Security
This cyber security glossary explains the meaning of terms about different types of computer security threats as well as words about application security, access control, network intrusion detection, security awareness training and computer forensics.

Anti-virus, antimalware
Terms related to spyware, including definitions about malware and words and phrases about online advertising, adware and online privacy.
-
backdoor (computing)
A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
-
malware
Malware, or malicious software, is any program or file that is harmful to a computer user.
-
content personalization
Content personalization is a strategy that tailors webpages and other forms of content to individual users' characteristics or preferences.
Application security
Terms related to application security, including procedural definitions for preventing software vulnerabilities and words and phrases about secure code development.
-
cybercrime
Cybercrime is any criminal activity that involves a computer, networked device or a network.
-
software-defined perimeter (SDP)
The software-defined perimeter, or SDP, is a security framework that controls access to resources based on identity.
-
tokenization
Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential information about the data without compromising its security.
Authentication, access control
Terms related to authentication, including security definitions about passwords and words and phrases about proving identity.
-
identity management (ID management)
Identity management (ID management) is the organizational process for ensuring that individuals have the appropriate access to technology resources.
-
What is zero trust? Ultimate guide to the network security model
Zero trust is a security strategy that assumes all users, devices and transactions are already compromised. The zero trust model requires strict identity and device verification, regardless of the user’s location in relation to the network perimeter.
-
software-defined perimeter (SDP)
The software-defined perimeter, or SDP, is a security framework that controls access to resources based on identity.
Malware
Terms related to malware, including definitions about viruses and Trojans and other words and phrases about malicious software.
-
cyber attack
A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage.
-
malware
Malware, or malicious software, is any program or file that is harmful to a computer user.
-
dropper
A dropper is a small helper program that facilitates the delivery and installation of malware. Sometimes droppers are bundled with free utility programs (such as ad blockers) to avoid detection by antivirus software.
Network security
Terms related to network security, including definitions about intrusion prevention and words and phrases about VPNs and firewalls.
-
data protection management (DPM)
Data protection management (DPM) comprises the administration, monitoring and management of backup processes to ensure backup tasks run on schedule and data is securely backed up and recoverable.
-
cloud access security broker (CASB)
A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.
-
backdoor (computing)
A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
Threat management
Terms related to security threats, including definitions about anti-virus programs or firewalls and words and phrases about malware, viruses, Trojans and other security attacks.
-
backdoor (computing)
A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
-
What is SecOps? Everything you need to know
SecOps, formed from a combination of security and IT operations staff, is a highly skilled team focused on monitoring and assessing risk and protecting corporate assets, often operating from a security operations center, or SOC.
-
cybercrime
Cybercrime is any criminal activity that involves a computer, networked device or a network.