From CISO Marketplace — the hub for security professionals Visit

Cybersecurity Glossary

895 terms across 10 categories

Showing all 895 terms

3D Printing SecurityNetwork Security

Protection for additive manufacturing.

5G Edge VulnerabilitiesData Protection

Security risks in distributed network architectures where high-speed data processing occurs outside centralized security perimeters.

5G Network Security ProtocolsNetwork Security

Specialized security measures developed to address the increased complexity and speed of 5G networks.

Access ControlIdentity & Access

Restricting system/resources access to authorized users only.

Access Control List (ACL)Identity & Access

Network security rules governing resource access permissions to protect sensitive data.

Active Defense MechanismsData Protection

Systems that dynamically respond to threats.

Adaptive AuthenticationIdentity & Access

Authentication processes that modify security requirements in real time based on user behavior and risk levels.

Adaptive Malware AnalysisMalware Protection

Techniques that modify analysis approaches based on the evolving behavior of malware samples.

Adaptive Network SegmentationNetwork Security

Dynamic partitioning of networks based on real-time risk assessments and threat intelligence.

Adaptive Risk ScoringIdentity & Access

The dynamic evaluation of user and system behaviors to assign real-time risk scores for access decisions.

Advanced AES InnovationsCryptography

New enhancements in the Advanced Encryption Standard designed to bolster cryptographic security.

Advanced Botnet DisruptionMalware Protection

Techniques for identifying and dismantling sophisticated botnets orchestrated by cybercriminals.

Advanced Threat ModelingThreat Intelligence

A proactive process of identifying, quantifying, and addressing potential cyber threats against systems.

Adversary EmulationData Protection

The practice of mimicking specific threat actors' tactics and techniques for security testing.

Adversary Emulation PlansThreat Intelligence

Detailed blueprints that replicate known attacker behaviors to assess and improve cybersecurity readiness.

Adversary Simulation SoftwareThreat Intelligence

Programs that replicate attacker behavior to test and improve an organization's defensive capabilities.

Aerospace Manufacturing SecurityNetwork Security

Protection for aircraft production.

Agricultural Drone SecurityNetwork Security

Protection for farming UAVs.

Agricultural IoT SecurityNetwork Security

Protection for farming IoT devices.

AI Model Security FrameworkThreat Intelligence

Protection mechanisms for artificial intelligence systems.