Cybersecurity Glossary
895 terms across 10 categories
Showing all 895 terms
Protection for additive manufacturing.
Security risks in distributed network architectures where high-speed data processing occurs outside centralized security perimeters.
Specialized security measures developed to address the increased complexity and speed of 5G networks.
Restricting system/resources access to authorized users only.
Network security rules governing resource access permissions to protect sensitive data.
Systems that dynamically respond to threats.
Authentication processes that modify security requirements in real time based on user behavior and risk levels.
Techniques that modify analysis approaches based on the evolving behavior of malware samples.
Dynamic partitioning of networks based on real-time risk assessments and threat intelligence.
The dynamic evaluation of user and system behaviors to assign real-time risk scores for access decisions.
New enhancements in the Advanced Encryption Standard designed to bolster cryptographic security.
Techniques for identifying and dismantling sophisticated botnets orchestrated by cybercriminals.
A proactive process of identifying, quantifying, and addressing potential cyber threats against systems.
The practice of mimicking specific threat actors' tactics and techniques for security testing.
Detailed blueprints that replicate known attacker behaviors to assess and improve cybersecurity readiness.
Programs that replicate attacker behavior to test and improve an organization's defensive capabilities.
Protection for aircraft production.
Protection for farming UAVs.
Protection for farming IoT devices.
Protection mechanisms for artificial intelligence systems.