Browse Definitions :

Security

This cyber security glossary explains the meaning of terms about different types of computer security threats as well as words about application security, access control, network intrusion detection, security awareness training and computer forensics.

Anti-virus, antimalware

Terms related to spyware, including definitions about malware and words and phrases about online advertising, adware and online privacy.

  • WannaCry ransomware

    The WannaCry ransomware is a worm that spreads by exploiting vulnerabilities in the Windows operating system.

  • email virus

    An email virus consists of malicious code distributed in email messages to infect one or more devices.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver's license numbers, to impersonate someone else.

View All Anti-virus, antimalware Definitions

Application security

Terms related to application security, including procedural definitions for preventing software vulnerabilities and words and phrases about secure code development.

  • Zoombombing

    Zoombombing is a type of cyber-harassment in which an individual or a group of unwanted and uninvited users interrupt online meetings over the Zoom video conference app.

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • Data Encryption Standard (DES)

    Data Encryption Standard (DES) is an outdated symmetric key method of data encryption.

View All Application security Definitions Back to Top

Authentication, access control

Terms related to authentication, including security definitions about passwords and words and phrases about proving identity.

  • authentication

    Authentication is the process of determining whether someone or something is, in fact, who or what it says it is.

  • brute-force attack

    A brute-force attack is a trial-and-error method used by application programs to decode login information and encryption keys to use them to gain unauthorized access to systems.

  • key fob

    A key fob is a small, programmable device that provides access to a physical object.

View All Authentication, access control Definitions Back to Top

Malware

Terms related to malware, including definitions about viruses and Trojans and other words and phrases about malicious software.

  • WannaCry ransomware

    The WannaCry ransomware is a worm that spreads by exploiting vulnerabilities in the Windows operating system.

  • email virus

    An email virus consists of malicious code distributed in email messages to infect one or more devices.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver's license numbers, to impersonate someone else.

View All Malware Definitions Back to Top

Network security

Terms related to network security, including definitions about intrusion prevention and words and phrases about VPNs and firewalls.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.

  • cryptography

    Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it.

  • WannaCry ransomware

    The WannaCry ransomware is a worm that spreads by exploiting vulnerabilities in the Windows operating system.

View All Network security Definitions Back to Top

Threat management

Terms related to security threats, including definitions about anti-virus programs or firewalls and words and phrases about malware, viruses, Trojans and other security attacks.

  • cryptography

    Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it.

  • brute-force attack

    A brute-force attack is a trial-and-error method used by application programs to decode login information and encryption keys to use them to gain unauthorized access to systems.

  • authentication

    Authentication is the process of determining whether someone or something is, in fact, who or what it says it is.

View All Threat management Definitions Back to Top
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • identity provider

    An identity provider (IdP) is a system component that provides an end user or internet-connected device with a single set of ...

  • remote access

    Remote access is the ability for an authorized person to access a computer or network from a geographical distance through a ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchHealthIT
SearchDisasterRecovery
  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

SearchStorage
  • cold storage

    Cold storage is a computer system or mode of operation designed for the retention of inactive data.

  • tiered storage

    Tiered storage is a method for assigning different categories of data to various types of storage media to reduce overall storage...

  • secondary storage

    Secondary storage is persistent storage for noncritical data that doesn't need to be accessed as frequently as data in primary ...

Close