Things
Internet of Things (IoT) is a network of interconnected physical devices that communicate and exchange data over the Internet. These devices can be equipped with sensors, software, and other technologies that enable them to collect and process data and perform specific tasks without human intervention.
IOC
IOC (Indicators of Compromise) are technical artifacts indicating a potential security incident - IP addresses, file hashes, domains, registry keys. IOCs enable detection of known threats and are a fundamental element of threat intelligence.
IP Spoofing
IP spoofing is a cyberattack technique involving falsifying the source IP address in data packets transmitted over a network. Attackers modify IP packet headers to hide their true identity or impersonate another trusted system.
ISA Security Audit
ISA security audit (Independent Safety Assessment) is an independent evaluation of system and process safety, particularly important in the railway sector. It is a comprehensive process aimed at verifying whether a given system or project meets required safety standards and norms.
ISO 22301
ISO 22301 is an international standard published by the International Organization for Standardization (ISO) that specifies requirements for business continuity management systems (BCMS). This standard provides organizations with a framework for planning, implementing, monitoring, and continuously improving a management system aimed at protecting against disruptions, reducing the likelihood of their occurrence, and ensuring quick recovery to normal operations in case of incidents.
ISO 27001
ISO 27001 is an international standard specifying requirements for information security management systems (ISMS). This standard provides organizations with a framework for protecting information and managing risks related to data security. ISO 27001 is part of the ISO/IEC 27000 family of standards covering various aspects of information security management.
ISO 31000
ISO 31000 is an international standard that provides guidelines and principles for risk management in organizations. This standard provides a universal approach to risk identification, analysis, assessment, and treatment, regardless of the type of organization or sector of activity.
IT Architecture
IT architecture is a strategic plan defining the structure and operation of information technologies in an organization. It encompasses both technical and organizational aspects, defining how IT systems support business processes and strategic company goals.
IT Asset Management
IT asset management is a systematic process of planning, acquiring, deploying, maintaining, and retiring an organization's IT resources. It includes comprehensive management of all IT infrastructure elements, including hardware, software, licenses, data, and services, to optimize their utilization and value to the organization.
IT Automation
IT automation is the process of using technology to perform IT tasks and processes without human intervention. It involves the use of software, scripts, tools, and systems that automate repetitive and routine tasks such as infrastructure management, system monitoring, application deployment, and data management.
IT Infrastructure
IT Infrastructure is a collection of technology resources and systems that support an organization's operations. It includes computer hardware, software, computer networks, and processes for managing these resources. IT infrastructure forms the foundation of modern enterprises, enabling data processing, storage, and transmission.
IT Infrastructure Audit
IT infrastructure audit is a comprehensive assessment of an organization's total technology resources, including hardware, software, networks, and IT management processes. It is a systematic examination aimed at verifying the state, performance, and security of a company's IT infrastructure.
IT Infrastructure Monitoring
IT infrastructure monitoring is a comprehensive process of continuous supervision and analysis of all elements of an organization's IT environment. It includes systematic data collection, analysis of performance, availability, and security of IT systems and network infrastructure to ensure their optimal operation.
IT Infrastructure Penetration Testing
IT infrastructure penetration testing is a controlled and ethical process of simulating cyberattacks on an organization's systems, networks, and devices to identify and assess vulnerabilities and security gaps. The goal is to detect weak points in IT infrastructure that could be exploited by real attackers.
IT Optimization
IT optimization is the process of improving IT infrastructure, systems, applications, and business processes to increase their performance, efficiency, and reliability. This includes both hardware modernization and software optimization, as well as managing IT resources in a way that maximizes their value for the organization.
IT Outsourcing
IT Outsourcing is the process of delegating information technology (IT) related tasks to external providers. This includes delegating various IT functions such as infrastructure management, software development, technical support, and consulting to companies specializing in these services. The goal of IT Outsourcing is to enable organizations to focus on their core business while external specialists handle technologies supporting company operations.
IT Planning
IT planning is a strategic process of determining how information technology will support and drive an organization's business goals. It involves creating a long-term vision for technology use, identifying IT needs, and developing strategies and action plans to achieve intended objectives.
IT Project Management
IT project management is the process of planning, organizing, directing, and controlling resources and activities necessary to achieve IT project goals. This includes managing scope, time, costs, quality, human resources, communication, risk, and project stakeholders.
IT Security
IT Security, also known as cybersecurity, is a set of practices, technologies, and processes designed to protect IT systems, networks, devices, and data from threats and cyber attacks. IT security aims to ensure the confidentiality, integrity, and availability of information, which is crucial for protecting organizational digital assets.
IT Security Architecture
IT security architecture is a structural approach to designing, implementing, and managing security measures in information systems. It encompasses a set of principles, standards, processes, and tools aimed at protecting the confidentiality, integrity, and availability of data and IT systems.
IT Security Audit
IT security audit is a systematic evaluation of an organization's information system security measures, aimed at identifying security vulnerabilities and compliance with industry standards and regulations. It includes analysis of technical infrastructure, processes, policies, and practices related to information security.
IT Security Management
IT security management is the process of planning, implementing, monitoring, and maintaining measures to protect an organization's IT resources. This includes protecting data, systems, networks, and applications from cyber threats, as well as ensuring compliance with regulations and industry standards.
IT Service Management
IT Service Management (ITSM) is a set of processes and practices aimed at designing, delivering, managing, and improving IT services in a way that meets the business needs of an organization. ITSM focuses on managing IT service quality, ensuring they are delivered according to established service levels (SLA) and customer expectations.
IT Services Outsourcing
IT services outsourcing is a business strategy that involves delegating some or all IT functions to external service providers specializing in managing and delivering IT solutions.
IT Solutions Implementation
IT solutions implementation is the process of transforming an abstract system or program description into a working IT system. It includes deployment, adaptation, and execution of information technologies in an enterprise to minimize disruptions to its operations and improve operational efficiency.
IT Systems Performance
IT systems performance refers to the efficiency with which information systems, including hardware, software, networks, and databases, perform their tasks. Performance encompasses speed, reliability, scalability, and availability of IT systems, as well as their ability to handle a specific number of users and operations in a given time.
ITDR
ITDR (Identity Threat Detection and Response) is a security solution category focused on detecting and responding to identity-related threats. ITDR monitors identity systems (Active Directory, Azure AD) for attacks like credential theft, privilege escalation, or lateral movement.
ITIL
ITIL (Information Technology Infrastructure Library) is a collection of best practices and standards in IT service management. It provides a comprehensive approach to delivering and maintaining high-quality IT services, focusing on aligning these services with the business needs of the organization.
ITSM
ITSM (Information Technology Service Management) is a strategic approach to designing, delivering, managing, and improving the way information technology (IT) is used in an organization. It focuses on aligning IT services with business and customer needs while ensuring operational efficiency and high service quality.
J
JavaScript Injection
JavaScript injection is a type of attack involving the injection of malicious JavaScript code into a web application. Attackers exploit security vulnerabilities in applications to introduce and execute their own JavaScript code, which can lead to data theft, user session hijacking, or other malicious actions.
Just-in-Time Access
Just-in-Time (JIT) Access is a privileged access management approach where permissions are granted temporarily, on-demand, and only for the time needed to complete a task. JIT Access eliminates standing privileged accounts, reducing the risk of their compromise.
K
Kerberoasting
Kerberoasting is an attack technique in Active Directory environments that exploits Kerberos service tickets. An attacker requests tickets for service accounts (with SPN) and then cracks them offline to obtain plaintext passwords.
Keylogger
A keylogger is a type of malware or hardware device that records keystrokes on a keyboard. Its purpose is to capture information entered by the user, such as passwords, login credentials, email messages, and other confidential data. Keyloggers can operate in the background, remaining invisible to the user.
Kubernetes
Kubernetes is an open platform for automating deployment, scaling, and management of containerized applications. It provides an environment for running distributed systems and applications at cloud scale.
L
LAN Network
A LAN (Local Area Network) is a local computer network that connects devices over a relatively small area, such as an office, school building, or home. LAN enables fast data exchange and resource sharing between connected devices within a limited geographical space.
Lateral Movement
Lateral movement is an attack technique that allows an attacker to move within a compromised network between systems to reach targets (data, critical systems). Lateral movement is a key phase of advanced attacks like APT and ransomware.
LDAP
LDAP (Lightweight Directory Access Protocol) is an application protocol used to access and manage information stored in directory services. It is a lightweight and efficient way to organize and search hierarchical data, particularly useful in managing users and resources in organizations.
Living off the Land
Living off the Land (LotL) is an attack technique that uses legitimate system tools (PowerShell, WMI, certutil) instead of custom malware. LotL attacks are harder to detect because they use trusted system components.
M
Machine Learning
Machine Learning is a field of artificial intelligence (AI) that focuses on creating algorithms and models that allow computers to learn from data. These algorithms are able to identify patterns, make decisions, and formulate predictions without the need for direct human programming.
Malvertising
Malvertising is a malicious practice that uses online advertising to spread malware. It is a combination of the words 'malicious' and 'advertising'. Cybercriminals use this technique to infect users' devices or direct them to dangerous websites.
Malware
Malware, short for 'malicious software,' is a general term encompassing various types of harmful software whose purpose is to damage, disrupt operation, or gain unauthorized access to computer systems, networks, or devices.
Man-in-the-Middle
Man-in-the-Middle (MitM) is an attack in which an adversary intercepts communication between two parties, enabling eavesdropping, data modification, or credential theft. MitM attacks can occur at the network level (ARP spoofing) or application level (SSL stripping).
Mass Storage System
A mass storage system is a technological infrastructure designed for storing, managing, and sharing large amounts of data. These systems are crucial for organizations that need to store and process large volumes of information efficiently and securely.
Microsegmentation
Microsegmentation is a network security technique that divides infrastructure into small, isolated segments with individual security policies. Microsegmentation limits attacker lateral movement and is a key element of Zero Trust architecture.
Mimikatz
Mimikatz is a penetration testing tool created by Benjamin Delpy, used for extracting passwords, hashes, and Kerberos tickets from Windows memory. It is widely used by both security professionals and cybercriminals.
MITRE ATT&CK
MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a global knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK matrix serves as the foundation for security testing, threat detection, and SOC team maturity assessment.
Mobile Application
A mobile application, also known as a mobile app, is a type of software designed specifically to run on portable devices such as smartphones, tablets, or smartwatches. These applications are created for specific operating systems, most commonly iOS (Apple) and Android (Google).
Mobile Application Security Testing
Mobile application security testing is the process of evaluating and verifying the security of programs installed and run on mobile devices such as smartphones and tablets. The goal of these tests is to identify and eliminate potential security vulnerabilities that could be exploited by attackers to gain unauthorized access to the device, application, or user data.
Mobile Device Management
Mobile Device Management (MDM) is a set of technologies and practices that enable organizations to centrally manage, secure, and monitor mobile devices used by employees.
Mobile Device Security
Mobile device security refers to protecting smartphones, tablets, and other portable electronic devices from threats that may compromise the confidentiality, integrity, or availability of data and applications stored on them.
MTTD
MTTD (Mean Time to Detect) is a security metric measuring the average time from the start of an attack or incident to its detection by security systems or the SOC team. Lower MTTD means faster threat detection and less potential damage.
MTTR
MTTR (Mean Time to Respond/Remediate) is a security metric measuring the average time from incident detection to neutralization or full remediation. MTTR shows team effectiveness in responding to threats and is critical for minimizing damage.
Multi-Factor Authentication
Multi-Factor Authentication (MFA), also known as multi-factor authentication, is a method of securing access to IT systems that requires the user to present two or more pieces of evidence (factors) of identity before gaining access. MFA significantly increases security because even if one factor is compromised, the others still protect the user's account.
N
NDR (Network Detection and Response)
NDR (Network Detection and Response) is a category of security solutions that monitor network traffic in real-time, using AI and machine learning to detect anomalies, threats, and suspicious activities such as lateral movement or data exfiltration.
Network Access Control
Network Access Control (NAC) is a set of technologies and practices used to monitor and control access to a computer network. NAC ensures that only authorized devices compliant with security policies can access network resources.
Network Design
Network design is the process of planning, creating, and implementing network infrastructure that enables communication between devices in an organization. It includes both physical and logical aspects, ensuring that the network is efficient, scalable, and secure.
Network Management
Network management is the process of planning, implementing, monitoring, controlling, and optimizing an organization's network infrastructure. It includes a range of activities aimed at ensuring performance, reliability, and security of computer networks, as well as efficient utilization of network resources.
Network Monitoring
Network monitoring is a process of continuous supervision and analysis of network traffic and the state of network infrastructure to ensure its optimal operation, detect anomalies, and identify potential threats.
Network Security
Network security is the practice of protecting the integrity, confidentiality, and availability of computer networks and data transmitted through these networks. It encompasses a set of strategies, technologies, and procedures aimed at protecting against unauthorized access, use, modification, or destruction of network resources.
Network Virtualization
Network virtualization is a technology that enables creating logical, virtual networks independent of physical network infrastructure. It allows for abstraction of network resources such as switches, routers, and firewalls from hardware, enabling more flexible and efficient network management.
NIS2
NIS2 (Network and Information Security Directive 2) is an EU directive establishing cybersecurity requirements for essential and important entities with personal management liability and mandatory incident reporting.
NIST Cybersecurity Framework
NIST Cybersecurity Framework (NIST CSF) is a set of standards and best practices for managing cybersecurity risk, developed by the National Institute of Standards and Technology. CSF organizes security activities into five functions: Identify, Protect, Detect, Respond, Recover.
Nmap
Nmap (Network Mapper) is a free, open-source network scanning and security auditing tool. It is used to discover hosts, services, open ports, and identify operating systems on computer networks.
O
OpenShift
OpenShift is a containerization and orchestration platform developed by Red Hat that enables organizations to quickly build, deploy, and manage applications in cloud and on-premise environments.
Operating System
An operating system is the fundamental computer software that manages hardware and resources, enabling interaction between the user and the device. It is an intermediary layer between computer hardware and user applications, ensuring efficient resource utilization and facilitating task execution.
OSINT
OSINT, or Open Source Intelligence, is the process of collecting, analyzing, and using information from publicly available sources. It is a form of white intelligence that relies on legal and ethical methods of obtaining data. OSINT does not include any illegal activities such as hacking or breaking security measures, focusing solely on publicly accessible information.
OT (Operational Technology)
OT (Operational Technology) refers to hardware and software that detects or causes a change through the direct monitoring and/or control of physical devices, processes, and events in the enterprise. OT systems are used in industrial environments to control and monitor manufacturing processes, energy production, transportation, and other critical infrastructure.
OT Security Architecture
OT Security Architecture (Operational Technology Security Architecture) is a structural approach to designing, implementing, and managing security in OT (Operational Technology) systems. The goal of OT security architecture is to protect industrial systems, devices, and processes from cyber threats while ensuring operational continuity and integrity.
OWASP Top 10
OWASP Top 10 is a ranking of the most critical security risks for web applications, published by the Open Web Application Security Project. The list is regularly updated (most recent 2021) and serves as the foundation for web application security testing.
P
Pass-the-Hash
Pass-the-Hash (PtH) is an attack technique that uses a stolen password hash (instead of plaintext password) for authentication. In Windows environments, NTLM hashes can be used directly for authentication without knowing the actual password.
Passkeys
Passkeys are a modern authentication method based on the FIDO2/WebAuthn standard, replacing passwords with cryptographic keys. Passkeys are synchronized between user devices and are phishing-resistant, representing the future of passwordless login.
Password Spraying
Password spraying is an attack technique that involves trying a small number of common passwords against many accounts. Unlike brute force (many passwords against one account), spraying avoids lockouts and is harder to detect.
Passwordless Authentication
Passwordless authentication is an authentication method that eliminates passwords in favor of more secure alternatives: biometrics, hardware keys (FIDO2), magic links, or passkeys. Passwordless authentication reduces the risk of phishing and credential stuffing.
Patch
A patch is a piece of code or set of changes applied to software to fix bugs, security vulnerabilities, improve performance, or add new features. Patches are essential for keeping software current and secure.
Patch Management
Patch management is the process of identifying, testing, deploying, and monitoring software patches to fix bugs, remove security vulnerabilities, and improve the performance and functionality of IT systems. Patches may apply to operating systems, applications, network devices, and other IT components.
PCI DSS
PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards developed by major card organizations to protect payment card data. This standard defines requirements for secure processing, storage, and transmission of credit card information.
Penetration Testing
Penetration testing, also known as pentesting, is a controlled process of simulating a real attack on an IT system, application, or network infrastructure to detect security vulnerabilities. Security testers, taking on the role of potential attackers, attempt to breach system security while maintaining ethical conduct.
Performance Management
Performance management is a systematic process of monitoring, analyzing, and optimizing the performance of IT systems, applications, and infrastructure to ensure their optimal functioning and meeting business requirements. It includes a range of activities aimed at identifying performance issues, resolving them, and continuously improving IT system efficiency.
Personal Data Protection
Personal data protection is a set of practices, policies, and technologies aimed at securing data identifying natural persons from unauthorized access, use, disclosure, modification, or destruction. This includes both data collected and processed by organizations and data stored by private individuals.
Pharming
Pharming is an advanced form of cyber attack aimed at redirecting users to fake websites to steal confidential information.
Phishing
Phishing is a type of social engineering attack that aims to deceive the victim and induce them to disclose confidential information or perform harmful actions.
Pretexting
Pretexting is a psychological manipulation method in which the perpetrator creates fictional scenarios to obtain confidential information without the victim's knowledge. People using this technique, known as social engineers, create situations or stories aimed at gaining the victim's trust and persuading them to disclose personal, financial, or other valuable information.
Private Cloud
Private cloud is a cloud computing model in which IT infrastructure is dedicated exclusively to a single organization. Unlike public cloud, private cloud resources are not shared with other entities. Private cloud can be located in the organization's internal data center or hosted by an external service provider, but is always managed and used exclusively by that organization.
Privileged Access
Privileged access is a level of access to IT systems that allows users to perform advanced administrative operations, such as system management, software installation, configuration modification, or access to sensitive data. Users with privileged access have greater permissions than standard users.
Privileged Access Management
Privileged Access Management (PAM) is a set of strategies, processes, and technologies aimed at managing, controlling, and monitoring privileged access in an organization. PAM focuses on protecting user accounts that have extended permissions to systems, applications, and data, minimizing the risk of abuse and cyber attacks.
Public Cloud
Public cloud is a cloud computing model in which IT resources such as servers, storage, databases, networks, and applications are provided by external cloud service providers via the internet. In public cloud, infrastructure is shared by multiple users, but data and workloads are isolated from each other and invisible to other customers.
Public Key Infrastructure
Public Key Infrastructure (PKI) is a set of roles, policies, procedures, hardware, software, and services needed to manage cryptographic keys and digital certificates. PKI enables secure communication and information exchange in digital environments by providing authentication, data integrity, and confidentiality.
Purple Team
Purple Team is a security testing approach that combines Red Team (offense) and Blue Team (defense) activities in a collaborative manner. Instead of competition, both teams work together to maximize threat detection and improve the organization's protection.
R
Ransomware
Ransomware is a type of malicious software (malware) that blocks access to a computer system or encrypts data, then demands a ransom for unlocking or decryption. The name comes from the English words 'ransom' and 'software'.
RASP
RASP (Runtime Application Self-Protection) is a security technology embedded in an application that monitors and protects it from within during runtime. RASP detects and blocks attacks in real-time, using application context for precise detection.
Red Team
Red Team is a group of highly skilled security specialists whose task is to simulate real attacks on an organization's systems, networks, and processes to identify security vulnerabilities and evaluate the effectiveness of existing defensive mechanisms.
Remote Desktop Protocol
Remote Desktop Protocol (RDP) is a network protocol developed by Microsoft that enables remote connection and management of a computer or server. RDP allows users to access the desktop, applications, and files on a remote device as if they were working directly on it.
Risk Assessment
Risk assessment is a systematic process of identifying, analyzing, and evaluating potential threats to an organization, its resources, and business objectives. In the context of cybersecurity, risk assessment focuses on threats related to IT systems and data.
Risk Management
Risk Management is a systematic process of identifying, analyzing, assessing, and controlling potential threats to an organization. It includes activities aimed at minimizing the negative impact of risk on business objectives and maximizing potential benefits from taking controlled risks.
Rootkit
A rootkit is a type of malicious software that allows unauthorized users to gain access to a computer and control it without the owner's knowledge. Rootkits are designed to hide their presence and the activity of other malicious programs, making them difficult to detect and remove.
S
SAML
SAML (Security Assertion Markup Language) is an open standard for exchanging authentication and authorization data between an identity provider (IdP) and a service provider (SP). SAML enables Single Sign-On (SSO) across different systems and applications, increasing security and user convenience.
SASE
SASE (Secure Access Service Edge) is a network architecture combining network connectivity (SD-WAN) and cloud-delivered security functions (SWG, CASB, ZTNA, FWaaS). SASE provides secure access to applications regardless of user or resource location.
SAST (Static Application Security Testing)
SAST (Static Application Security Testing) is a method of application security testing through analysis of source code, bytecode, or binary without running the application, detecting vulnerabilities such as SQL injection, XSS, or hardcoded secrets at an early stage of development.
SBOM
SBOM (Software Bill of Materials) is a formal record of all components, libraries, and dependencies in an application. SBOM enables vulnerability tracking in software supply chain and is increasingly required by regulations (US Executive Order, EU Cyber Resilience Act).
SCA
SCA (Software Composition Analysis) is a DevSecOps tool that analyzes external components and open source libraries in an application for known vulnerabilities, license issues, and supply chain risk. SCA is critical for security of modern applications dependent on dependencies.
SCADA
SCADA (Supervisory Control And Data Acquisition) is a computer system used for supervision, control, and data acquisition in industrial processes. SCADA enables monitoring and controlling technological processes in real-time, providing operators and engineers with complete visibility into industrial plant operations.
Scam
A scam is a form of fraud in which a fraudster attempts to extort money, personal data, or other valuable information from a victim by misleading them. Scams can take various forms, including fake emails, websites, SMS messages, phone calls, and many others.
Secure Coding
Secure coding is a set of practices, techniques, and tools used in the software development process aimed at minimizing the risk of security vulnerabilities. The goal of secure coding is to ensure that code is resistant to attacks and does not contain vulnerabilities that could be exploited by cybercriminals.
Security Architecture
Security architecture is a comprehensive approach to designing, implementing, and managing security systems and processes in an organization. It includes a set of principles, standards, procedures, and tools aimed at protecting information assets from threats, ensuring data integrity, confidentiality, and availability.
Security Architecture Analysis
Security Architecture Analysis is the process of evaluating, reviewing, and optimizing the structure of IT systems and security measures implemented in an organization. Its goal is to identify potential vulnerabilities and weaknesses in IT architecture and ensure that implemented protection mechanisms comply with best practices and security standards.
Security Audit
A security audit is a systematic, independent, and documented process for evaluating the effectiveness and compliance of policies, procedures, systems, and protection mechanisms in an organization. The goal of a security audit is to identify weaknesses, threats, and risks related to information security.
Security Awareness
Security Awareness is the knowledge and attitudes of employees regarding cyber threats and their ability to recognize and appropriately respond to potential attacks and security incidents.
Security Configuration
Security configuration is the process of setting and adjusting parameters of IT systems, applications, and network devices to ensure an optimal level of protection against cybersecurity threats. It includes a range of actions aimed at strengthening security and minimizing potential vulnerabilities in IT systems.
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM) is a comprehensive information security management solution that combines Security Information Management (SIM) and Security Event Management (SEM) functions. SIEM collects, analyzes, and correlates data from various sources in IT infrastructure to detect potential threats, anomalies, and security incidents in real-time.
Security Operations Center (SOC)
Security Operations Center (SOC) is a central location where a team of security specialists monitors, analyzes, and responds to IT security threats in real-time. SOC is responsible for protecting the organization's IT infrastructure, data, and applications from cyberattacks and other threats.
Security Orchestration, Automation and Response
Security Orchestration, Automation and Response (SOAR) is a set of tools and technologies that enable organizations to manage security threats through process automation, action coordination, and rapid incident response. SOAR integrates various security systems, automates routine tasks, and enables security teams to more effectively manage incidents.
Security Policy
A security policy is a formal document that defines the rules, procedures, and guidelines for managing information security in an organization. It is a set of rules aimed at protecting data, IT systems, and resources from internal and external threats.
Server
A server is a specialized computer or software that provides services, resources, or data to other computers, called clients, in a computer network. Servers are designed for continuous operation, handling multiple simultaneous requests, and managing shared resources.
Server Solutions
Server solutions are a set of technologies, hardware, and software that enable storing, processing, and managing data and applications in a network environment. Servers play a key role in IT infrastructure, supporting various services such as website hosting, databases, business applications, and email.
Server Virtualization
Server virtualization is a technology that enables running multiple virtual servers on a single physical server. With server virtualization, hardware resources can be efficiently utilized, management flexibility increased, and IT infrastructure scalability improved.
Service Level Agreement
Service Level Agreement (SLA) is a formal agreement between a service provider and a customer that defines the expected level of quality, availability, and performance of a service. SLA defines specific measurable parameters by which service quality is assessed and specifies consequences for not meeting these standards.
Session Hijacking
Session hijacking is an attack that involves taking over a user's active session by stealing the session token or cookie. The attacker gains access to the application as the victim, bypassing authentication. Session hijacking is particularly dangerous after MFA implementation.
SHA-256
SHA-256 (Secure Hash Algorithm 256-bit) is a cryptographic hash function producing a 256-bit hash. It is part of the SHA-2 family and is used for data integrity verification, password storage, and blockchain technology.
Shadow AI
Shadow AI refers to the unauthorized use of artificial intelligence tools and systems by employees without the knowledge, consent, or oversight of the organization's IT and security departments.
Shadow IT
Shadow IT refers to the practice of using IT systems, devices, software, applications, or services by organization employees without the knowledge and approval of the IT department or management. These are solutions that have not been officially approved, implemented, or supported by the organization's IT department.
Sharenting
Sharenting is the phenomenon of parents excessively sharing information and photos of their children on social media. This practice can lead to privacy threats, child identity theft, and cyberbullying.
Shift-left Security
Shift-left security is a DevSecOps approach that moves security practices to earlier stages of the software development lifecycle. Instead of testing security before deployment, security is integrated from the design and coding phases.
Shodan
Shodan is a search engine for internet-connected devices, often called 'Google for IoT'. It indexes information about servers, routers, cameras, industrial systems, and other devices visible on the network, revealing their configuration and potential vulnerabilities.
Significant Incident
A significant incident under NIS2 is a cybersecurity incident that has caused or is capable of causing severe operational disruption of services or financial loss for the entity, or has affected or is capable of affecting other natural or legal persons by causing considerable material or non-material damage.
Slowloris
Slowloris is a type of low-and-slow DDoS attack that keeps HTTP connections open with a server by sending incomplete requests. The attack effectively exhausts the server's connection pool with minimal bandwidth usage.
Smishing
Smishing (SMS phishing) is a form of cyberattack in which fraudsters use SMS messages to extract confidential information such as login credentials, credit card numbers, or other personal data. Attackers impersonate trusted institutions or individuals to trick victims into clicking malicious links or providing their data.
Sniffing
Sniffing is a technique for intercepting and analyzing network traffic. It involves monitoring data packets transmitted over a computer network to obtain information about communication between devices. Sniffing can be used for both legal purposes (e.g., network diagnostics) and illegal purposes (e.g., data theft).
SOC 2
SOC 2 (System and Organization Controls 2) is a security audit standard developed by AICPA that assesses the effectiveness of controls in service organizations. A SOC 2 report confirms that a company meets Trust Services Criteria in areas of Security, Availability, Confidentiality, Processing Integrity, and Privacy.
SOC as a Service
SOC as a Service (Security Operations Center as a Service), also known as Managed SOC, is an outsourcing model for services related to monitoring, analyzing, and responding to IT security threats. In this model, an external provider delivers comprehensive security operations center (SOC) services to organizations using advanced tools, technologies, and qualified personnel.
Social Engineering
Social engineering is a set of psychological manipulation techniques used by cybercriminals to persuade people to reveal confidential information or perform specific actions that compromise security.
Social Engineering Testing
Social engineering testing is a method of assessing organizational security that involves simulating social engineering attacks to identify human factor vulnerability to manipulation. The goal is to check how employees react to attempts to extract information, manipulation, or other forms of fraud, and to evaluate the effectiveness of existing security procedures.
Software Defined Network
Software Defined Network (SDN) is a modern approach to managing computer networks that separates the control layer from the data forwarding layer. SDN enables central management and programming of networks using software, allowing dynamic and flexible adjustment of network infrastructure to changing business needs.
Source Code Security
Source code security is a set of practices, tools, and processes aimed at protecting the integrity, confidentiality, and availability of software source code. It includes actions to prevent unauthorized access, modifications, and use of source code, as well as eliminating potential vulnerabilities in the code itself.
Source Code Vulnerability Analysis
Source code vulnerability analysis is the process of systematically examining and evaluating application source code to identify potential security vulnerabilities, programming errors, and other weaknesses that could be exploited by attackers. It is a key element in the secure software development lifecycle.
Spam
Spam refers to unsolicited, unwanted electronic messages that are mass-distributed to a large number of recipients. Most commonly, spam takes the form of emails, but it can also include SMS messages, blog comments, posts on internet forums, and social media messages.
Spear Phishing
Spear phishing is an advanced form of phishing in which attackers target specific individuals or organizations using personalized email messages or other forms of communication. Unlike traditional phishing, which is mass and non-personalized, spear phishing is precisely targeted, increasing its effectiveness.
SPF
SPF (Sender Policy Framework) is an email authentication method that verifies which servers are authorized to send email for a given domain. SPF uses a DNS TXT record listing authorized IP addresses, enabling spam and spoofing detection.
Spoofing
Spoofing is a cyberattack technique in which an attacker impersonates another person, device, or system to gain unauthorized access to data, systems, or networks. The goal of spoofing is to deceive the victim or system into believing they are communicating with a trusted source.
Spyware
Spyware is a type of malicious software that secretly installs itself on a user's device to collect and transmit information without their knowledge and consent. Spyware can collect various types of data, from internet browsing history to personal and financial data.
SQL Injection
SQL Injection is a cyberattack technique in which malicious SQL code is injected into application queries to manipulate the database. Attackers exploit vulnerabilities in applications to inject and execute unwanted SQL commands, which can lead to unauthorized access, modification, or theft of data.
SSE
SSE (Security Service Edge) is a SASE component encompassing cloud-delivered security functions: SWG, CASB, ZTNA, and FWaaS. SSE protects access to the internet, SaaS applications, and private applications without routing traffic through a central data center.
SSO (Single Sign-On)
SSO (Single Sign-On) is an authentication mechanism that allows a user to access multiple applications and systems using a single set of login credentials. After logging in once, the user gains access to all connected systems without having to re-enter authentication data.
Storage Virtualization
Storage virtualization is a technology that enables consolidation and management of different storage resources as a single, coherent logical unit. With storage virtualization, physical storage resources (such as hard drives, disk arrays) can be managed and allocated in a more flexible and efficient way.
Supply Chain Attack
A supply chain attack is an attack that compromises a trusted supplier or vendor to gain access to their customers. Instead of attacking the target directly, adversaries compromise software, hardware, or services used by the target organization.
System Integration
IT system integration refers to the process of connecting different IT systems to enable their cooperation and data exchange. The goal of integration is to create a coherent IT environment that enables smooth information flow between different applications and systems, which in turn increases operational efficiency and minimizes errors.
T
Tabletop Exercise
A tabletop exercise is a type of simulation exercise designed to test and evaluate an organization's readiness to respond to security incidents. Tabletop exercises take the form of table discussions where participants analyze and discuss hypothetical threat scenarios to identify potential gaps in procedures and improve incident response strategy.
Tailgating
Tailgating is a security breach method in which an unauthorized person gains access to a protected area by exploiting the politeness or inattention of authorized users. The attacker typically pretends to be an employee or guest and enters the secured zone immediately behind someone who has just used their access card or code.
Threat Analysis
Threat Analysis is the process of identifying, evaluating, and prioritizing potential threats that may affect the security of IT systems, data, and organizational operations. The goal of threat analysis is to understand the risks associated with different types of threats and develop strategies to minimize or eliminate them.
Threat Hunting
Threat hunting is a proactive cybersecurity approach that involves actively searching for threats in an environment that haven't been detected by automated tools. Threat hunters use hypotheses, TTP knowledge, and data analysis to identify advanced attackers.
Threat Intelligence
Threat Intelligence (TI) is evidence-based knowledge about existing or emerging threats. TI encompasses information about TTPs, IOCs, attacker attribution, and context enabling better security decisions and proactive threat defense.
Threat Modeling
Threat Modeling is a process of systematically identifying, assessing, and prioritizing potential threats that may affect the security of IT systems and organizational data. This process involves analyzing systems and applications to understand what weaknesses could be exploited by potential attackers, and then implementing appropriate countermeasures to minimize risk.
TISAX
TISAX (Trusted Information Security Assessment Exchange) is an information security assessment standard created by the German organization VDA (Verband der Automobilindustrie) for the automotive industry. TISAX provides a unified approach to information security assessment in the automotive industry supply chain.
Tokenization
Tokenization is a data protection technique that replaces sensitive data (e.g., card numbers) with random tokens that have no value outside the system. Original data is stored in a secure vault, and the token is used in business processes.
Trojan
A Trojan, also known as a Trojan horse, is a type of malware that masquerades as legitimate programs or files to infect a computer or mobile device. Unlike viruses, Trojans do not replicate themselves but can open doors to other malicious activities such as data theft, additional malware installation, or remote device control.
TTP
TTP (Tactics, Techniques, Procedures) is a framework describing how cybercriminals operate. Tactics define the attack goal, Techniques the methods to achieve the goal, and Procedures the specific implementations. TTP forms the foundation of threat intelligence and is key to understanding adversary behavior.
U
Unified Endpoint Management
Unified Endpoint Management (UEM) is a comprehensive approach to managing and securing all endpoint devices in an organization, including desktop computers, laptops, smartphones, tablets, and IoT devices, from a single central platform. UEM combines mobile device management (MDM), mobile application management (MAM), and personal computer management (PCM) functions.
User and Entity Behavior Analytics
User and Entity Behavior Analytics (UEBA) is an advanced analytical tool that monitors, analyzes, and detects anomalies in user and other entity (such as devices, applications, and servers) behaviors on the network. UEBA uses machine learning and behavioral analysis techniques to identify unusual activity patterns that may indicate security threats.
V
Virtual Desktop Infrastructure
Virtual Desktop Infrastructure (VDI) is a technology that enables creation and management of virtual desktops on a central server. Users can access their virtual desktops from any location and device, providing flexibility and mobility. VDI is often used in corporate environments for centralized management and increased security.
Virtual Machine
A virtual machine (VM) is a software equivalent of a physical computer that operates in an isolated environment on a physical host. Virtual machines enable running multiple operating systems and applications on a single physical server, increasing hardware resource utilization efficiency.
Virtual Private Network
Virtual Private Network (VPN) is a network technology that creates a secure, encrypted connection between a user's device and a target network over the internet. VPN enables users to securely use public networks while maintaining privacy and anonymity online.
Virtualization
Virtualization is a technology that enables creating virtual versions of computing resources such as servers, storage, networks, and even entire operating systems. With virtualization, multiple virtual machines (VMs) can run on a single physical host, allowing for more efficient utilization of hardware resources.
Virus
A computer virus is a type of malicious software designed to self-replicate and spread to other computers. Viruses can modify or destroy data, disrupt computer systems, and utilize system resources without user consent.
Vishing
Vishing (voice phishing) is a form of fraud in which attackers use phone calls to extract confidential information from victims. Vishing combines social engineering techniques with voice communication to convince victims to reveal personal, financial, or other sensitive information.
VPN
VPN (Virtual Private Network) is a technology that creates an encrypted, secure connection over a public network, enabling private communication and protecting data from interception.
Vulnerability Assessment
Vulnerability Assessment is a systematic process of identifying, analyzing, and classifying security vulnerabilities in IT systems, networks, applications, and infrastructure of an organization. The goal of vulnerability assessment is to detect potential weaknesses that could be exploited by attackers and provide information necessary for remediation.
Vulnerability Management
Vulnerability Management is a systematic process of identifying, assessing, prioritizing, and eliminating security gaps in an organization's IT systems, networks, and applications. The goal of this process is to reduce the risk of cyberattacks through proactive detection and remediation of weak points in IT infrastructure.
Vulnerability Scanner
A vulnerability scanner is a tool or software used to identify, analyze, and report potential security vulnerabilities in IT systems, networks, applications, or devices. Its main goal is to detect weak points in IT infrastructure that could be exploited by attackers to gain unauthorized access or conduct an attack.
W
WAN Network
A WAN (Wide Area Network) is a wide-area computer network that connects smaller networks, such as local area networks (LAN), over large geographical areas. WAN enables communication and data exchange between distant locations, often spanning entire countries or even continents.
Watering Hole Attack
A Watering Hole Attack is a targeted attack that involves compromising a website frequently visited by a specific target group. The attacker infects a trusted site with an exploit or malware, which then attacks visitors from the selected organization or sector.
Web Application
A web application, also known as an internet application or web app, is a type of software that runs in a web browser and does not require installation on the user's device. Unlike traditional desktop applications, web applications are accessible from any device with internet access and a browser.
Web Security
Web Security is a collection of practices, technologies, and strategies aimed at protecting websites, web applications, and user data from cyber threats. Web security includes protection against attacks that can lead to data theft, privacy breaches, company reputation damage, and other harmful activities.
Web Services
Web services are standards and technologies enabling communication between different applications over the internet or private networks. Web services allow for data and function exchange between systems regardless of platform, programming language, or geographical location.
Web Services Security Testing
Web services security testing is the process of evaluating and verifying the security of network services such as APIs, SOAP, and RESTful services that are used for communication between applications over the internet. The goal of these tests is to identify and eliminate potential security vulnerabilities that could be exploited by attackers to gain unauthorized access to data or systems.
Whaling Phishing
Whaling phishing, also known as whaling, is an advanced form of phishing that targets high-ranking organizational representatives such as CEOs, CFOs, and other board members. These attacks are carefully planned and personalized to deceive victims and induce them to reveal confidential information or take actions that could harm the organization.
Wi-Fi Network
A Wi-Fi (Wireless Fidelity) network is a wireless local area network (WLAN) that enables devices such as computers, smartphones, tablets, and other wireless devices to connect to the internet or other computer networks using radio waves. Wi-Fi is based on IEEE 802.11 standards and is widely used in homes, offices, schools, and public places.
Wi-Fi Network Penetration Testing
Wi-Fi network penetration testing is the process of assessing the security of wireless local area networks (WLAN) through attack simulation and unauthorized access attempts. The goal is to identify security vulnerabilities that could be exploited by potential attackers to gain unauthorized network access or intercept data.
Wi-Fi Security
Wi-Fi security is a collection of practices, technologies, and strategies aimed at protecting wireless networks from unauthorized access, attacks, and other threats. Wi-Fi security ensures confidentiality, integrity, and availability of data transmitted over wireless networks.
Wireless Network Security
Wireless network security refers to the measures and practices used to protect Wi-Fi networks from unauthorized access, attacks, and other threats. It includes securing data transmitted over wireless networks and ensuring that only authorized users can access the network and its resources.
Wireless Networks
Wireless networks are communication systems that enable data transmission between devices without the need for physical cable connections. They use radio waves or infrared to transmit information, providing mobility and flexibility in network access.
Wireshark
Wireshark is a free, open-source network protocol analyzer used to capture and analyze network traffic in real-time. It is one of the most popular tools for network diagnostics and security analysis.
Z
Zero Trust
Zero Trust is an IT security model that assumes that no person, device, or system should be automatically trusted, even if they are inside the organization's network. Instead, every access to resources must be verified and authorized based on context, regardless of where the request originates.
ZTNA
ZTNA (Zero Trust Network Access) is a security model replacing traditional VPN, providing application-level access based on user identity, device status, and context. ZTNA implements the principle of 'never trust, always verify' for remote access.
Most Popular Terms
Frequently searched IT and cybersecurity concepts.
Want to Reduce IT Risk and Costs?
Book a free consultation - we respond within 24h
Or download free guide:
Download NIS2 Checklist