DOCUMENT
Glossary of Common Cybersecurity Terminology
211 definitions by National Initiative for Cybersecurity Careers and Studies, U.S. Computer Emergency Readiness Team, and U.S. Department of Homeland Security

AccessAccess ControlAccess Control MechanismActive AttackActive ContentAdvanced Persistent ThreatAdversaryAir gapAlertAll Source IntelligenceAnalyzeAntispyware SoftwareAntivirus SoftwareAssetAttackAttackAttackerAttack MethodAttack PathAttack PatternAttack SignatureAttack SurfaceAuthenticationAuthenticityAuthorizationAvailabilityBehavior MonitoringBlacklistBlue TeamBotBot MasterBotnetBugBuild Security InCapabilityCloud ComputingCollection OperationsCollect & OperateComputer Network DefenseComputer Network Defense AnalysisComputer Network Defense Infrastructure SupportConfidentialityConsequenceContinuity of Operations PlanCritical InfrastructureCryptanalysisCryptographic AlgorithmCryptographyCryptologyCustomer Service and Technical SupportCyber EcosystemCyber ExerciseCyber InfrastructureCyber OperationsCyber Operations PlanningCybersecurityCyberspaceData AdministrationData AggregationData BreachData IntegrityData Loss PreventionData MiningData TheftDecipherDecodeDecryptDecryptionDenial of ServiceDigital ForensicsDigital Rights ManagementDigital SignatureDisruptionDistributed Denial of ServiceDynamic Attack SurfaceEducation and TrainingElectronic SignatureEncipherEncodeEncryptEncryptionEnterprise Risk ManagementEventExfiltrationExploitExploitation AnalysisExposureFailureFirewallHackerHashingHash ValueHazardIdentity and Access ManagementIncidentIncident ManagementIncident ResponseIncident Response PlanIndicatorIndustrial Control SystemInformation and Communications Technology Supply Chain ThreatInformation and Communication TechnologyInformation AssuranceInformation Assurance ComplianceInformation Security PolicyInformation SharingInformation System ResilienceInformation Systems Security OperationsInformation TechnologyInside ThreatIntegrated Risk ManagementIntegrityIntentInteroperabilityIntrusionIntrusion DetectionInvestigateInvestigationKeyKeyloggerKey PairKey ResourceKnowledge ManagementLegal Advice and AdvocacyMachine Learning and EvolutionMacro VirusMalicious AppletMalicious CodeMalicious LogicMalwareMitigationMoving Target DefenseNetwork ResilienceNetwork ServicesNon-RepudiationObjectOperate & MaintainOperational ExerciseOperations TechnologyOutside ThreatOversight & DevelopmentPassive AttackPasswordPenetration TestingPen TestPersonal Identifying Information / Personally Identifiable InformationPhishingPrecursorPreparednessPrivacyPrivate KeyProtect & DefendPublic KeyPublic Key CryptographyPublic Key InfrastructureRecoveryRed TeamRed Team ExerciseRedundancyResilienceResponseRiskRisk AnalysisRisk AssessmentRisk-Based Data ManagementRisk ManagementRootkitSecret KeySecurely ProvisionSecurity AutomationSecurity PolicySecurity Program ManagementSituational AwarenessSoftware AssuranceSoftware Assurance and Security EngineeringSpamSpoofingSpywareStrategic Planning and Policy DevelopmentSubjectSupervisory Control and Data AcquisitionSupply ChainSupply Chain Risk ManagementSymmetric CryptographySymmetric KeySystem AdministrationSystem IntegritySystems DevelopmentSystems Requirements PlanningSystems Security AnalysisSystems Security ArchitectureTabletop ExerciseTailored Trustworthy SpaceTargetsTechnology Research and DevelopmentTest and EvaluationThreatThreat AgentThreat AnalysisThreat AssessmentTicketTraffic Light ProtocolTrojan HorseVirusVulnerabilityVulnerability Assessment and ManagementWeaknessWhitelistWhite TeamWork FactorWorm
Loading conversations.