Explore our comprehensive Cybersecurity Glossary to understand key terms and concepts. Stay informed about the latest industry terminology.
An actuator is a device that initiates a response to a detected event. In cybersecurity, this event is typically a potential threat or vulnerability.
Advanced systems format (ASF) is a digital audio/digital video container format, especially designed for streaming media.
Algorithms are everywhere in our digital lives, powering the apps and services we use, the websites we visit, and the devices we rely on.
The term annotation refers to the process of adding notes or comments to a piece of information, code, or data to provide additional context.
The Arduino is a versatile and popular open-source electronics platform that is widely used in the field of cybersecurity.
The term asynchronous refers to operations that do not happen simultaneously or in a pre-defined order allowing for greater flexibility and efficiency.
In the context of digital communication, attenuation refers to the loss of data signal strength during transmission.
The backslash, also known as a reverse solidus or simply as a slash, is a symbol used in computing for various purposes.
Bespoke software, also known as custom software, is a type of software that is specifically designed and developed for a particular user or organization.
The Boltzmann constant, often denoted by the symbol k or kB, is a fundamental physical constant that plays a pivotal role in the field of statistical mechanics.
The Borland Database Engine (BDE) is a database engine that provides a uniform interface to access different databases in a network.
A botnet is a network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
The term brute force refers to a type of cyber attack where an attacker tries to gain access to a system by guessing the password .
The term cache is derived from French, meaning 'to hide' or 'hidden', which is quite fitting considering its role in the digital world.
Verify you're human and not a bot by solving CAPTCHA's interactive challenges, securing websites from automated threats.
Catfishing refers to the deceptive act of creating a false identity on a social networking service, usually to pursue deceptive online romances.
The Central Processing Unit (CPU), often referred to as the "brain" of a computer, is a critical component of any computing device.
Certified authorization professional (CAP)
The Certified Authorization Professional (CAP) is a globally recognized certification that provides validation of an individual.
Characterization, in the context of cybersecurity, is a critical process that involves the identification, classification and description.
A chatbot is a software application designed to interact with humans in their natural languages through internet-based applications.
Chief technology officer (CTO)
The Chief Technology Officer (CTO) is a pivotal role in any organization, particularly in the realm of cybersecurity.
Chrome extensions are small software programs that enable users to tailor Chrome functionality and behavior to individual needs or preferences.
A circuit, in the context of computing and electronics, refers to a path or a closed loop through which an electric current can flow.
Communication streaming architecture
Communication streaming architecture refers to the design and implementation of systems that facilitate the real-time transmission of data.
The term compile refers to the process of converting source code, written by humans in high-level programming languages, into machine code.
To maintain high standards, it's crucial to ensure that our business practices consistently align with relevant laws and regulations.
CompuServe, a pioneering online service provider, played a significant role in the early development of the internet.
Computer numerical control (CNC)
Computer Numerical Control (CNC) is a technology that uses computers to control and operate machines, which was first introduced in the 1940s and 1950s.
In the context of computer science and cybersecurity, concatenation is a fundamental operation that involves combining two strings end-to-end.
Concurrent use refers to the simultaneous access or operation of a system, application, or data by multiple users.
Ensuring the protection of sensitive information from unauthorized access is a critical component in maintaining the confidentiality and integrity of data.
The term convergence refers to the integration of various systems, technologies, and practices into a unified whole.
Credentials refers to the proof of identity that a user presents when attempting to access a system or network.
The Creeper Virus, which emerged in the early days of computer networking, marked the beginning of a new era of digital threats.
Cricket phones are part of the Cricket Wireless service, a subsidiary of AT&T Inc., which provides prepaid mobile voice, text, and data services.
Cryptography is a method of protecting information by transforming it (encrypting it) into an unreadable format.
The dark web, often shrouded in mystery and misconceptions, is an integral part of the internet that is not indexed.
A data breach occurs when unauthorized individuals gain access to confidential data, often with malicious intent.
Data Manipulation Language, commonly referred to as DML, is a subset of SQL (Structured Query Language) used for managing data in relational databases.
The term decoupled refers to a system design principle where different components of a system are separated or 'decoupled' from each other.
Deep artificial language learning engine (DALL-E)
DALL-E revolutionizes content creation for businesses by transforming text descriptions into unique and relevant images seamlessly
The default gateway is a key player in ensuring that data is transmitted and received accurately and efficiently across networks.
The term demarcation point refers to the physical point at which a telecommunications provider's network ends and the user's network begins.
The term DMZ or Demilitarized Zone refers to a physical or logical subnetwork that separates an organizations internal networks.
Digital rights management (DRM)
Digital Rights Management (DRM) is a systematic approach to copyright protection for digital media to prevent unauthorized redistribution.
DSL provides high-speed internet over traditional telephone lines for quick connectivity.
Direct Messages, or DMs, are private conversations that occur on social media platforms. Unlike public posts, DMs are only visible to the recipient.
The Disjunctive Normal Form (DNF) is a standard way of representing logical formulas in a simplified and standardized form.
DisplayPort is a digital display interface primarily used to connect a video source to a display device, such as a computer monitor.
Distributed denial of service (DDoS)
A Distributed Denial of Service (DDoS) attack is a malicious activity in which a network of compromised computers disrupts services.
The Domain Name System (DNS) is a fundamental part of the internet's infrastructure, acting as the internet's phonebook.
A dongle is a small piece of hardware that connects to a computer to provide it with additional functionality.
Doxing is the act of researching and publicly exposing private or identifying information, breaching personal privacy.
Electronic Data Capture (EDC) is a system designed for the collection of clinical data in electronic format for use mainly in human clinical trials.
Emulation is a technique that replicates the behavior of a system or a component, allowing for the testing and analysis.
Encoding is a process that transforms data into a format that can be easily understood by different systems and devices.
End-user computing (EUC) is a term that refers to systems in which non-programmers can create working applications.
Enterprise data management (EDM)
Enterprise Data Management (EDM) refers to the ability to precisely define and effectively retrieve data for both internal applications and external systems.
The term entity refers to an identifiable and distinct unit within the digital landscape, which can be a user, system or device.
Ephemeral ports, also known as dynamic ports, are temporary, short-lived ports that are assigned automatically by a device's operating system.
An exception, in the context of programming, is an event that occurs during the execution of a program that disrupts the normal flow of instructions.
The XOR gate is a fundamental building block in many digital systems and is used in a variety of applications, including arithmetic operations.
The fail whale is a term that refers to the image that was displayed when Twitter's servers were overloaded and unable to handle user requests.
FTP, or File Transfer Protocol, is a standard network protocol used for the transfer of computer files between a client and server.
Firewalls serve as digital sentinels, shielding networks from unauthorized access and ensuring secure connectivity.
Firmware is the essential software permanently embedded in your device's hardware, ensuring it functions correctly and efficiently.
The term FPS often refers to frames per second. This is a measure of how many distinct images a computer or console can display in one second.
The term functional specification refers to a comprehensive document that outlines the system's capabilities, appearance, and interactions with users.
GLib is a low-level core library that forms the basis of GTK+ and GNOME. It provides data structure handling for C and portability wrappers.
Gain detailed insights with granular data that breaks down information to its finest parts.
A hackathon is a design sprint-like event where computer programmers, software developers and others collaborate intensively on software projects.
Hackers exploit system vulnerabilities for various reasons, ranging from malicious intent to ethical, beneficial purposes.
The term 'haptic' refers to a technology that recreates the sense of touch by applying forces, vibrations, or motions to the user.
At its core, hashing is about transforming data of any size into a fixed size. The output, known as a hash, is a string of characters.
A honeypot, in the context of cybersecurity, is a decoy system set up to attract and trap individuals attempting to gain unauthorized access to a network.
A hotspot refers to a physical location where people can access the internet, typically using Wi-Fi, via a wireless local area network (WLAN) with a router.
Hyperlinks are a fundamental component of the World Wide Web, as they connect different web pages and create a network of information.
The term immutable type refers to an object whose state cannot be modified. In other words, once an object is instantiated, its value remains constant.
Inference is a method used by both cybersecurity professionals and malicious actors to understand and predict patterns.
Information and communication technology (ICT)
Information and Communication Technology (ICT) is a broad term that encompasses all technologies used to handle telecommunications and broadcast media.
Instant messaging (IM) is a type of online chat that offers real-time text transmission over the internet from one device to another.
The term instantiate a term that is often used in the context of creating an instance of a class in object-oriented programming.
Internet protocol address (IP)
In the vast and interconnected realm of the digital world, your digital fingerprint, known as an IP (Internet Protocol) address.
Internet protocol television (IPTV)
Internet Protocol Television, commonly referred to as IPTV, is a system through which television services are delivered using the Internet protocol suite.
The term interweb is a portmanteau of "internet" and "web", often used humorously or sarcastically to refer to the World Wide Web.
The term intranet refers to a private network that is confined within an organization. This network is used to share information among employees.
Iteration, in the most basic sense, refers to the process of repeating a set of operations or procedures until a specific condition is met.
Jailbreak your device to unleash its full potential, breaking free from manufacturer restrictions and gaining control.
Java Foundation Classes (JFC) is a graphical user interface (GUI) framework for Java, developed by Sun Microsystems.
The joule is a unit of energy in the International System of Units. It's named after James Prescott Joule, a British physicist.
Kali Linux is an open-source, Debian-based Linux distribution that is geared towards various information security tasks.
Kerning refers to the process of adjusting the spacing between characters in a proportional font. It is a crucial aspect of creating readable text.
A key fob, in the context of cybersecurity, is a small hardware device with built-in authentication mechanisms.
A keylogger, in its simplest form, is a type of surveillance technology used to monitor and record each keystroke made on a computer keyboard.
A killswitch is a mechanism designed to shut down or disable a system or software in the event of an emergency or security breach.
Knowledge management system (KMS)
A knowledge management system (KMS) is a crucial tool that aids in the collection, organization, and retrieval of knowledge to protect digital assets.
In the simplest terms, latency refers to a delay (network congestion) that occurs in data communication over a network.
A legacy system is any software, hardware, or technology that is outdated but still in use. These systems were often cutting-edge when they were implemented.
Guard your systems against malicious software aimed at harming or exploiting devices, ensuring your digital security and integrity.
The Markov Decision Process (MDP) is a mathematical model used in decision making where the outcomes are partly random and partly under control.
Microsoft Access is a database management system (DBMS) from Microsoft that combines the relational Microsoft Jet Database Engine with a user interface.
A modem is a hardware device that converts data into a format suitable for a transmission medium so it can be transmitted from one computer to another.
Monikers play a crucial role in cybercrime. Cybercriminals often use monikers to maintain anonymity and avoid being traced.
Utilize nslookup to query domain name servers, effortlessly retrieving vital domain information and streamlining your workflow.
A network, in its simplest form, is a group of interconnected computers or devices that can exchange data and communicate with each other.
A Network Block Device (NBD), is a client-server protocol that allows a hard disk or a disk partition, to be used over a network.
Network throttling, a term frequently used in the realm of cybersecurity, refers to the intentional slowing down of internet speed or data transfers.
A non-player character, or non-playable character, is any character in a game that is not controlled by a player.
Non-volatile memory is a type of computer memory that retains its information even when the system is powered off.
A nonce, which stands for number used once, is an arbitrary number that can be used just once in a cryptographic communication.
The term 'Not Safe For Work', often abbreviated as NSFW, is a common term used in the realm of internet culture and digital communication.
The term obsolete refers to technologies, systems, or practices that are no longer in use or have been replaced by newer, more efficient alternatives.
On-premises software, often referred to as on-prem, is a type of software delivery model that is installed and operated from a customer's in-house server.
Secure your accounts with OTPs, ensuring a unique, time-sensitive password for every login, enhancing your digital security.
OpenDNS is a widely used tool that provides an array of services, including domain name system (DNS) services and phishing protection.
The term pages per minute is typically used in the context of printers. It refers to the number of pages that these devices can print or scan in one minute.
A Passive Optical Network (PON) is a telecommunications technology that uses point-to-multipoint fiber to the premises that use unpowered optical splitters.
Protect your digital assets with a strong passkey, your first line of defense against hackers.
The term persistence refers to the ability of a threat actor, such as a hacker, to maintain access to a compromised system even after initial infiltration.
Personal digital assistant (PDA)
A personal digital assistant (PDA), also known as a handheld PC, is a mobile device that functions as a personal information manager.
The term Petabyte represents a colossal amount of information, a volume so vast that it can be difficult to fully comprehend.
Piracy refers to the unauthorized use or reproduction of another's work, often in the form of software, digital media, or intellectual property.
Bypass geo-restrictions and access restricted content with a pirate proxy server, unlocking a world of possibilities.
At its most basic, a POS system is where a business transaction takes place. It's where the exchange of goods or services for money occurs.
Postscript is a programming language that has been used for decades to describe the appearance of a printed page.
Precedence refers to the order in which operations are performed, particularly in the context of computer programming and network protocols.
Project management office (PMO)
The Project Management Office (PMO) is a crucial component of any organization that undertakes multiple, complex projects.
The term Proof of Concept is often used in various fields such as software development, business development, and Cybersecurity.
Proprietary software, a term that is often thrown around in discussions about software development, licensing, and usage.
Provisioning refers to the process of setting up IT infrastructure. It involves the allocation of resources, preparing and equipping a network.
A proxy, in its most basic form, is a server that acts as an intermediary for requests from clients seeking resources from other servers.
Safeguard your online identity by opting for a pseudonym rather than using your real name, ensuring your privacy and security.
At its core, a query is a request for information. In the context of a database, a query is a command that is used to retrieve data from the database.
The term queue refers to a type of data structure where elements are kept in order and the operations of addition and removal are performed at different ends.
A QR code, or Quick Response code, is a type of two-dimensional barcode that can be read using smartphones and other devices.
QuillBot is a paraphrasing tool, a product of artificial intelligence and natural language processing, designed to rewrite or rephrase sentences.
The term range is a concept that permeates various aspects of the field, from network security to data encryption.
Shield your data from ransomware that encrypts files and demands payment for their release, ensuring your digital safety.
Redaction is a process that involves the careful editing or censoring of sensitive information from documents or digital files.
Redundancy is a strategy that involves the duplication of critical components or functions of a system with the intention of increasing reliability.
A request for proposal (RFP) is a document that an organization posts to elicit bids from potential vendors for a product or service.
Resource reservation protocol (RSVP)
The Resource Reservation Protocol (RSVP) is a transport layer protocol designed to reserve resources across a network for an integrated services Internet.
Rooting is a process that allows users of smartphones, tablets, and other devices to attain privileged control, known as root access.
The role of a Scrum Master is a multifaceted and dynamic role, serving as a guardian of the agile principles in the SCRUM framework.
Securely store and transmit data using a server with robust encryption and security protocols to protect your information.
Safeguard sensitive data from unauthorized access and prevent security breaches with robust protective measures.
Semantics refers to the study of meaning in language, but in the context of cybersecurity, it is often used to describe the meaning and interpretation of data.
Service set identifier is the name assigned to a wireless network, which allows devices to distinguish one network from another.
The acronym SMH stands for 'shaking my head'. It originated in the early days of internet chat rooms and online forums.
Single sign-on (SSO), is a user authentication process that permits a user to enter one username and password in order to access multiple applications.
The term spam in the context of digital communications originated from a 1970s Monty Python sketch about a canned meat product.
The term 'spectrum crunch' refers to the potential lack of sufficient wireless frequency spectrum or bandwidth to handle the increasing number of devices.
Speech synthesis, also known as text-to-speech (TTS), is a technology that converts written text into audible speech.
Spoofing, in the context of cybersecurity, is a malicious practice where an attacker disguises communication or data so it appears to be from a trusted source.
Spooling, an acronym for Simultaneous Peripheral Operations Online, is a computing process that manages data by placing it into a buffer.
Static random access memory (SRAM)
Static Random Access Memory, often abbreviated as SRAM, is a type of semiconductor memory that uses bistable latching circuitry to store each bit.
Stuxnet is a highly sophisticated computer worm that was first discovered in 2010. The origins of Stuxnet are shrouded in mystery.
Surface-mount devices (SMDs) are a type of electronic component that is mounted directly onto the surface of printed circuit boards (PCBs).
A surge protector, also known as a surge suppressor or surge diverter, is a device that protects electronic equipment from sudden increases in electric power.
Swatting is a dangerous and illegal practice that has emerged in the digital age, primarily within the online gaming community.
Syllogism, a term rooted in classical logic, is a form of reasoning in which a conclusion is drawn from two given or assumed propositions (premises).
The term tautology originates from the field of logic, where it is used to describe a statement that is always true.
Telemetry, in its most basic form, involves the collection of measurements or other data at remote or inaccessible points and their automatic transmission.
The Pirate Bay, often abbreviated as TPB, is a well-known online index of digital content that allows users to search, download, and contribute torrent files.
TLDR, an acronym for "Too Long; Didn't Read", is a common internet slang used to summarize lengthy content on the internet.
Transient in cybersecurity: a key concept in system flexibility and security vulnerability. Essential for professionals.
Transmission control protocol (TCP)
The Transmission Control Protocol (TCP) is a fundamental protocol within the suite of Internet Protocol (IP) standards.
The term Trojan Horse refers to a type of malicious software (malware) that deceives users into running it by pretending to be a harmless or beneficial program.
The term truncate refers to the process of reducing the size of data to save space, improve efficiency or protect sensitive information.
Tweaking, in the context of cybersecurity, is a term that refers to the process of making fine adjustments to systems or software.
Ubiquitous computing is a concept in software engineering and computer science where computing is made to appear anytime and everywhere.
Uniform resource locator (URL)
A URL, or Uniform Resource Locator, serves as the unique address for each and every resource available online.
The term Value-Added Service (VAS) refers to an additional service provided by a cybersecurity firm that enhances the value of their core offerings.
At its core, a vanity domain is a unique, personalized web address that serves as an online identifier for a person, business, or organization.
The VGA cable was first introduced in 1987 by IBM. It was designed to transmit analog video data from a computer to a monitor.
Virtual channel identifier (VCI)
The Virtual Channel Identifier (VCI) is a unique identifier that facilitates the movement of data across virtual channels in a network.
Protect your online privacy and access restricted content with a VPN, which masks your IP address.
Visitor location register (VLR)
A Visitor Location Register (VLR) is a database used within mobile communication systems, such as the Global System for Mobile Communications (GSM).
VMware is a subsidiary of Dell Technologies, that provides cloud computing and virtualization software and services.
The term volatile is a term that is often used to describe a type of data storage that loses its content when the power is turned off.
A web crawler is an internet bot that systematically browses the World Wide Web, typically for the purpose of web indexing.
Windows Live Mail (now Outlook.com) is an email client developed by Microsoft as part of its Windows Essentials 2012 suite.
A wireless access point (WAP) is a networking device that allows Wi-Fi devices to connect to a wired network as a standalone device.
Wireless fidelity, commonly known as Wi-Fi, is a technology that allows devices such as computers and other digital devices to connect to the internet.
The term zerg rush originates from the real-time strategy game StarCraft, developed by Blizzard Entertainment.