• Access Control: A process of granting or denying specific requests to access resources or perform operations based on identity, role, and permission.
  • Access Control: a security mechanism that regulates who or what can access resources, systems, or data, based on defined policies and rules.
  • Access Control: Process of granting or denying access to resources based on defined security policies.
  • Access Control: The process of regulating who has access to a network or system, and what actions they are allowed to perform.
  • Access Control: A security mechanism that regulates who or what is allowed to access a system or network, and what actions they are allowed to perform.
  • Access control: The process of limiting access to resources based on security policies and user permissions.
  • Access control: The process of managing and regulating who or what can access a system or resource.
  • Access Control: The process of regulating who or what is allowed, to access resources or information, based on predefined rules, and policies, to prevent unauthorized access.
  • Access Control: The process of regulating who, or what, has permission to access and use a system, network, or resource, based on predefined policies and rules.
  • Access control: The process of restricting access to resources, based on a set of security policies.
  • Access control: The restriction of access to resources, based on the identity of the individual and their permissions.
  • Advanced Encryption Standard (AES): A symmetric key encryption standard adopted by U.S. government for secure communication and data encryption.
  • Advanced Encryption Standard (AES): A widely used encryption algorithm that uses symmetric encryption to protect information.
  • Advanced Encryption Standard (AES): A widely used symmetric encryption standard that uses a fixed block size of 128 bits and key sizes of 128, 192, or 256 bits.
  • Advanced persistent threat (APT): A type of cyber attack that targets a specific organization or individual and persists over an extended period of time.
  • Adversarial machine learning: A field of machine learning concerned with designing models that are robust against malicious attacks, such as adversarial examples and model poisoning.
  • Adware: A type of malware that displays unwanted or intrusive advertisements on infected systems.
  • Adware: A type of software that displays unwanted advertisements, often in exchange for providing a free or low-cost service.
  • Adware: A type of software that displays unwanted advertisements, or collects user data, without the user’s knowledge or consent.
  • Adware: A type of software, that displays unwanted advertisements, on a user’s device, and can track user behavior, for marketing purposes.
  • Adware: Software, that displays unwanted or intrusive ads, on a user’s computer or device, often bundled with other software, or downloaded from the web.
  • AES (Advanced Encryption Standard): A symmetric key encryption algorithm that is widely used for secure data transmission.
  • AES (Advanced Encryption Standard): a widely-used symmetric encryption algorithm for secure data transmission.
  • Antivirus: a program that detects and removes malware (malicious software) from a computer.
  • Anti-virus software: A program that protects a computer or network from malicious software (malware) attacks.
  • Anti-virus software: A type of security software that scans a system or network for viruses, and removes any detected viruses.
  • Antivirus: Software that detects, prevents and removes malicious software (malware) from computers and other devices.
  • AP (Access Point): A device that allows wireless devices to connect to a wired network.
  • API (Application Programming Interface): a set of protocols, routines, and tools for building software and applications.
  • APT (Advanced Persistent Threat): A type of cyber attack in which an attacker gains unauthorized access to a network and remains undetected for an extended period of time, stealing sensitive data or compromising systems.
  • Artificial Intelligence: Refers to the development of computer systems that can perform tasks that would normally require human intelligence, such as recognizing speech, making decisions, and solving problems.
  • Asymmetric encryption: An encryption method that uses a pair of public and private keys for encryption and decryption, respectively.
  • Asymmetric Key Algorithm: A type of encryption that uses two different keys for encryption and decryption, making key management more complex but more secure.
  • Asymmetric Key Encryption: A type of encryption where two different keys, a public key and a private key, are used for encryption and decryption.
  • Asymmetric Key Encryption: An encryption technique that uses a pair of keys, a public key for encryption and a private key for decryption.
  • Asymmetric Key Encryption (Public Key Encryption): An encryption method, that uses two keys, a public key, and a private key, for encryption and decryption, and provides stronger security, but slower encryption and decryption, compared to symmetric key encryption.
  • Authentication: The process of verifying the identity of a user or device.
  • Authentication: The process of verifying the identity of a user, device, or system, before granting access to resources.
  • Authentication: The process of verifying the identity of a user, device, or system, by requiring proof of identity, such as a username and password.
  • Authenticity: The property of a system or protocol that ensures that a message or data is authentic, meaning it is from the sender it claims to be from.
  • Authorization: The process of determining, based on access control rules, what a user is allowed to access, and what actions they are allowed to perform, in a system or network.
  • Authorization: The process of granting or denying access to a resource based on the user’s identity and permissions.
  • Authorization: The process of granting or denying access to resources based on an individual’s identity and permissions.
  • Authorization: The process of granting or denying access to resources, based on a user’s authentication and security policies.
  • Authorization: The process of granting or denying access to resources, based on the identity of a user, device, or system, and the permissions assigned to them.
  • Autoencoder: A type of neural network architecture used for unsupervised learning, where the network learns to reconstruct input data from a lower-dimensional encoding.
  • Availability: The property of a system or protocol that ensures that a resource is available to users when they request it.
  • Backup and disaster recovery (BDR): The process of creating and maintaining backup copies of critical data, to enable the recovery of data and systems in the event of a disaster or outage.
  • Backup: A duplicate copy of data, used to restore data in case of data loss, due to hardware failure, cyber attack, or other disasters.
  • Below are few more technical terms related to computer and information technology:
  • Big Data: Refers to the large and complex sets of data that are generated by businesses and individuals, and that require sophisticated techniques to analyze and make sense of.
  • Binary tree: A tree data structure where every node has at most two children.
  • Blockchain: A decentralized and distributed ledger system used to store and manage digital transactions securely and transparently.
  • Botnet: a network of compromised computers controlled by an attacker to carry out malicious activities, such as DDoS attacks.
  • Botnet: A network of infected computers controlled by a central command and control server to perform malicious tasks
  • Botnet: a network of infected computers that are controlled remotely by a hacker.
  • Botnet: A group of infected computers that are controlled by a attacker, often used to launch DDoS attacks.
  • Botnet: A network of compromised computers, controlled by an attacker to carry out coordinated attacks or perform other malicious tasks.
  • Botnet: A network of compromised devices (bots) controlled by a single attacker, used to carry out malicious activities like DDoS attacks.
  • Botnet: A network of infected computers that are controlled by an attacker to perform coordinated attacks, such as distributed denial-of-service (DDoS) attacks.
  • Botnet: A network of infected devices, also known as “bots,” that are remotely controlled, and used to perform malicious actions, such as DDoS attacks, spamming, or data theft.
  • Breadth-first search (BFS): A type of traversal for trees and graphs that explores all the vertices at the current depth before moving on to the next level.
  • Brute-force attack: A type of attack in which an attacker tries many possible combinations of passwords or keys until the correct one is found.
  • Buffer overflow attack: A type of cyber attack that occurs when a program tries to store more data in a buffer, than it can hold, causing the program to crash, or execute arbitrary code.
  • Buffer Overflow Attack: An attack, where an attacker exploits a vulnerability, in a system or application, by sending a large amount of data, that exceeds the capacity of the buffer, causing it to overflow, and overwrite adjacent memory, to execute malicious code, or crash the system.
  • Buffer Overflow: A type of security vulnerability that occurs when a program writes more data to a buffer than it can hold, causing the program to overwrite adjacent memory locations.
  • Buffer overflow: A type of vulnerability in software, where input data is allowed to overwrite the boundaries of a buffer in memory, potentially allowing attackers to execute malicious code.
  • Buffer Overflow: A type of vulnerability, in which, data input, to a program, exceeds the allocated buffer size, causing the program to crash, or execute arbitrary code, controlled by an attacker.
  • Buffer overflow: An attack in which an attacker provides more data than a program is designed to handle, causing it to overflow its buffer and execute arbitrary code.
  • Bullet Point List All Secure Terminology and Related Definitions.
  • Cassandra: NoSQL database that is highly available and scalable, designed for handling large amounts of data across many commodity servers, providing high performance and linear scalability.
  • Certificate Authority (CA): A trusted third party responsible for issuing digital certificates used to authenticate the identity of parties in a secure network communication.
  • Certificate Authority (CA): A trusted third-party organization responsible for issuing digital certificates and public keys for SSL/TLS.
  • Certificate Authority (CA): a trusted third-party organization responsible for verifying the identity of individuals and organizations and issuing digital certificates.
  • Certificate Authority (CA): An entity trusted to issue digital certificates for use in public key infrastructure.
  • Certificate Authority (CA): An organization that issues digital certificates used to authenticate and verify the identity of a website, an individual or a device.
  • Certificate Authority (CA): A trusted third-party organization that issues digital certificates and manages public key infrastructure to secure online transactions.
  • Certificate Authority (CA): A trusted third-party organization, or entity, that is responsible for issuing, revoking, and managing digital certificates, and ensuring the authenticity of digital identities.
  • Certificate Authority (CA): an entity that issues digital certificates and manages the public key infrastructure (PKI).
  • Certificate Authority (CA): An entity, responsible for issuing and managing digital certificates, that are used to verify the identity of a website, or an individual, in a secure communication.
  • Certificate Authority (CA): An entity, that issues digital certificates, used to verify the identity, and authenticity, of web sites, or other online entities, and establish secure, encrypted connections.
  • Certificate Revocation List (CRL): a list of revoked digital certificates, maintained by a certificate authority.
  • Certificate Signing Request (CSR): A request to a certificate authority to issue a digital certificate.
  • Certificate Signing Request (CSR): A request for a digital certificate, submitted by an applicant to a certificate authority, which includes the applicant’s public key and information about the entity seeking the certificate.
  • Certificate: a digital document that binds a public key to an identity, such as a domain name, and is signed by a trusted third party (CA).
  • Chain of Trust: The relationship between a certificate, the issuing certificate authority and the root certificate, where each certificate must be verified before it can be trusted.
  • Clickjacking Attack: A type of attack, that involves tricking a user, into clicking on hidden, or disguised, elements, on a web page, that perform unintended actions, or steal sensitive information.
  • Clickjacking: A type of cyber attack that tricks a user into clicking on a hidden link, or button, by disguising it as a legitimate element of a web page.
  • Cloud Computing: A model of computing where resources, software, and data are provided over the internet.
  • Cloud Computing: Refers to the delivery of computing resources, such as servers, storage, and applications, over the internet on a pay-per-use basis.
  • Cloud Security: the protection of data, applications, and infrastructure in cloud computing environments.
  • Cloud security: The protection of data, applications, and systems, in cloud computing environments, from threats and vulnerabilities.
  • Cloud security: The security measures and practices applied to protect data and systems hosted on cloud computing platforms.
  • Cloud Storage: A model of data storage where the digital data is stored in logical pools, across multiple servers
  • Code Injection Attack: A type of attack, that involves injecting malicious code, into a legitimate program, or system, to manipulate the execution flow, or compromise the security, of the system, or data.
  • Code injection attack: A type of cyber attack that occurs when an attacker injects malicious code into a vulnerable program or system, causing it to execute the attacker’s code.
  • Command Injection Attack: A type of attack, that involves injecting malicious commands, into a system, or application, to gain unauthorized access, or control over the system.
  • Command injection attack: A type of cyber attack that occurs when an attacker injects malicious commands into a vulnerable system, by exploiting a vulnerability in the system’s code.
  • Command Injection Attack: An attack, where an attacker injects malicious commands, into a vulnerable application, to execute arbitrary code, or steal sensitive information, by exploiting vulnerabilities, in the way the application processes user inputs.
  • Compliance: The act of following established laws, regulations, standards, and policies related to information security.
  • Computational complexity: The study of the amount of resources (such as time and storage) required to solve a computational problem.
  • Confidentiality: The property of a system or protocol that prevents unauthorized access to information being transmitted or stored.
  • Content Delivery Network (CDN): a system of servers that deliver web content based on the geographic locations of the user.
  • Continuity of Operations (COOP): A plan that helps ensure the continuation of critical operations during a disaster or emergency.
  • Continuous Delivery (CD): An extension of Continuous Integration that aims to ensure that every change to the codebase can be automatically released to production, subject to approval and acceptance criteria being met.
  • Continuous Deployment: Similar to Continuous Delivery, but with the automated release to production being the default, without the need for approval.
  • Continuous Integration (CI): The practice of regularly merging all developers’ code changes into a central repository, automating the build and testing process.
  • Continuous Testing: The practice of automatically testing code changes as part of the software development pipeline, from development to deployment.
  • Convolutional Neural Network (CNN): A type of neural network commonly used in computer vision tasks, characterized by its use of convolutional layers to process image data.
  • Cross-site request forgery (CSRF) attack: A type of attack that tricks a user into making an unauthorized action on a website.
  • Cross-Site Request Forgery (CSRF) Attack: A type of attack, that involves tricking a user, into performing actions, on a web site, that they did not intend to perform, by sending them forged requests, from another site, that appears trustworthy.
  • Cross-Site Request Forgery (CSRF) Attack: A type of attack, that tricks a user, into performing actions, on a web site, that they did not intend, by forging malicious requests, that appear to be legitimate, and originate from a trusted web site.
  • Cross-Site Request Forgery (CSRF) Attack: A type of attack, that tricks a user, into performing unintended actions, on a web application, by exploiting the trust relationship, between the user and the application, and sending forged requests, from a compromised website.
  • Cross-Site Request Forgery (CSRF) attack: A type of cyber attack that involves tricking a user into performing an action, such as changing their password, by forging a request from a trusted website.
  • Cross-site request forgery (CSRF) attack: A type of web application security vulnerability that allows an attacker to trick a user into performing actions, such as changing their password, without their knowledge or consent.
  • Cross-Site Request Forgery (CSRF) Attack: An attack, where an attacker tricks a user, into performing actions, on a vulnerable website, that they did not intend, by sending a malicious request, from another website, that the user is visiting, to steal sensitive information, or perform unauthorized actions.
  • Cross-Site Request Forgery (CSRF) Attack: An attack, where an attacker tricks a user, into submitting a malicious request, to a web application, that the user is already authenticated to, to perform unauthorized actions, on behalf of the user.
  • Cross-Site Request Forgery (CSRF): A type of vulnerability, in which, an attacker, tricks a user, into making an unintended request, to a web application, by forging a request, from a trusted site, that the user is currently logged into.
  • Cross-Site Scripting (XSS) Attack: A type of attack, that involves injecting malicious code, into a web page, that is viewed by other users, and executed by their web browsers, to steal sensitive information, or perform malicious actions, on behalf of the victims.
  • Cross-Site Scripting (XSS) Attack: A type of attack, that involves injecting malicious code, into a web site, that is executed, by the visitors’ browsers, to steal sensitive information, or manipulate their interactions, with the site.
  • Cross-Site Scripting (XSS) Attack: A type of attack, that targets web applications, that allow user-supplied input, to inject malicious scripts, or code, into web pages, viewed by other users, to steal credentials, or compromise security.
  • Cross-Site Scripting (XSS) attack: A type of cyber attack that involves injecting malicious code, or scripts, into a web page, to steal sensitive information, or manipulate user actions.
  • Cross-site scripting (XSS) attack: A type of security vulnerability that allows an attacker to inject malicious code into a website, executed by unsuspecting users.
  • Cross-site scripting (XSS) attack: A type of web application security vulnerability that allows an attacker to inject malicious code into a web page, viewed by other users.
  • Cross-Site Scripting (XSS) Attack: An attack, that involves injecting malicious code, into a web page, viewed by other users, to steal sensitive information, or manipulate the page content, for malicious purposes.
  • Cross-Site Scripting (XSS) Attack: An attack, where an attacker injects malicious code, into a vulnerable web page, that can be executed, by unsuspecting users, who visit the page, to steal sensitive information, such as login credentials, or perform actions, on behalf of the user.
  • Cross-Site Scripting (XSS) Attack: An attack, where an attacker injects malicious script, into a web page, that is viewed by other users, to steal sensitive information, or perform unauthorized actions, on behalf of the user.
  • Cross-Site Scripting (XSS): A type of security vulnerability in web applications that allows attackers to inject malicious scripts into web pages viewed by other users.
  • Cross-Site Scripting (XSS): A type of security vulnerability that allows an attacker to inject malicious code into a website, which is then executed by the victims who visit the site.
  • Cross-site scripting (XSS): A type of vulnerability in web applications, where an attacker injects malicious code into a website, allowing them to steal data or perform other malicious actions.
  • Cross-Site Scripting (XSS): A type of vulnerability, in which, an attacker, injects malicious scripts, into a web page, that can be executed, by a victim’s browser, to steal sensitive information, or perform other malicious actions.
  • Cross-Site Scripting (XSS): A type of web-based attack, that injects malicious code, into a vulnerable website, or web application, and exploits the trust relationship, between the user and the website, to steal data, or perform malicious actions.
  • Cross-site scripting (XSS): An attack in which an attacker injects malicious scripts into a website, allowing them to steal user data or perform other malicious actions.
  • Cryptographic Attack: A type of attack, that exploits weaknesses, in cryptographic algorithms, or their implementation, to compromise the security, of encrypted data, or the confidentiality, or integrity, of the communication.
  • Cryptographic Hash Function: A mathematical function that takes an input (or “message”) and returns a fixed-size string of bytes. The output is generated deterministically and can be used as a digital “fingerprint” or summary of the input, as even a small change in the input results in a large, unpredictable change in the output. Common hash functions used in cryptography include SHA-256 and SHA-3.
  • Cryptographic Key: a string of data used to encrypt and decrypt messages, and protect data privacy and security.
  • Cryptography: The practice of secure communication by encoding information to prevent unauthorized access.
  • Cryptojacking: A type of attack, that uses a user’s device, or a website, to mine cryptocurrency, without the user’s knowledge or consent, by exploiting vulnerabilities, or injecting malicious code.
  • Cyber insurance: Insurance coverage for losses resulting from cyber attacks or data breaches.
  • Cybercrime: Any criminal activity that involves the use of technology, such as hacking, phishing, and identity theft.
  • Cyber-espionage: The use of technology, such as hacking, to gather sensitive information from individuals, organizations, or governments.
  • Cybersecurity: The protection of internet-connected systems, including hardware, software, and data, from attack, damage, or unauthorized access.
  • Cybersecurity insurance: An insurance policy designed to protect individuals and organizations from the financial impact of cyber attacks, such as theft of funds or damage to reputation.
  • Cybersecurity: Refers to the practice of protecting computers, networks, and data from theft, damage, and unauthorized access.
  • Cybersecurity: The protection of systems, networks, and data from cyber attacks, theft, and damage.
  • Cyberwarfare: The use of technology, such as computer networks and the Internet, for military purposes, such as espionage, sabotage, and psychological operations.
  • Dark web: An hidden part of the internet accessible only through specific tools and not indexed by traditional search engines.
  • Data Backup: The process of copying data to a secondary storage device to protect against data loss.
  • Data Encryption: The process of converting data into a coded form to prevent unauthorized access.
  • Data Loss Prevention (DLP): a set of technologies and processes used to prevent sensitive data from being lost, stolen, or otherwise compromised, through accidental or intentional means.
  • Data loss prevention (DLP): A security solution that helps prevent sensitive data from being lost, stolen, or misused, by monitoring and controlling data access, usage, and transmission.
  • Data Loss Prevention (DLP): A security system, that monitors and protects sensitive data, such as personal or financial information, from being copied, shared, or transferred outside of an organization, to prevent data breaches.
  • Data loss prevention (DLP): A security technology used to prevent sensitive information from being shared or leaked.
  • Data Loss Prevention (DLP): A type of security technology, or policy, that prevents sensitive information, such as credit card numbers, Social Security numbers, and intellectual property, from being leaked or lost.
  • Data loss prevention (DLP): The set of tools and processes used to prevent the unauthorized or accidental loss of sensitive data.
  • Data privacy: The protection of personal information, ensuring that it is collected, stored, and processed in accordance with legal and ethical requirements.
  • Data Recovery: The process of restoring lost or inaccessible data from backup or other sources.
  • DDoS (Distributed Denial of Service): An attack in which multiple compromised computers are used to flood a target system with traffic, causing it to become unavailable to users.
  • DDoS (Distributed Denial of Service): An attack in which multiple compromised systems are used to flood a target website or network with traffic to disrupt service
  • DDOS (Distributed Denial of Service): An attack technique that aims to make a network resource unavailable by overwhelming it with traffic from multiple sources.
  • DDoS (Distributed Denial of Service): an attack that involves overwhelming a target system with a high volume of traffic from multiple sources, making it unavailable to users.
  • DDoS (Distributed Denial of Service) Attack: A type of attack, that involves overwhelming a target system, or network, with a large amount of traffic, from multiple sources, to render the target unavailable, or slow down its performance.
  • DDoS (Distributed Denial of Service) Attack: An attack, that involves overwhelming a target system, with a large volume of traffic, from multiple sources, to disrupt its availability and functionality.
  • DDoS (Distributed Denial of Service) protection: Prevents unauthorized access to a network by overloading it with traffic from multiple sources.
  • DDoS (Distributed Denial of Service): A type of attack where multiple compromised computers are used to flood a target system with traffic, causing it to become overwhelmed and unavailable to users.
  • DDoS (Distributed Denial of Service): A type of attack, that inundates a target system, with a large volume of traffic, from multiple sources, causing the system to become unavailable, to its intended users.
  • DDoS Attack: A distributed denial of service attack is a type of cyber attack in which multiple compromised computers are used to flood a target system with traffic, causing it to become overwhelmed and unavailable.
  • DDoS Attack: a type of cyber attack in which a large number of computers are used to overwhelm a target system with traffic, making it unavailable to users.
  • DDoS: Distributed Denial of Service (DDoS) is a type of cyber attack in which multiple compromised devices are used to flood a target system with traffic, making it unavailable to users.
  • Decryption: The process of converting encrypted data back into its original, readable format, using a key.
  • Decryption: The process of converting encrypted text back into plain text, to restore the original information.
  • Denial of Service (DoS): a type of attack in which a network resource is made unavailable to its intended users, often by overwhelming it with traffic from multiple sources.
  • Denial of Service (DoS) Attack: A type of attack, that aims to disrupt the availability, of a network, or system, by overwhelming it with a large amount of traffic, or requests, or by exploiting vulnerabilities, in the network, or system.
  • Denial of Service (DoS) Attack: A type of attack, that aims to make a system, or network, unavailable, to its intended users, by overloading it, with traffic, or requests, until it crashes, or becomes inaccessible.
  • Denial of Service (DoS) Attack: A type of attack, that overloads a system, or network, with excessive requests, traffic, or data, to disrupt its normal functioning, and prevent users from accessing its services.
  • Denial of Service (DoS) attack: A type of cyber attack that involves overwhelming a network or system with traffic, to make it unavailable to legitimate users.
  • Denial of service (DoS) attack: A type of cyber attack that makes a network resource unavailable to its intended users, by flooding it with traffic from multiple sources.
  • Denial of Service (DoS) attack: An attack that attempts to make a device or network unavailable by overwhelming it with traffic.
  • Denial of Service (DoS) Attack: An attack, that aims to overload and shut down a network or a system, by sending a large number of requests, or traffic, from multiple sources, to disrupt its normal functioning, and cause a denial of service, to legitimate users.
  • Denial-of-Service (DoS) Attack: A type of attack, that aims to make a network, or a system, unavailable to its intended users, by overwhelming it with traffic, requests, or invalid data.
  • Denial-of-Service (DoS) Attack: A type of attack, that aims to make a system or network unavailable, by overwhelming it with excessive traffic, requests, or system resource utilization, to prevent legitimate users from accessing it.
  • Denial-of-service (DoS) attack: An attack designed to make a system or website unavailable, by overwhelming it with traffic or requests.
  • Denial-of-service (DoS) attack: An attack that overloads a system or network with traffic, making it unavailable to users.
  • Denial-of-Service (DoS) Attack: An attack, where an attacker floods a network, or a system, with excessive traffic, to prevent legitimate users, from accessing the service, or slow down the system’s performance, to make it unavailable.
  • Depth-first search (DFS): A type of traversal for trees and graphs that explores as far as possible along a branch before backtracking.
  • DevOps: A set of practices that combines software development and IT operations
  • DevOps: A software development practice that combines software development (Dev) and IT operations (Ops) to shorten the development lifecycle, while delivering features, fixes, and updates frequently in close alignment with business objectives.
  • DevOps: Refers to a set of practices and principles that aim to improve collaboration and communication between software development and operations teams, with the goal of delivering software faster and more reliably.
  • DHCP (Dynamic Host Configuration Protocol): A protocol used to automatically assign IP addresses to devices on a network.
  • DHCP (Dynamic Host Configuration Protocol): DHCP is a network protocol that automatically assigns IP addresses to network devices. It eliminates the need for manual IP address configuration.
  • Differential privacy: A privacy-preserving technique that adds noise to the data to prevent identification of individual data points, while still preserving the accuracy of aggregate statistics.
  • Diffie-Hellman Key Exchange: a method for securely exchanging cryptographic keys over an insecure network.
  • Digital Certificate: An electronic document that verifies the identity of a website and is used to establish an encrypted connection.
  • Digital Certificate: An electronic document, that contains information about a digital identity, such as name, address, public key, and digital signature of the certificate authority (CA).
  • Digital Signature: a mathematical process used to verify the authenticity and integrity of electronic data, often used in electronic transactions and digital communications.
  • Digital Signature: A mechanism to verify the authenticity and integrity of a message through a hash function and public key cryptography.
  • Digital Signature: A secure electronic signature used to verify the authenticity and integrity of a document or data.
  • Digital Signature: An electronic method of verifying the authenticity and integrity of a message or data by encrypting it with the sender’s private key, allowing the recipient to verify it with the sender’s public key.
  • Digital Signature: A code attached to an electronic document that verifies the authenticity of the sender and the integrity of the message.
  • Digital Signature: a mathematical technique used to verify the authenticity and integrity of digital data, using a private key to generate a signature and a public key to verify it.
  • Digital signature: A mathematical technique used to verify the authenticity and integrity of electronic data, by using a private key to generate a unique digital signature, and a public key to verify it.
  • Digital Signature: A mathematical technique, based on encryption and hash functions, that is used to verify the authenticity and integrity of digital data, such as emails, documents, and software.
  • Digital Signature: a method for verifying the authenticity and integrity of a message or document, using a private key to encrypt a hash of the message.
  • Digital Signature: a secure, encrypted message that verifies the authenticity and integrity of a digital document or transaction.
  • Digital signature: A type of electronic signature, based on public key cryptography, that is used to authenticate the origin, and verify the integrity, of electronic messages.
  • Digital signature: An electronic method of verifying the authenticity and integrity of a message or document.
  • Digital Signature: An electronic method, used to verify the authenticity, and integrity, of digital data, such as emails, files, or software, and prevent tampering, or impersonation.
  • Digital signature: An electronic signature used to verify the authenticity and integrity of a document or message.
  • Directory Traversal Attack: A type of attack, that exploits vulnerabilities, in the file and directory handling mechanisms, of a web server, or system, to access restricted files, or directories, outside the intended web root, or system directory.
  • Disaster Recovery (DR): A plan that outlines procedures for restoring disrupted systems and processes after a disaster or other major event.
  • Discretionary Access Control (DAC): Access control model where the owner of a resource determines who has access to it.
  • Distributed Denial of Service (DDoS) Attack: A type of attack, that involves multiple compromised systems, or devices, that launch coordinated attacks, against a single target, to overwhelm it with a large amount of traffic, or requests, and disrupt its availability.
  • Distributed Denial of Service (DDoS) Attack: A type of attack, that involves using multiple, compromised systems, or devices, to perform a DoS attack, to increase the scale, and impact, of the attack.
  • Distributed Denial of Service (DDoS) Attack: A type of attack, that uses multiple compromised systems, or botnets, to launch a coordinated and amplified attack, on a single target, and disrupt its normal functioning.
  • Distributed denial of service (DDoS) attack: A type of cyber attack that involves multiple systems, often infected with malware, working together to launch a coordinated DoS attack.
  • Distributed Denial of Service (DDoS) attack: A type of cyber attack that involves overwhelming a network or system with traffic from multiple sources, to make it unavailable to legitimate users.
  • Distributed Denial of Service (DDoS) attack: An attack that involves multiple devices flooding a target device or network with traffic to make it unavailable.
  • Distributed Denial of Service (DDoS) Attack: An attack, where multiple systems, controlled by an attacker, flood a target system, with excessive traffic, to make it unavailable, to legitimate users.
  • Distributed denial-of-service (DDoS) attack: A type of DoS attack that involves a large number of compromised devices, working together to attack a target system.
  • Distributed denial-of-service (DDoS) attack: A type of DoS attack that uses multiple devices to flood a system or network with traffic.
  • Distributed Denial-of-Service (DDoS) Attack: A type of DoS attack, that uses a large number of compromised devices, or botnets, to coordinate and amplify the attack, and cause more severe disruption.
  • Distributed Denial-of-Service (DDoS) Attack: A type of DoS attack, that uses a network of compromised computers, or devices, to launch coordinated attacks, from multiple sources, to increase the attack’s impact and scale.
  • Distributed Denial-of-Service (DDoS) Attack: An attack in which multiple systems are used to flood a target system with traffic, causing it to become unavailable to legitimate users.
  • Distributed Denial-of-Service (DDoS) Attack: An attack, where an attacker uses a network of compromised devices, to launch a coordinated attack, on a target system or network, with a large amount of traffic, to make it unavailable.
  • DLP (Data Loss Prevention): technology that helps prevent sensitive data from being leaked outside of an organization.
  • DMZ: Demilitarized Zone, a secure area in a network that is used to host public-facing services and applications.
  • DMZ (Demilitarized Zone): a network segment isolated from a secure internal network, where public-facing servers are placed.
  • DMZ (Demilitarized Zone): A network security perimeter that separates an internal network from an external network, such as the internet.
  • DMZ (Demilitarized Zone): A part of a network isolated from the main network, for the purpose of providing an additional layer of security.
  • DMZ (Demilitarized Zone): A physically separated network segment used to host public-facing services such as web servers, while protecting the internal network from external attacks.
  • DMZ (Demilitarized Zone): A portion of a network that is isolated from the rest of the network and used to host public-facing services such as web servers, email servers, etc.
  • DNS (Domain Name System): A hierarchical decentralized naming system for computers, services, or any resource connected to the Internet
  • DNS (Domain Name System): A system that translates domain names into IP addresses, allowing users to access websites or other online resources by typing a memorable URL instead of an IP address.
  • Drive-by Attack: A type of attack, that involves exploiting vulnerabilities, in a user’s web browser, or system, to deliver malware, or steal sensitive information, without requiring the user’s interaction.
  • Drive-by Attack: A type of attack, that involves exploiting vulnerabilities, in a web site, or system, to infect the visitors’ systems, with malware, without their knowledge, or consent.
  • Drive-by Download Attack: An attack, where an attacker infects a user’s device, with malware, by exploiting vulnerabilities, in the user’s web browser, or operating system, when they visit a malicious website.
  • Elevation of privilege: A type of cyber attack that involves exploiting a vulnerability in a system or application, to gain higher-level permissions than the attacker is normally entitled to.
  • E-mail Spoofing: The act of forging an e-mail header to make it appear as though the e-mail was sent by someone other than the actual source.
  • Embeddings: A lower-dimensional representation of data, often used in NLP and computer vision tasks to reduce the dimensionality of input data while preserving important information.
  • Encryption: A process of encoding data to protect it from unauthorized access, typically using mathematical algorithms.
  • Encryption: Process of converting plaintext into unreadable ciphertext through mathematical algorithms to secure the data.
  • Encryption: The process of converting plain text into a coded format to protect it from unauthorized access.
  • Encryption: The process of converting plain text into an unreadable form to protect its confidentiality.
  • Encryption: The process of converting plaintext into ciphertext to protect the information from unauthorized access
  • Encryption: the process of encoding information to prevent unauthorized access, by converting plain text into ciphertext using a mathematical algorithm.
  • Encryption Key: A string of bits used to encrypt or decrypt data, the longer the key, the stronger the encryption.
  • Encryption: A process of converting plaintext into ciphertext, using a secret key, to protect the confidentiality and integrity of data in transit or at rest.
  • Encryption: Encryption is the process of converting plain text into ciphertext, making it unreadable to unauthorized parties. The encrypted data can only be decrypted with a key.
  • Encryption: The process of converting data into a code to prevent unauthorized access and to ensure privacy.
  • Encryption: The process of converting data, into an unreadable format, using an algorithm, and a key, to protect the confidentiality, and privacy, of the data, and prevent unauthorized access.
  • Encryption: The process of converting plain text into a coded message to protect its confidentiality and integrity.
  • Encryption: The process of converting plain text into a coded, or encrypted, format, to protect the confidentiality of the information.
  • Encryption: The process of converting plain text into an unreadable format (ciphertext) using an algorithm and a secret key to secure sensitive data.
  • Encryption: The process of converting plain text into an unreadable format, using a key, to protect the data from unauthorized access.
  • Encryption: The process of converting plain text into ciphertext to protect the confidentiality and privacy of data.
  • Encryption: The process of converting plain text into ciphertext to protect the confidentiality of data transmitted over networks.
  • Encryption: The process of converting plaintext into ciphertext to protect its contents from unauthorized access.
  • Encryption: the process of converting plaintext into ciphertext to protect the confidentiality of data.
  • Encryption: the process of converting plaintext into ciphertext, which is unreadable without the use of a decryption key, to secure data in transit or at rest.
  • Encryption: The process of converting plaintext, into ciphertext, using an algorithm and a secret key, to secure sensitive information, from unauthorized access or modification.
  • Encryption: the process of encoding data to protect it from unauthorized access.
  • Encryption: The process of transforming data into a coded format, to protect it from unauthorized access or modification.
  • Endpoint Protection: A security solution designed to protect endpoint devices, such as computers and mobile devices, from threats such as malware and phishing.
  • Endpoint Security: the protection of computing devices, such as laptops, smartphones, and servers, from cyber threats, through the use of antivirus software, firewalls, and other security technologies.
  • Endpoint security: A type of security system that protects individual devices and endpoints, such as laptops, smartphones, and servers, against malicious software, unauthorized access, and other security threats.
  • Endpoint security: Protects devices, such as computers and smartphones, that access a network.
  • Endpoint security: The protection of all devices that connect to an organization’s network, such as laptops, smartphones, and servers, from threats and vulnerabilities.
  • Endpoint Security: the protection of an individual device (e.g. computer, smartphone) from cyber threats.
  • Endpoint security: The protection of devices and endpoints, such as computers and mobile devices, against security threats.
  • End-to-End Encryption: A method of communication where only the communicating parties can access the data being transmitted, not even the service provider
  • End-to-end encryption: A communication method where the data is encrypted at the sender’s device and only decrypted at the recipient’s device, ensuring confidentiality and privacy.
  • End-to-end encryption: A method of encrypting data from the sender to the receiver to ensure that only the intended recipient can access the data.
  • Federated learning: A decentralized machine learning approach that trains models on data distributed across multiple devices, without centralizing the data.
  • Firewall: A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
  • Firewall: a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  • Firewall: A security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  • Firewall: A security system that monitors and controls incoming and outgoing network traffic based on pre-defined security rules.
  • Firewall: A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  • Firewall: A system designed to prevent unauthorized access to or from a private network by filtering incoming and outgoing network traffic based on pre-defined security rules.
  • Firewall: Network security system that monitors and controls incoming and outgoing network traffic based on predefined security rules.
  • Firewall: Network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  • Firewall: A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  • Firewall: A hardware or software device that controls incoming and outgoing network traffic based on a set of rules.
  • Firewall: A hardware or software system that filters network traffic and blocks unauthorized access.
  • Firewall: A network security device, or software, that monitors and controls incoming and outgoing network traffic, based on pre-defined security rules.
  • Firewall: A network security system that monitors and controls incoming and outgoing network traffic based on predefined security rules.
  • Firewall: A network security system that monitors and controls incoming and outgoing network traffic based on pre-defined security rules.
  • Firewall: A network security system that monitors and controls incoming and outgoing network traffic based on security rules.
  • Firewall: A network security system that monitors and controls incoming and outgoing network traffic, based on predetermined security rules.
  • Firewall: A network security system that monitors incoming and outgoing network traffic and controls access based on predefined security rules.
  • Firewall: A network security system, that monitors and controls incoming and outgoing network traffic, based on predetermined security rules.
  • Firewall: A network security system, that monitors, and controls, incoming and outgoing network traffic, based on predetermined security rules, and policies, to prevent unauthorized access, and protect the network, from attacks and threats.
  • Firewall: A security device, or software, that controls incoming and outgoing network traffic, based on predetermined security rules, to protect a network from unauthorized access, and various network-based attacks.
  • Firewall: A system designed to prevent unauthorized access to or from a private network. It can be implemented as hardware, software, or a combination of both.
  • Flume: A distributed, reliable, and available service for efficiently collecting, aggregating, and moving large amounts of log data.
  • Gradient descent: An optimization algorithm used to minimize a cost function in machine learning models by adjusting the model’s parameters.
  • Granular access control: A security mechanism that limits access to sensitive data based on individual roles and responsibilities within an organization.
  • Graph theory: The study of mathematical objects known as graphs, which consist of vertices and edges connecting them.
  • Greedy algorithm: An algorithm that makes the locally optimal choice at each stage with the hope of finding a global optimum.
  • Hash Function: A mathematical function that takes an input (or ‘message’) and returns a fixed-size string of characters, which acts as a digital fingerprint of the input.
  • Hash function: A mathematical function that takes an input and generates a fixed-length, unique output, also known as a hash or message digest.
  • Hash Function: A mathematical function that takes an input, or message, and produces a fixed-length output, or message digest, that is used for data integrity and authentication.
  • Hash function: A mathematical function that takes in data and outputs a fixed-length value, used for verifying data integrity.
  • Hash Function: A mathematical function, that takes an input (or “message”), and returns a fixed-size string of bytes, called the “hash,” that is used to verify the integrity, of the input, and detect any changes, to the input.
  • Hash function: A type of mathematical function that takes an input, or message, and returns a fixed-size output, or message digest, that is unique to the original message.
  • Hash table: A data structure that implements an associative array abstract data type, a structure that can map keys to values.
  • Hash: a mathematical function that converts an input into a fixed-length, unique output (hash value).
  • Hashing: A one-way mathematical function that takes in an input (or “message”) and returns a fixed-size string of characters, typically used for verifying data integrity.
  • Hashing: The process of generating a fixed-length string of characters, known as a hash, from an input data, using a one-way mathematical function, to verify the integrity, and authenticity, of the input data.
  • Hive: A data warehousing and SQL-like query language for Hadoop that provides summarization, query, and analysis of large datasets.
  • Homomorphic Encryption: a type of encryption that enables computation on encrypted data, without first having to decrypt it, allowing for privacy-preserving processing of sensitive information.
  • Homomorphic encryption: A form of encryption that enables computation on encrypted data, without the need to decrypt it first.
  • Honeypot: a decoy computer system used to detect and deflect attempted cyber attacks.
  • Honeypot: a decoy system or data that is set up to distract and detect attackers and study their methods.
  • Honeypot: A decoy system or data set used to distract or trap attackers away from the real targets.
  • HTTPS (Hypertext Transfer Protocol Secure): A protocol for secure communication over the web, based on HTTP and TLS.
  • HTTPS (Hypertext Transfer Protocol Secure): An encrypted version of HTTP, the protocol used to transfer data on the internet, that is more secure and used for sensitive transactions.
  • Hyperparameter optimization is the process of tuning the values of hyperparameters in a machine learning model to get the best performance on a given task. Some common techniques include grid search, random search, and Bayesian optimization.
  • Hypervisor: A layer of software that creates and manages virtual machines
  • Identity and Access Management (IAM)
  • Identity and Access Management (IAM): Collection of processes and technologies for the management of digital identities and their access to resources.
  • Identity and Access Management (IAM): A framework for managing and regulating access to an organization’s resources and applications.
  • Identity and Access Management (IAM): A set of policies and technologies for managing digital identities and their access to resources.
  • Identity and access management (IAM): The management of user identities, their authentication, authorization, and access to resources within an organization.
  • IDS (Intrusion Detection System): A security solution that monitors network traffic and detects unauthorized access attempts or malicious activities.
  • IEEE 802.11: A set of standards for wireless local area network (WLAN) communication.
  • Impala: An open-source massively parallel processing (MPP) SQL query engine for data stored in a Hadoop cluster through HDFS and HBase.
  • Incident Response Plan (IRP): A documented set of procedures and protocols to follow in case of a security breach, cyber attack or other IT security incident, to ensure a prompt, consistent and effective response.
  • Incident response: The set of procedures and actions taken in response to a security breach or incident.
  • Information security management system (ISMS): A systematic approach to managing and protecting sensitive information, based on a risk management framework.
  • Insider threat: A security risk posed by individuals who have legitimate access to an organization’s systems, networks, or data, but who misuse that access for malicious purposes.
  • Integrity: The property of a system or protocol that ensures that data cannot be modified or deleted in an unauthorized manner.
  • Intermediate CA: A certificate authority that is subordinate to a root CA, and issues digital certificates for other entities.
  • Internet of Things (IoT): a network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, and connectivity which enables these objects to connect and exchange data.
  • Internet of Things: Refers to the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, and connectivity that enable them to collect and exchange data.
  • Intrusion detection and prevention system (IDPS)
  • Intrusion Detection System (IDS): A security system that detects and alerts administrators to unauthorized access or attempted attacks on a network or system.
  • Intrusion Detection System (IDS): A security system that monitors network traffic for suspicious activity and alerts administrators when a potential intrusion is detected.
  • Intrusion Detection System (IDS): A system designed to detect unauthorized access to a computer or network, including both internal and external attacks.
  • Intrusion Detection System (IDS): A system that monitors network or system activity for signs of intrusion and alerts administrators when an attack is detected.
  • Intrusion detection system (IDS): a type of security software that automatically monitors a network for malicious activity and alerts security administrators.
  • Intrusion Detection System (IDS): Security system that monitors network traffic for signs of malicious activity and raises an alarm when it detects such activity.
  • Intrusion detection system (IDS): A network security system that monitors network traffic for malicious activity and generates alerts when potential security threats are detected.
  • Intrusion Detection System (IDS): A security software that monitors a computer network for malicious activity or policy violations.
  • Intrusion Detection System (IDS): A security system that monitors a network, or host, for suspicious activity, such as unauthorized access, and generates alerts when it detects an intrusion.
  • Intrusion Detection System (IDS): A security system that monitors network traffic for signs of intrusion or malicious activity and raises an alert when suspicious activity is detected.
  • Intrusion Detection System (IDS): A security system that monitors network traffic for suspicious activity and alerts security administrators when such activity is detected.
  • Intrusion Detection System (IDS): A security system, that monitors network or system activities, for malicious or unauthorized actions, and alerts the administrator, or takes automated countermeasures, to prevent security breaches.
  • Intrusion detection system (IDS): A system that monitors network or system activity for signs of security threats, and alerts administrators if an attack is detected.
  • Intrusion Detection System (IDS): A system that monitors network or system activity for signs of unauthorized access or attack.
  • Intrusion Detection System (IDS): A system that monitors network traffic for signs of malicious or unauthorized activity.
  • Intrusion Detection System (IDS): A system that monitors network traffic for signs of unauthorized access, malicious activity, or policy violations.
  • Intrusion Detection System (IDS): A type of security system that monitors a network or system for signs of security breaches, and raises alerts when suspicious activity is detected.
  • Intrusion detection/prevention system: A security system that monitors network traffic for signs of unauthorized access or attack.
  • Intrusion Prevention System (IPS): a security device or software that analyzes network traffic to identify and prevent cyber attacks.
  • Intrusion Prevention System (IPS): A security system that can automatically prevent malicious network traffic from entering a network.
  • Intrusion Prevention System (IPS): A system designed to detect and prevent unauthorized access to a computer or network, including both internal and external attacks.
  • Intrusion Prevention System (IPS): A system that monitors network or system activity for signs of intrusion and actively blocks malicious activity.
  • Intrusion Prevention System (IPS): Security system that monitors network traffic for signs of malicious activity and actively blocks it.
  • Intrusion Prevention System (IPS): A network security system that actively blocks malicious or unauthorized network traffic.
  • Intrusion prevention system (IPS): A network security system that analyzes network traffic in real-time and blocks malicious activity before it can cause harm.
  • Intrusion Prevention System (IPS): A security software that monitors a computer network for malicious activity and actively blocks or isolates detected threats.
  • Intrusion Prevention System (IPS): A security system that actively blocks or contains intrusions, by analyzing network traffic, and taking real-time action, such as dropping or blocking malicious packets.
  • Intrusion Prevention System (IPS): A security system that automatically blocks malicious traffic based on security rules.
  • Intrusion Prevention System (IPS): A security system that blocks suspicious network traffic and prevents intrusions in real-time.
  • Intrusion Prevention System (IPS): A system that monitors network or system activity and blocks unauthorized access or attacks in real-time.
  • Intrusion prevention system (IPS): A system that monitors network or system activity for signs of security threats, and actively blocks the attack if detected.
  • Intrusion Prevention System (IPS): A system that uses signature-based detection, behavioral analysis, and other techniques to detect and prevent malicious network activity.
  • Intrusion Prevention System (IPS): A type of security system that monitors a network or system for signs of security breaches, and automatically blocks or quarantines malicious traffic.
  • Intrusion Prevention System (IPS): Monitors network traffic for suspicious activity and blocks malicious traffic.
  • IoT: Internet of Things (IoT) refers to the interconnected network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, and network connectivity, which enable these objects to collect and exchange data.
  • IP Spoofing: A technique used to gain unauthorized access to computers, whereby the attacker sends messages to a computer with a fake source IP address, making it appear as though the message came from a trusted source.
  • IPSec: Internet Protocol Security, a protocol suite used to secure IP communications by authenticating and encrypting each IP packet of data.
  • IPsec: Internet Protocol Security, a protocol that provides secure communication over IP networks.
  • IPsec (Internet Protocol Security): A protocol suite for secure IP communications that authenticates and encrypts each IP packet of a communication session.
  • IPSec (Internet Protocol Security): A protocol suite for secure IP communications that provides data confidentiality, data integrity, and data authenticity.
  • IPSec (Internet Protocol Security): a protocol suite for secure IP communications, providing data integrity, confidentiality and authentication.
  • IPSec (Internet Protocol Security): A set of protocols for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of data transmitted over the Internet.
  • IPsec (Internet Protocol Security): A set of protocols for encrypting and authenticating internet traffic.
  • IPsec (Internet Protocol Security): IPsec is a suite of protocols for secure communication over IP networks. It provides confidentiality, integrity, and authenticity for IP communications.
  • IPv6 (Internet Protocol version 6): A new version of IP (internet protocol) that allows for a much larger number of unique IP addresses and provides a more efficient routing of IP packets.
  • Kafka: An open-source, distributed, and publish-subscribe messaging system that is designed for high-throughput and fault-tolerant data streaming.
  • Key Escrow: A mechanism for storage of encryption keys with a trusted third-party for recovery purposes in case of emergency or key loss.
  • Key Exchange: Mechanism for two parties to establish a shared secret key for encryption and decryption.
  • Key exchange: The process of securely exchanging encryption keys between two parties, to establish a secure communication channel.
  • Key Length: Refers to the number of bits in a key used by an encryption algorithm, the longer the key length, the stronger the encryption.
  • Key Management: Collection of processes and procedures for the creation, storage, distribution and destruction of cryptographic keys.
  • Key management: The process of creating, distributing, and managing keys used for encryption and decryption.
  • Key Management: The process of creating, exchanging, and storing encryption keys to secure communication.
  • Key Management: the process of creating, storing, distributing, and protecting encryption keys.
  • Key management: The process of generating, distributing, storing, and revoking cryptographic keys.
  • Key Management: The process of generating, exchanging, storing, and using cryptographic keys to secure data communications. Key management is a crucial component of cryptography and must be carefully implemented to ensure the security of encrypted data.
  • Key Pair: a combination of a private key and a public key used in public-key cryptography.
  • Key Recovery: Process of retrieving lost or corrupted encryption keys from a trusted third-party.
  • Key Strength: Refers to the length of the encryption key, which determines the number of possible combinations for a given encryption algorithm. The longer the key, the stronger the encryption and the more difficult it is to break.
  • Knapsack problem: A combinatorial optimization problem where items of different values and weights must be chosen to maximize the total value while keeping the total weight below a given limit.
  • Kubernetes (k8s): open source platform for automating deployment, scaling, and management of containerized applications.
  • Load Balancer: A device that distributes network or application traffic across multiple servers
  • Load Balancer: A network device that distributes incoming network traffic across multiple servers in a scalable, highly available infrastructure. Load balancers help ensure high availability, optimize performance and scale web applications by directing traffic to the servers that can handle it efficiently.
  • Load Balancer: distributes network traffic across multiple servers, improving performance and reliability.
  • Load Balancing: The process of distributing incoming network traffic across multiple servers to ensure that no single server is overwhelmed.
  • MAC filtering: Method of allowing or denying network access based on the unique MAC addresses of devices.
  • Machine Learning: a method of data analysis that automates analytical model building.
  • Machine Learning: Refers to the subfield of AI that involves building algorithms and models that enable computers to learn from data and make predictions.
  • Malware: Any software intended to harm or exploit computer systems, including viruses, worms, Trojans, ransomware, etc.
  • Malware: Malicious software designed to harm or exploit a computer system, such as viruses, worms, and Trojans.
  • Malware Attack: A type of attack, that involves infecting a system, or device, with malicious software, that can steal sensitive information, disrupt system operations, or spread to other systems, to cause wider damage.
  • Malware Attack: An attack, where an attacker delivers malicious software, to a target system, to steal sensitive information, or damage the system.
  • Malware: A general term that refers to any software that is designed to harm, or exploit, a system, a network, or a user. Malware includes viruses, worms, trojans, spyware, adware, and ransomware.
  • Malware: A software designed to cause harm, to a computer system or network, by disrupting its functionality, stealing sensitive information, or spreading to other systems. Types include; viruses, worms, Trojans, adware, spyware, and ransomware.
  • Malware: software designed to harm or disrupt a computer system, network, or device.
  • Malware: A type of malicious software designed to harm or exploit a computer or network.
  • Malware: A type of malicious software, that can cause harm, to a computer system, or network, by damaging, or stealing data, altering functionality, or spreading to other systems.
  • Malware: A type of malicious software, that infects a system, or device, and performs harmful actions, such as stealing data, or compromising the security, of the system, or network.
  • Malware: A type of software designed to cause harm to computer systems, networks, or individuals.
  • Malware: A type of software designed to harm or exploit a computer system.
  • Malware: A type of software, that is specifically designed to harm or disrupt a computer system, network, or mobile device, by compromising its security, stealing data, or spreading infections.
  • Malware: Any software designed to cause harm to a system, network, or individual.
  • Malware: Malicious software that can cause harm to a system, steal sensitive information, or spread to other systems.
  • Malware: Malicious software, designed to harm or exploit computer systems, networks, and devices, and includes viruses, worms, Trojans, and other types of harmful software.
  • Malware: Malicious software, that includes viruses, worms, trojans, spyware, adware, and other forms, of malicious code, that can steal sensitive information, manipulate systems, or cause damage.
  • Malware: Short for malicious software, a type of software that is designed to cause harm to a system or network, such as viruses, Trojans, spyware, and adware.
  • Malware: Short for malicious software, it refers to any software designed to harm a computer system, steal data, or disrupt normal operations.
  • Malware: Short for malicious software, refers to any software, intentionally designed, to harm or exploit a computer system, network, or user.
  • Malware: Software designed to cause harm to a computer system or network, such as viruses, worms, and Trojans.
  • Malware: Software intentionally designed to cause harm to a computer system, steal sensitive data, or gain unauthorized access to a network.
  • Malware: Software intentionally designed to cause harm to a computer system, such as a virus, worm, or trojan.
  • Mandatory Access Control (MAC): Access control model where access to resources is determined based on a predefined set of security policies.
  • Man-in-the-Middle (MitM): a type of attack in which an attacker intercepts and alters the communication between two parties without either party knowing.
  • Man-in-the-middle (MITM) attack: a type of cyber attack where the attacker intercepts and alters communication between two parties.
  • Man-in-the-Middle (MitM) Attack: a type of security attack where the attacker intercepts and alters the communication between two parties without their knowledge.
  • Man-in-the-Middle (MitM) Attack: An attack where the attacker intercepts and alters the communication between two parties.
  • Man-in-the-middle (MitM) attack: A type of attack where an attacker intercepts and alters the communication between two parties without their knowledge.
  • Man-in-the-Middle (MITM) Attack: A type of attack, that intercepts, or alters, communication, between two parties, by positioning itself, between them, and relaying messages, in both directions, to steal data, or manipulate communication.
  • Man-in-the-Middle (MitM) Attack: A type of attack, that involves intercepting and eavesdropping on a communication between two parties, without their knowledge, to steal sensitive information, or manipulate the communication.
  • Man-in-the-Middle (MitM) Attack: A type of attack, that involves intercepting, and tampering with, the communication, between two parties, to steal sensitive information, or manipulate their interactions.
  • Man-in-the-Middle (MitM) Attack: A type of attack, where an attacker intercepts, alters, or eavesdrops, on the communication, between two parties, to steal sensitive information, or manipulate the communication.
  • Man-in-the-Middle (MitM) Attack: A type of attack, where an attacker, intercepts, and manipulates, the communication, between two parties, without their knowledge, to steal sensitive information, or modify the communication, for malicious purposes.
  • Man-in-the-Middle (MitM) Attack: a type of cyber attack in which an attacker intercepts and alters the communication between two parties without their knowledge.
  • Man-in-the-Middle (MitM) attack: A type of cyber attack that involves intercepting and modifying the communication between two parties, without either party being aware of the interception.
  • Man-in-the-middle (MITM) attack: A type of cyber attack where the attacker intercepts and manipulates communication between two parties, without either party being aware of the interception.
  • Man-in-the-middle (MITM) attack: A type of cyber attack where the attacker intercepts and manipulates communication between two parties.
  • Man-in-the-middle (MITM) attack: An attack in which an attacker intercepts and modifies communications between two parties without either party knowing.
  • Man-in-the-Middle (MitM) Attack: An attack in which an attacker intercepts communication between two parties and can read, modify, or inject data into the communication.
  • Man-in-the-Middle (MitM) Attack: An attack where the attacker intercepts communication between two parties and can read, modify, or inject data into the communication.
  • Man-in-the-Middle (MitM) Attack: An attack, where an attacker intercepts and manipulates the communication, between two parties, to steal sensitive information, or perform unauthorized actions, by posing as a trusted intermediary.
  • Man-in-the-Middle (MitM) Attack: An attack, where the attacker intercepts and alters, the communication, between two parties, without their knowledge, to steal sensitive information, or manipulate the communication, to achieve their malicious objectives.
  • Man-in-the-Middle (MitM) Attack: An attack, where the attacker intercepts, and manipulates, the communication between two parties, without their knowledge or consent, to steal sensitive information, or alter the communication content.
  • Man-in-the-Middle (MitM): A type of attack, in which, an attacker intercepts, and modifies, the communication, between two parties, without either party being aware, often to steal sensitive information, or inject malicious content.
  • Man-in-the-Middle Attack: An attack where an attacker intercepts and alters the communication between two parties.
  • Man-in-the-Middle Attack: A type of cyber attack where the attacker intercepts communications between two parties to eavesdrop or steal data.
  • Microservices: a software architecture approach where a large application is broken down into small, independent services that communicate through APIs.
  • Min-Max algorithm: An algorithm used in game theory and decision-making to find the optimal move for a player, assuming optimal play by the opponent.
  • Mobile Application Development: Refers to the process of creating software applications that run on mobile devices such as smartphones and tablets.
  • Multi-Factor Authentication (MFA): a security process that requires multiple independent means of authentication, such as a password, security token, and biometric verification, to access an online account or system.
  • Multi-Factor Authentication (MFA): A security process where a user provides multiple authentication factors to verify their identity.
  • Multi-factor authentication (MFA): An authentication process that requires more than one form of verification, such as a password and a fingerprint scan.
  • Multi-factor authentication (MFA): An authentication process that requires multiple independent factors, such as a password, a fingerprint, and a one-time code, to access a system or service.
  • Multi-factor authentication (MFA): An authentication process that requires users to provide multiple forms of identification, such as a password and a security token, to access a resource.
  • Multi-Factor Authentication: an authentication method that requires the use of multiple forms of identification, such as a password and a security token.
  • Multitasking: The ability to perform multiple tasks simultaneously.
  • NAT (Network Address Translation): A method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.
  • Natural Language Processing (NLP): a field of study that focuses on making it possible for computers to understand, interpret, and generate human language.
  • Natural Language Processing: Refers to the study and development of algorithms and computer programs that can analyze, understand, and generate human language.
  • Network Segmentation: The division of a computer network into smaller sub-networks to improve security and reduce the risk of cyber-attacks.
  • Network Segmentation: A method of dividing a network into multiple isolated segments for better security and management.
  • Network Segmentation: The practice of dividing a network into smaller, isolated segments, reducing the attack surface and containing security incidents.
  • Network segmentation: The process of dividing a network into smaller, isolated parts, to reduce the attack surface and improve security.
  • Nmap (Network Mapper): a free and open-source tool for network discovery, management and security auditing.
  • Non-repudiation: The ability to ensure that a user cannot deny having performed an action, such as sending an email or making a payment.
  • NoSQL: non-relational databases that do not use a fixed schema, allowing for more flexible and scalable data storage.
  • Object Storage: scalable, distributed storage system for unstructured data such as images, videos, and audio.
  • One-hot encoding: A method of representing categorical data as binary vectors.
  • Open Source: a type of software license that allows source code to be freely available to the public.
  • Overfitting: A machine learning model that is too complex and fits too well to the training data, leading to poor generalization to unseen data.
  • Packet sniffer: a tool that can capture and analyze network traffic for security purposes or for malicious purposes.
  • Password Attack: A type of attack, that targets the authentication mechanism, by using various techniques, such as brute-force, dictionary, or rainbow table attacks, to guess, or recover, the user’s password.
  • Password Attack: An attack, where an attacker attempts to crack a password, by guessing, cracking, or stealing it, to gain unauthorized access, to a system or account.
  • Penetration Testing: A simulated cyber attack to identify and remediate potential vulnerabilities in a network or system.
  • Penetration Testing: An ethical hacking technique that simulates an attack on a system or network to identify vulnerabilities and evaluate the security of the environment.
  • Penetration Testing: Penetration testing, also known as pen testing, is the practice of testing a computer system, network, or web application to identify vulnerabilities that an attacker could exploit.
  • Penetration Testing: simulated cyber attacks conducted to evaluate the security of a network.
  • Penetration testing: The practice of simulating a cyber attack on a system or network to identify and evaluate its vulnerabilities.
  • Penetration Testing: The process of simulating an attack on a network or system to identify vulnerabilities and assess the security posture.
  • Phishing: A cyber attack in which an attacker poses as a trustworthy entity to steal sensitive information like passwords, credit card details, etc.
  • Phishing: A type of cyber attack that uses fake emails, websites, or other methods to trick users into revealing sensitive information such as passwords or credit card numbers.
  • Phishing: a type of social engineering attack that involves tricking users into revealing sensitive information, such as passwords, by posing as a trusted entity.
  • Phishing: a type of social engineering attack that uses emails, messages or websites that appear to be from a trustworthy source in order to steal personal information or login credentials.
  • Phishing Attack: A type of attack, that involves tricking people, into revealing sensitive information, or login credentials, by posing as a trustworthy entity, through email, or fake web sites.
  • Phishing Attack: A type of attack, that involves tricking users, into revealing sensitive information, or credentials, through social engineering techniques, such as fake emails, or websites.
  • Phishing Attack: An attack, that involves tricking the victim, into revealing sensitive information, such as passwords or credit card numbers, by posing as a trusted entity, through fake emails, websites, or other means.
  • Phishing Attack: An attack, where an attacker sends a fake email, or creates a fake website, that appears to be from a trusted source, to trick users, into revealing sensitive information, such as login credentials, or financial information.
  • Phishing Attack: An attack, where an attacker tricks a user, into revealing sensitive information, such as login credentials, or financial information, by posing as a trusted entity, in an email, website, or social media message.
  • Phishing: a form of cyber attack in which an attacker poses as a trustworthy entity to steal sensitive information, such as login credentials or financial data, from a victim.
  • Phishing: A type of attack that uses fake emails, phone calls, or websites to trick individuals into revealing sensitive information such as login credentials or financial information.
  • Phishing: A type of attack, in which, an attacker, creates a fake, but convincing, message or website, that appears to come from a trusted source, and trick the victim, into providing sensitive information, such as usernames, passwords, or credit card details.
  • Phishing: A type of attack, that aims to trick users, into revealing sensitive information, such as passwords, credit card numbers, or social security numbers, by posing as a trustworthy entity, such as a bank, or a government agency, and sending fake emails, or messages, that redirect to fake websites.
  • Phishing: A type of cyber attack that involves tricking a user into revealing sensitive information, such as passwords, credit card numbers, or Social Security numbers, through fake emails, websites, or phone calls.
  • Phishing: A type of online scam where an attacker attempts to trick a user into revealing sensitive information, such as passwords or credit card numbers.
  • Phishing: A type of social engineering attack in which a attacker impersonates a trustworthy entity to steal sensitive information like usernames, passwords, credit card information, etc.
  • Phishing: A type of social engineering attack that involves tricking individuals into providing sensitive information, such as passwords or credit card numbers, through fake emails, websites, or phone calls.
  • Phishing: A type of social engineering attack that involves tricking users into revealing sensitive information, such as passwords or financial information, through fake websites or emails that appear to be from a trusted source.
  • Phishing: A type of social engineering attack that uses fake emails or websites to steal sensitive information.
  • Phishing: A type of social engineering attack that uses fake emails, websites, or messages to trick individuals into revealing personal information or login credentials.
  • Phishing: A type of social engineering attack that uses fake emails, websites, or messages to trick people into revealing sensitive information, such as passwords or financial information.
  • Phishing: A type of social engineering attack, that uses email, text message, or fake websites, to trick users, into revealing sensitive information, such as passwords, or financial data.
  • Phishing: A type of social engineering attack, that uses emails, messages, or websites, that appear to be from trusted sources, such as banks, or online services, to trick individuals into revealing their credentials, or sensitive information.
  • Phishing: An attack in which an attacker tries to trick a person into giving up sensitive information, such as passwords or credit card numbers, by posing as a trustworthy entity.
  • Phishing: Social engineering technique used to trick individuals into revealing sensitive information, such as passwords and financial information, through email, phone, or fake websites.
  • Pig: High-level platform for creating MapReduce programs used with Hadoop, used for analyzing large data sets.
  • PKI (Public Key Infrastructure): A system of digital certificates, certificate authorities, and other security mechanisms used to establish and verify the identities of parties in a secure communication network.
  • Private key cryptography: A type of cryptography that uses a single key, shared between two parties, to encrypt and decrypt data.
  • Private Key: a type of encryption key that is kept secret, used for encrypting and decrypting messages.
  • Privilege Escalation: An attack, that involves exploiting a vulnerability, in a system, to gain higher level access, than the attacker’s initial level of access, allowing them to perform actions, that they would not have been able to perform, otherwise.
  • Public Key Cryptography: Asymmetric cryptography system where each user has a public key for encryption and a private key for decryption.
  • Public key cryptography: A type of cryptography that uses a pair of keys, a public key and a private key, to encrypt and decrypt data.
  • Public key cryptography: An encryption system that uses two keys, a public key for encrypting messages and a private key for decrypting messages.
  • Public Key Encryption: An encryption technique that uses two keys, a public key for encryption and a private key for decryption.
  • Public Key Infrastructure (PKI): A security architecture that provides authentication of entities using digital certificates issued by trusted certificate authorities.
  • Public Key Infrastructure (PKI): A set of protocols, technologies, and services used to manage and secure the distribution of public keys, issue digital certificates, and verify the authenticity of digital certificates.
  • Public Key Infrastructure (PKI): A system of digital certificates, certificate authorities and other registration authorities that verify and authenticate the identities of parties involved in secure network communications.
  • Public Key Infrastructure (PKI): a system of digital certificates, certificate authorities, and other security components used to manage and secure the use of public keys.
  • Public Key Infrastructure (PKI): A system that manages public keys and digital certificates for secure communication over the internet.
  • Public key infrastructure (PKI): A set of technologies, policies, and procedures, used to manage digital certificates and public-private key pairs, to ensure secure communication over networks.
  • Public Key Infrastructure (PKI): A system for managing digital certificates and public-private key pairs, allowing for secure communication over an insecure network such as the Internet. PKI enables the secure exchange of information through the use of digital signatures and encrypted communications.
  • Public key infrastructure (PKI): A system for managing public keys and digital certificates, used for secure communication and authentication.
  • Public Key Infrastructure (PKI): A system of digital certificates, certificate authorities (CA), and other components, that is used to securely manage digital identities, and encrypt and sign digital data.
  • Public Key Infrastructure (PKI): A system of digital certificates, public and private keys, and certificate authorities used to secure electronic transactions and communications.
  • Public Key Infrastructure (PKI): A system that manages digital certificates and public-private key pairs to secure communications over the internet.
  • Public Key: a type of encryption key that is made publicly available, used for encrypting and decrypting messages.
  • Quantum Algorithm: An algorithm designed for a quantum computer, that uses the properties of quantum mechanics to solve problems more efficiently than classical algorithms.
  • Quantum Circuit: A sequence of quantum gates and measurements, which represents the computation performed by a quantum computer.
  • Quantum Computing: The field of computing that uses the principles of quantum mechanics, a branch of physics, to design and perform computations.
  • Quantum Computing: A field of computing that uses the properties of quantum mechanics to perform operations, this is an emerging field with potential to revolutionize computing by enabling much faster algorithms and simulations than is possible with classical computers.
  • Quantum Cryptography: The use of quantum mechanics in cryptography, the science of encoding and decoding messages, to create secure communication channels.
  • Quantum Cryptography: A type of cryptography that uses the principles of quantum mechanics to secure communication, it offers better security compared to traditional cryptographic techniques.
  • Quantum Entanglement: A phenomenon in quantum mechanics where two or more quantum systems become correlated in such a way that the state of one system cannot be described independently of the state of the other.
  • Quantum Error Correction: A technique used to mitigate the effects of errors in quantum computations, it is critical for building practical quantum computers.
  • Quantum Gates: Basic building blocks of quantum circuits that perform specific operations on quantum states.
  • Quantum Key Distribution (QKD): A method of secure communication that uses quantum mechanics to ensure secure key exchange between two parties.
  • Quantum Key Distribution (QKD): A type of quantum cryptography used to securely distribute encryption keys, it allows for two parties to establish a shared secret key over a public communication channel, providing protection against eavesdropping.
  • Quantum mechanics: branch of physics that explains the behavior and interactions of matter and energy on a very small scale (e.g. atoms, subatomic particles).
  • Quantum Simulation: The use of a quantum computer to simulate the behavior of a quantum system, this can be used to study the behavior of complex systems that are difficult to understand using classical computing.
  • Quantum State: The mathematical description of the state of a quantum system, including its position, momentum, spin, and other physical properties.
  • Quantum Superposition: A principle of quantum mechanics that states that a quantum system can exist in multiple states simultaneously, until it is observed or measured.
  • RADIUS (Remote Authentication Dial-In User Service): A protocol used for remote user authentication and accounting.
  • Ransomware: a type of malware that encrypts a victim’s files and demands payment in exchange for a decryption key.
  • Ransomware Attack: An attack, where an attacker encrypts a victim’s data, or blocks access to their system, and demands a ransom, to restore access, or provide a decryption key.
  • Ransomware: A type of malware that encrypts a user’s files, and demands a ransom payment in exchange for the decryption key.
  • Ransomware: A type of malware that encrypts a user’s files, and demands a ransom payment, in exchange for the decryption key.
  • Ransomware: A type of malware that encrypts a victim’s files and demands a ransom payment in exchange for the decryption key.
  • Ransomware: A type of malware that encrypts a victim’s files and demands payment for the decryption key.
  • Ransomware: A type of malware that encrypts a victim’s files and demands payment in exchange for the decryption key.
  • Ransomware: A type of malware, that encrypts a user’s files, and demands payment, in exchange for the decryption key, often with a threat, to permanently delete the files, if the payment is not made.
  • Ransomware: A type of malware, that encrypts the files, on a user’s system, and demands a ransom, to decrypt the files, or restore access to the system.
  • Ransomware: A type of malware, that encrypts the files, or systems, of its victims, and demands a ransom, in exchange for a decryption key.
  • Ransomware: A type of malware, that encrypts the user’s files, or systems, and demands a ransom payment, in exchange for the decryption key, or threatens to destroy the encrypted data.
  • Ransomware: A type of malware, that encrypts, or locks, a user’s data, and demands payment, in exchange, for restoring access.
  • Ransomware: Ransomware is a type of malicious software that encrypts a victim’s files and demands a ransom payment to restore access.
  • Receptor: a molecule in cells that receives and responds to signals, such as hormones or neurotransmitters.
  • Recessive gene: a gene that only produces its effect if two copies are present, one from each parent.
  • Recurrent Neural Network (RNN): A type of neural network used for processing sequential data, such as text or speech.
  • Redis: An in-memory data structure store, used as a database, cache and message broker.
  • Redundant Array of Inexpensive Disks (RAID): A data storage system that uses multiple hard drives to store data and improve performance or provide data redundancy.
  • Remote code execution (RCE) attack: A type of attack that allows an attacker to execute code on a target system or application from a remote location.
  • Remote Code Execution (RCE) Attack: A type of attack, that allows an attacker, to execute arbitrary code, on a remote system, or device, by exploiting vulnerabilities, in the software, or system.
  • Remote Code Execution (RCE) Attack: A type of attack, that involves exploiting vulnerabilities, in a system, or application, to execute malicious code, remotely, to steal sensitive information, or manipulate the system.
  • Remote Code Execution (RCE) Attack: An attack, where an attacker exploits a vulnerability, in a system or application, to execute malicious code, remotely, and gain control of the system, or steal sensitive information.
  • Remote Code Execution (RCE) Attack: An attack, where an attacker exploits vulnerabilities, in a system or application, to execute arbitrary code, remotely, on the target system, with the privileges of the application or system.
  • Remote Code Execution (RCE): A type of vulnerability, that allows an attacker, to execute arbitrary code, on a remote system, by exploiting a vulnerability, in a web application, or a software application.
  • Remote Code Execution: A type of cyber attack where an attacker is able to execute code on a remote system, potentially giving them full control over the affected system.
  • Responsive Design: a method of web design that adapts to the size and orientation of a user’s device.
  • Risk assessment: The process of identifying and evaluating the risks to a system or organization, and determining the measures to mitigate those risks.
  • RNA (Ribonucleic acid): a type of molecule involved in the transfer of genetic information from DNA to the ribosome, where it’s translated into proteins.
  • RNN (Recurrent Neural Network): A type of neural network used in NLP and time-series data analysis, which can process sequential data by using previous inputs to inform later predictions.
  • Role-Based Access Control (RBAC): Access control model where access to resources is determined based on a user’s role within an organization.
  • Role-Based Access Control (RBAC): A type of access control, that assigns users to roles, and defines permissions, based on the roles, rather than individual users.
  • Root CA: A certificate authority at the root of a public key infrastructure trust hierarchy.
  • Root CA: A trusted third-party entity that issues digital certificates to other entities. A root CA is trusted by the entities that use its certificates and is responsible for verifying the identity of the entities before issuing a certificate. The root CA acts as the foundation of a public key infrastructure (PKI) and is critical to the security of the system.
  • Root Certificate: A trusted certificate issued by a trusted third party, such as a certificate authority, used to verify the authenticity of other certificates.
  • Root Certificate Authority: a trusted entity responsible for issuing and managing digital certificates.
  • Rootkit: a type of malicious software that allows an attacker to gain administrative access to a system and conceal their presence.
  • Rootkit: A type of malicious software that hides itself and its activities from the system’s operating system and antivirus software.
  • Rootkit: A type of malicious software that hides itself and other malicious files, making it difficult to detect and remove.
  • Rootkit: A type of malware that hides its presence on a system, by modifying the system’s code, and evading detection by anti-virus software.
  • Rootkit: A type of malware that hides itself and other malicious files, making it difficult to detect and remove.
  • Rootkit: A type of malware, that aims to conceal its existence, and persist on a system, by hiding its files, processes, and network activities, from the operating system, and anti-virus tools.
  • Rootkit: A type of malware, that aims to conceal its presence, and its activities, from the operating system, and the user, by modifying or hiding system files, processes, and registry entries.
  • Rootkit: A type of malware, that conceals its presence, and activities, from the victim’s system, by modifying low-level system components, making it difficult to detect and remove.
  • Rootkit: A type of malware, that gives an attacker, administrative access, to a compromised system, and can hide their presence, from detection, by traditional security measures.
  • Rootkit: A type of malware, that provides stealth and administrative access, to an attacker, by hiding its presence, and modifying system files and processes.
  • Rootkit: Malicious software that hides itself on a system and gives an attacker complete control over the system.
  • Rootkit: Malicious software that is designed to hide itself and its activities from the user and the operating system.
  • RSA (Rivest-Shamir-Adleman): A public-key cryptography algorithm widely used for secure data transmission, digital signatures and secure communications.
  • RSA (Rivest-Shamir-Adleman): a widely-used public-key cryptography algorithm for secure data transmission.
  • RSA Algorithm: A widely-used public key encryption algorithm that uses two keys, one for encryption and one for decryption.
  • RSA: A widely used public-key cryptography algorithm used for digital signatures and encryption.
  • Salt: A random value added to a password before hashing to increase the complexity of the hash and prevent against pre-computed attacks.
  • Sandbox: A virtual environment used to test untrusted or malicious code without risk to the host system.
  • Sandbox: An isolated environment for running potentially untrusted code or applications, preventing it from affecting the system or network.
  • Sandbox: An isolated environment where potentially malicious code or software can be run, without affecting the host system.
  • Sandbox: An isolated environment, used for running potentially harmful code, such as malware, without exposing the host system to risk.
  • Schrödinger’s equation: a mathematical equation used to describe the behavior of quantum systems, including electrons in an atom.
  • Secure multi-party computation: A cryptographic protocol that enables multiple parties to compute a joint function over their encrypted inputs, without revealing their inputs to each other.
  • Secure Shell (SSH): A protocol for secure remote login and other secure network services over an insecure network.
  • Secure Terminology Definitions
  • Security Information and Event Management (SIEM): A system that aggregates, analyzes and alerts on security-related data from multiple sources.
  • Serverless Computing: computing paradigm where the cloud provider manages the infrastructure, allowing developers to focus on building and deploying applications without worrying about managing servers.
  • Session Hijacking Attack: A type of attack, that involves stealing, or taking over, a user’s active session, on a web site, or system, to gain unauthorized access, to sensitive information, or perform actions, on behalf of the victim.
  • Session Hijacking Attack: A type of attack, that involves stealing, or taking over, an active session, to gain unauthorized access, to a system, or application.
  • Session Hijacking Attack: An attack, where an attacker intercepts and takes over an active session, between a user and a server, to steal sensitive information, or perform unauthorized actions, by exploiting vulnerabilities, in the session management process.
  • Session Hijacking: A type of attack, that takes over a user’s session, by stealing the session ID, or by exploiting a vulnerability, in the session management mechanism, to gain unauthorized access, to sensitive information, or perform malicious actions.
  • Session Hijacking: A type of attack, that targets a user’s session, or connection, to a web application, by stealing, or manipulating, the session identifier, to gain unauthorized access, to the user’s account, or information.
  • Session hijacking: A type of cyber attack that involves stealing a user’s session ID, to take over the user’s session, and access restricted resources.
  • Session Hijacking: A type of cyber attack where an attacker takes control of a user’s session by stealing their session ID, allowing the attacker to access the user’s account without needing to enter a password.
  • Sharding: Division of a large database into smaller parts for faster and efficient processing of data.
  • Side-Channel Attack: A type of attack, that exploits physical characteristics, of a system, such as power consumption, electromagnetic emissions, or timing, to extract sensitive information, from the system.
  • SIEM (Security Information and Event Management): a software tool that collects and analyzes security data from various sources and alerts security teams to potential security incidents.
  • SIEM: Security Information and Event Management (SIEM) is a security management tool that collects, analyzes, and correlates log data from multiple devices, applications, and systems to provide security teams with real-time insights into potential security incidents.
  • Single Sign-On (SSO): A security mechanism that allows users to log into multiple systems with a single set of credentials.
  • Single Sign-On (SSO): A method of authentication where a user signs in once and gains access to multiple systems, applications, or websites without having to enter their credentials again.
  • Single Sign-On (SSO): a security protocol that enables a user to access multiple systems or applications with one set of login credentials.
  • Single sign-on (SSO): A type of authentication that allows a user to log in once, and access multiple systems or applications, without having to re-enter their credentials.
  • Single Sign-On (SSO): A type of authentication that enables a user to access multiple systems or applications, with a single set of credentials, without having to remember different usernames and passwords.
  • Smishing: A type of phishing attack, that uses SMS text messages, to trick users, into revealing sensitive information, or downloading malware.
  • Social engineering: a non-technical form of intrusion that relies on human interaction and often involves tricking individuals into breaking security procedures.
  • Social Engineering: The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
  • Social Engineering: The use of psychological manipulation to trick individuals into divulging confidential information or performing actions that compromise security.
  • Social Engineering Attack: A type of attack, that involves tricking, or manipulating, people, into revealing sensitive information, or performing actions, that compromise the security, of their systems, or data.
  • Social Engineering Attack: An attack, where an attacker manipulates a user, into performing actions, or revealing sensitive information, by exploiting the user’s trust, or emotional response, in a social context, such as a phone call, email, or in-person interaction.
  • Social engineering: A type of attack that relies on psychological manipulation of individuals, to gain access to sensitive information or systems.
  • Social Engineering: A type of attack, in which, an attacker, manipulates, or exploits, a victim’s trust, and emotions, to trick them, into divulging sensitive information, or performing actions, that compromise security.
  • Social Engineering: A type of attack, that exploits human emotions, such as trust, curiosity, fear, or urgency, to manipulate individuals into revealing sensitive information, or taking actions that compromise their security.
  • Social Engineering: A type of attack, that relies on human interaction, to trick or manipulate users, into revealing sensitive information, such as passwords, or performing unauthorized actions.
  • Social Engineering: A type of attack, that relies on psychological manipulation, rather than technical means, to trick users, into revealing sensitive information, or making security mistakes, such as opening malicious attachments, or clicking on malicious links.
  • Social Engineering: A type of cyber attack that involves tricking a person into divulging sensitive information, such as passwords, credit card numbers, or Social Security numbers, by exploiting human emotions, such as fear, urgency, or trust.
  • Social Engineering: The use of psychological manipulation to trick individuals into divulging confidential information or performing actions that may compromise their own security.
  • Social engineering: The use of psychological manipulation to trick individuals into divulging confidential information.
  • Social Engineering: The use of psychological manipulation to trick individuals into divulging confidential or personal information.
  • Social engineering: The use of psychological manipulation to trick individuals into divulging sensitive information, or performing actions that are against their best interests.
  • Social Engineering: The use of psychological manipulation to trick people into performing actions or revealing sensitive information.
  • Social Engineering: The use of psychological manipulation, and deception, to trick people, into revealing confidential information, or performing actions, that compromise their security, such as phishing scams, or pretexting.
  • Solr: An open-source enterprise search platform, written in Java, which provides full-text search, faceted search, hit highlighting, and real-time indexing.
  • Spark: An open-source, fast, and general-purpose cluster computing system, used for large-scale data processing.
  • Spear Phishing: A type of phishing attack, that targets specific individuals, or organizations, by gathering information, about their interests, or habits, and crafting personalized messages, or emails, that appear to come from trusted sources.
  • Spear Phishing: A type of phishing attack, that targets specific individuals, or organizations, with personalized and convincing emails, or messages, that appear to be from a trusted source.
  • Spoofing: A type of attack in which an attacker impersonates another person, system, or device to gain unauthorized access.
  • Spoofing: An attack in which a attacker makes it appear as though a transmission is coming from a trusted source, by forging the source IP address.
  • Spyware: A type of malicious software that monitors a user’s activities and collects sensitive information, without their knowledge.
  • Spyware: A type of malware that collects sensitive information, such as passwords and keystrokes, without the victim’s knowledge or consent.
  • Spyware: A type of software that monitors a user’s computer activity, and collects sensitive information, such as passwords, browsing history, and financial information, without the user’s knowledge or consent.
  • Spyware: A type of software, that monitors a user’s activity, without their knowledge or consent, and can steal sensitive information, such as passwords or credit card numbers.
  • Spyware: Malicious software that is designed to gather information from a computer system without the user’s knowledge or consent.
  • Spyware: Software, that collects sensitive information, about a user, or their computer, without their knowledge or consent, and sends it, to a remote attacker, for malicious purposes.
  • SQL injection attack: A type of attack that exploits vulnerabilities in a website’s database to access or modify data.
  • SQL Injection Attack: A type of attack, that exploits vulnerabilities, in the SQL code, of a web application, to inject malicious SQL commands, that extract sensitive information, from the database, or manipulate the data.
  • SQL Injection Attack: A type of attack, that involves injecting malicious SQL code, into a database, to steal sensitive information, or manipulate the data stored in the database.
  • SQL Injection Attack: A type of attack, that involves injecting malicious SQL commands, into a web site’s database, to steal sensitive information, or manipulate the data, stored in the database.
  • SQL Injection attack: A type of cyber attack that involves injecting malicious code, or SQL statements, into a database, to gain unauthorized access, or steal sensitive information.
  • SQL injection attack: A type of web application security vulnerability that allows an attacker to execute malicious SQL commands, by exploiting a vulnerability in a web application’s code.
  • SQL Injection Attack: An attack, that involves injecting malicious code, into a web application’s SQL database, to steal sensitive information, modify data, or gain unauthorized access.
  • SQL Injection Attack: An attack, where an attacker injects malicious code, into a vulnerable database, to steal sensitive information, or manipulate data, by exploiting vulnerabilities, in the Structured Query Language (SQL) used by the database.
  • SQL Injection Attack: An attack, where an attacker inserts malicious SQL code, into a database query, to access or modify sensitive data, or take control of the database server.
  • SQL Injection: A type of attack that allows an attacker to inject malicious code into a SQL database through a vulnerability in the website’s code.
  • SQL Injection: A type of attack, that targets web applications, that use SQL databases, to extract, modify, or delete sensitive information, by injecting malicious SQL code, into input fields, such as search forms, or login pages.
  • SQL Injection: A type of cyber attack that takes advantage of vulnerabilities in a website’s code to inject malicious SQL commands into a database, potentially revealing sensitive information or allowing the attacker to make unauthorized changes.
  • SQL injection: A type of vulnerability in web applications, where an attacker injects malicious SQL code into a database query, allowing them to steal data or modify the database.
  • SQL Injection: A type of vulnerability, in which, an attacker, injects malicious code, into an SQL database query, to manipulate or extract sensitive data, or gain unauthorized access.
  • SQL Injection: A type of web-based attack, that injects malicious SQL code, into a vulnerable database, to compromise the security, or steal data, of the database.
  • SSH: Secure Shell, a protocol for secure remote login and other secure network services over an insecure network.
  • SSH: Secure Shell, a protocol that provides secure and encrypted communication between two networked devices.
  • SSL (Secure Socket Layer) & TLS (Transport Layer Security): Protocols used to secure data transmission over the internet, typically used for secure websites.
  • SSL (Secure Sockets Layer): a security protocol for establishing encrypted links between networked computers, now succeeded by TLS.
  • SSL (Secure Sockets Layer) / TLS (Transport Layer Security): Protocols for establishing secure links between networked computers.
  • SSL (Secure Sockets Layer): an outdated security protocol, replaced by TLS.
  • SSL Certificate: An encryption protocol that secures online communication, used to establish secure connections between a web server and browser.
  • SSL/TLS: Secure Sockets Layer/Transport Layer Security, a protocol for secure communication over the internet.
  • SSL/TLS certificate: An electronic document that identifies a website, and is used to establish a secure, encrypted connection between a web browser and a web server.
  • Stemming: Process of reducing words to their base or root form in order to better analyze them for NLP tasks.
  • Strong password: A password that is difficult to guess or crack, consisting of a combination of uppercase and lowercase letters, numbers, and symbols.
  • Structural isomer: a type of isomer where the atoms are connected differently in the molecule’s structure.
  • Supernovae: explosive events that occur when a star has exhausted its nuclear fuel, causing it to collapse in on itself and resulting in a massive release of energy.
  • Symmetric encryption: An encryption method that uses the same key for encryption and decryption.
  • Symmetric Key Algorithm: A type of encryption that uses the same key for both encryption and decryption, making key management simpler but less secure.
  • Symmetric Key Algorithm: An encryption algorithm that uses the same key for encryption and decryption.
  • Symmetric key cryptography: An encryption system that uses the same key for both encryption and decryption.
  • Symmetric Key Encryption: A type of encryption where the same key is used for both encryption and decryption.
  • Symmetric Key Encryption: An encryption technique that uses the same key for encryption and decryption.
  • Symmetric Key Encryption: An encryption method, that uses the same key, for both encryption, and decryption, of data, and provides fast encryption and decryption.
  • Symmetry: property of a shape or object where its appearance remains unchanged under certain transformations (e.g. rotations, reflections).
  • Tautomer: a type of isomer where the position of a hydrogen atom and a double-bonded oxygen or nitrogen atom are interchanged within a molecule.
  • TCP/IP (Transmission Control Protocol/Internet Protocol): A communication protocol suite used to establish a reliable and efficient connection between devices on the internet.
  • Temperate climate: a climate characterized by moderate temperatures, typically found between the tropics and polar regions.
  • Tensorflow: Open-source software library for machine learning and deep learning
  • Threat Hunting: the proactive search for signs of security breaches or malware infections in a network.
  • Threat Model: Process of identifying potential threats to a system, analyzing them, and determining ways to mitigate the risks.
  • Time-of-Check-Time-of-Use (TOCTOU): A vulnerability that occurs when a system’s state is checked and used between two points in time, with the assumption that the state remains the same.
  • TLS: Transport Layer Security, a cryptographic protocol that provides secure communication over the internet, used to secure websites and other network services.
  • TLS (Transport Layer Security): A protocol that provides privacy and security for communications over the Internet by encrypting data transmitted between clients and servers.
  • TLS (Transport Layer Security): a security protocol for establishing encrypted links between networked computers, succeeding SSL.
  • TLS (Transport Layer Security): A security protocol that provides secure communication over a computer network, commonly used for encrypted communication on the web.
  • TLS (Transport Layer Security): a widely-used security protocol for securing data transmission over the internet.
  • Tokenization: the process of converting sensitive data, such as credit card numbers, into a secure token that can be used in place of the original data.
  • Tokenization: A data security technique that replaces sensitive data with a unique identifier, called a token, that has no meaningful value.
  • Tokenization: a process in which sensitive data, such as credit card information, is replaced with a non-sensitive equivalent, called a token, to securely transmit and store the data.
  • Transport Layer Security (TLS): A protocol for establishing secure link between networked computers, particularly for web browsing. It’s the successor to SSL (Secure Sockets Layer).
  • Trojan: A type of malware that disguises itself as a legitimate program, but performs malicious actions in the background.
  • Trojan: A type of malware, that appears to be a legitimate application, or software, but actually contains hidden malicious functions, that can steal data, or compromise the security, of the system, or network.
  • Trojan: A type of malware, that disguises itself as a legitimate program, to trick users into downloading and installing it, and then performs malicious actions, such as stealing data, spying, or compromising security.
  • Turing Machine: A theoretical machine that can perform any calculation that any other machine can perform.
  • Two-factor authentication: A security process that requires a user to provide two forms of identification, such as a password and a security token.
  • Two-Factor Authentication (2FA): A security process in which user provides two means of identification, one being password and the other being a physical token or biometric data
  • Two-factor authentication (2FA): a security process that requires a user to provide two means of identification, usually a password and a token or biometric.
  • Two-Factor Authentication (2FA): a security process that requires two independent means of authentication, such as a password and a security token, to access an online account or system.
  • Two-Factor Authentication (2FA): a security process that requires two methods of authentication, such as a password and a one-time code, to access a system.
  • Two-Factor Authentication (2FA): A security process where a user provides two different authentication factors to verify their identity.
  • Two-Factor Authentication (2FA): An authentication method that requires two separate authentication factors, such as a password and a physical token, to access a network or system.
  • Two-factor authentication (2FA): an authentication process that requires two independent means of identifying a user, such as a password and a security token.
  • Two-Factor Authentication (2FA): Authentication process that requires a user to provide two independent authentication factors, such as a password and a security token.
  • Two-Factor Authentication (2FA): a method for enhancing the security of authentication by requiring two forms of authentication, such as a password and a one-time code sent to a device.
  • Two-Factor Authentication (2FA): A method of authentication, that requires the user, to provide two forms of identification, such as a password, and a token, or a password, and a biometric factor, to access a system, or application.
  • Two-Factor Authentication (2FA): A method of confirming a user’s claimed identity by requiring two different authentication methods.
  • Two-Factor Authentication (2FA): a security process in which a user provides two different authentication factors to verify their identity
  • Two-Factor Authentication (2FA): A security process in which a user provides two means of identification, such as a password and a fingerprint or a password and a security token, to access a system or service.
  • Two-Factor Authentication (2FA): A security process in which two different authentication methods are used to confirm the identity of a user.
  • Two-Factor Authentication (2FA): A security process that requires the user to present two separate forms of identification, such as a password and a one-time code sent to a mobile device, to access an account or service.
  • Two-Factor Authentication (2FA): A security process that requires two methods of authentication.
  • Two-Factor Authentication (2FA): A security process, that requires a user to provide two different authentication factors, such as a password and a token, or a password and a biometric, to access a system or account.
  • Two-Factor Authentication (2FA): A security process, that requires two separate methods of authentication, such as a password, and a security token, or biometric information, to verify the identity of the user, and provide an extra layer of security, to protect sensitive information and accounts.
  • Two-factor authentication (2FA): A type of authentication that requires a user to provide two separate forms of identification, such as a password and a security token, to gain access to a system or application.
  • Two-Factor Authentication (2FA): A type of authentication that requires two forms of identity verification, such as a password and a security token, to access a system or network.
  • Two-factor authentication (2FA): An additional layer of security for accessing an account or system that requires users to provide two forms of identification, typically a password and a code sent to a device.
  • Two-Factor Authentication (2FA): an authentication method that requires the user to provide two separate forms of evidence, such as a password and a smart card, to access a system.
  • Two-factor authentication (2FA): An authentication method that requires two forms of authentication, such as a password and a physical token, to gain access to a system or service.
  • Two-factor authentication (2FA): An authentication method that requires two forms of verification, such as a password and a security token, to access a system or resource.
  • Two-Factor Authentication (2FA): An authentication method that requires two separate authentication factors, such as a password and a security token, to access a system.
  • Two-Factor Authentication (2FA): An authentication method that requires two types of credentials, typically a password and a security token.
  • Two-Factor Authentication (2FA): An authentication method that requires users to provide two different forms of identification, such as a password and a security token, to access a system or resource.
  • Two-factor authentication (2FA): An authentication process that requires two independent factors, such as a password and a one-time code, to access a system or service.
  • Undecidability: A property of certain mathematical problems that cannot be solved by an algorithm and there is no method to determine in a finite number of steps whether a given solution is correct or not.
  • Unsupervised Learning: A type of machine learning in which the model is not provided with any labeled data and instead, the algorithm tries to find patterns in the input data on its own.
  • Van Neumann Architecture: A computer architecture developed by mathematician and computer pioneer John von Neumann, characterized by storing a program and processing instructions in sequential order.
  • Virtual Machine (VM): a software-based simulation of a computer system, allowing multiple VMs to run on a single physical server, improving resource utilization.
  • Virtual Machine (VM): An emulation of a computer system that runs on another computer system
  • Virtual Machine: An emulated computer system designed to run multiple operating systems on a single physical machine.
  • Virtual machine: An emulated computer system that runs on a host computer.
  • Virtual Private Network (VPN): A private network that uses a public network (e.g., the Internet) to connect remote sites or users together. VPNs use encryption to ensure privacy and security.
  • Virtual Private Network (VPN): A secure network connection made over the public internet, using encryption and authentication to protect the privacy and security of the data being transmitted.
  • Virtual Private Network (VPN): A secure network that allows remote users to access a private network over the public Internet.
  • Virtual Private Network (VPN): a secure network that uses encryption to protect data transmission over public networks.
  • Virtual Private Network (VPN): A secure, encrypted connection between a device and a network, typically used to protect sensitive data transmitted over public networks.
  • Virtual Private Network (VPN): a secure, encrypted connection between two networks or between a computer and a network, allowing remote users to access a private network as if they were directly connected.
  • Virtual Private Network (VPN): A secure, encrypted connection between two networks, allowing remote users to access a private network as if they were directly connected to it.
  • Virtual Private Network (VPN): A network technology that creates a secure, encrypted connection over a public network, allowing users to access private network resources.
  • Virtual private network (VPN): A secure connection between two or more devices over the internet, used to protect the confidentiality of data transmitted over the network.
  • Virtual Private Network (VPN): A secure connection between two private networks over the public Internet, often used to enable remote access to a private network.
  • Virtual private network (VPN): A secure network connection made over the public Internet, used to encrypt data and protect privacy.
  • Virtual Private Network (VPN): A secure network that connects remote users to a private network over the internet, allowing them to access resources as if they were on the same local network.
  • Virtual Private Network (VPN): A secure private network that operates over a public network like the internet to provide remote access to an organization’s internal network.
  • Virtual Private Network (VPN): A secure private network, created over a public network, such as the internet, and uses encryption, to provide secure remote access, and protect the confidentiality, and privacy, of the data transmitted over the network.
  • Virtual Private Network (VPN): a secure, encrypted connection between a device and a network, allowing users to access the internet or a private network remotely.
  • Virtual private network (VPN): A secure, encrypted connection between two networks, that allows users to securely access network resources as if they were on the same local network.
  • Virtual Private Network (VPN): A secure, encrypted network that uses the Internet to connect remote sites or users.
  • Virtual Private Network (VPN): A technology that creates a secure, encrypted connection between two devices, allowing for secure remote access to a private network.
  • Virtual Private Network (VPN): A technology, that allows for secure remote access, to a private network, by creating an encrypted tunnel, over a public network, such as the internet.
  • Virtual Private Network (VPN): A type of private network that uses public network infrastructure, such as the Internet, to provide remote users with secure access to the organization’s network.
  • Virtual Private Network (VPN): A type of secure network connection, that uses encryption and other security mechanisms, to create a private network, over a public network, such as the Internet.
  • Virtual Reality: Refers to computer-generated environments that simulate physical experiences, allowing users to interact with a virtual world as if it were real.
  • Virtualization: the creation of a virtual version of something, such as a virtual machine, operating system, storage device, or network resources.
  • Virtualization: Technology that creates a virtual version of a device or operating system.
  • Virus: A type of malware that replicates itself by infecting other files or systems.
  • Virus: A type of malware that spreads by infecting other software or files, and can cause harm to a system or network.
  • Virus: A type of malware, that infects, and spreads, from one file or system to another, by attaching itself, to a legitimate program, and can cause harm, to the system, or steal sensitive information.
  • Virus: A type of malware, that replicates itself by infecting other programs, files, or systems, and causing harm to the host.
  • Virus: A type of malware, that replicates itself, and infects a computer, without the user’s knowledge, and can cause harm, or spread to other systems.
  • Virus: A type of malware, that replicates itself, by infecting other files, or systems, and causes harm, to the infected systems, or networks.
  • Vishing: A type of phishing attack, that uses voice calls, or voice-over-IP (VoIP), to trick users, into revealing sensitive information, or downloading malware.
  • VLAN: Virtual Local Area Network, a logical subnetwork that helps segment a LAN into smaller, more manageable segments.
  • VLAN (Virtual LAN): Logical grouping of devices in a LAN based on function, project, or application, instead of physical location.
  • VLAN (Virtual Local Area Network): A group of devices on different network switches that are grouped together as if they were on the same network segment. This can provide network segmentation and increased security.
  • VLAN (Virtual Local Area Network): a logical network segment that enables communication between devices within a single broadcast domain, regardless of their physical location.
  • VLAN (Virtual Local Area Network): A VLAN is a logical grouping of devices within a physical LAN. VLANs are used to separate network traffic and improve security.
  • VLAN tagging: the process of assigning a VLAN ID to network traffic, allowing it to be separated and prioritized on a network.
  • VLAN Tagging: The process of adding a VLAN ID to a network frame to identify the VLAN it belongs to.
  • VPN: Virtual Private Network, a secure and private connection between two devices over the internet.
  • VPN: Virtual Private Network, a technology that allows secure communication over the internet by routing traffic through an encrypted tunnel.
  • VPN (Virtual Private Network): A network that provides secure, remote access to a private network by encapsulating data in a secure, encrypted tunnel over the Internet.
  • VPN (Virtual Private Network): A secure and encrypted connection that extends a private network across a public network (e.g. the Internet), allowing users to access resources or services from a remote location as if they were directly connected to the private network.
  • VPN (Virtual Private Network): A secure, encrypted connection between two networks or between an individual device and a network. This allows for remote access to a private network and the protection of sensitive information.
  • VPN (Virtual Private Network): a technology that allows users to securely access a private network over the internet.
  • VPN (Virtual Private Network): A private network that is constructed by using public wires to connect nodes. The security of the VPN connection and the privacy of the data being transmitted is maintained by using encryption and secure protocols.
  • VPN (Virtual Private Network): A secure, encrypted connection between two networks over the Internet.
  • VPN (Virtual Private Network): A type of network, that encrypts all traffic and creates a secure, encrypted tunnel, between a user’s device, and a VPN server, to protect the privacy, and security, of the user’s online activities.
  • VPN (Virtual Private Network): VPN is a technology that creates a secure, encrypted connection between two devices over a public network. VPNs are used to securely connect remote users to a network or to extend a private network over a public network.
  • VPN: Virtual Private Network (VPN) is a secure connection between two or more devices over the internet. A VPN can be used to protect online privacy, secure data, and network access, and bypass censorship and geo-restrictions.
  • VPN: Virtual Private Network, a secure connection between two devices or networks that uses encryption to protect data from unauthorized access.
  • Vulnerability Assessment: A security technique used to identify, classify and prioritize vulnerabilities in a system or network.
  • Vulnerability Management: The process of identifying, classifying, prioritizing, and fixing security vulnerabilities in software, hardware, and networks.
  • Vulnerability Management: the process of identifying, prioritizing, and remedying vulnerabilities in a network.
  • Vulnerability scan: The process of automatically identifying security vulnerabilities in a system or network.
  • Vulnerability scanning: The process of identifying and assessing security weaknesses in a computer system, network, or web application.
  • Vulnerability Scanning: Vulnerability scanning is the process of automatically identifying potential security weaknesses in a computer system, network, or application.
  • Vulnerability: A weakness, in a system, software, or process, that can be exploited, by an attacker, to cause harm, or compromise security.
  • WAF (Web Application Firewall): A firewall specifically designed to protect web applications from common attacks such as SQL injection, cross-site scripting, and other types of exploits.
  • Watering Hole Attack: A type of attack, that infects popular websites, or domains, frequently visited by the target group, with malware, to compromise the users’ devices, and steal information when they visit the websites.
  • Watering Hole Attack: A type of attack, that involves compromising, or hacking, a website, that is frequented, by a specific group of users, with the aim of stealing sensitive information, or delivering malware, to the users.
  • Watering Hole Attack: A type of attack, that targets specific groups of users, by compromising, or manipulating, the web sites, or resources, that they frequent, to spread malware, or steal sensitive information.
  • Web Application Firewall (WAF): A security solution that protects websites and web applications from common attacks, such as SQL injection, cross-site scripting (XSS), and other types of malicious traffic.
  • WEP: Wired Equivalent Privacy, a deprecated security algorithm for Wi-Fi networks, is now considered to be weak and insecure.
  • WEP (Wired Equivalent Privacy): An early security protocol used to secure Wi-Fi networks, now considered insecure.
  • Whaling: A type of phishing attack, that targets high-level executives, or executives, with fraudulent emails, that appear to be from a senior official or board member.
  • Whaling: A type of spear phishing attack, that targets high-level executives, or prominent individuals, within an organization, with the intention of stealing confidential data, or making unauthorized transfers.
  • Wired Equivalent Privacy (WEP): a security protocol for wireless networks, now largely considered to be insecure.
  • Wireless Network: A type of computer network that uses radio waves to communicate between devices rather than cables.
  • Wireless Protected Access (WPA): A security standard for wireless local area networks (WLANs) and Wi-Fi networks, providing strong data encryption and authentication.
  • WLAN (Wireless Local Area Network): A type of local area network that uses wireless connections to connect devices to the network.
  • Word2Vec: A neural network-based method for representing words as dense vectors, used in NLP tasks such as text classification and semantic similarity.
  • Worm: A type of malware that replicates itself and spreads through networks, without the need for human interaction.
  • Worm: A type of malware that self-propagates across networks, without requiring user interaction.
  • Worm: A type of malware, that replicates itself, across a network, and can cause harm, by consuming system resources, spreading to other systems, or disrupting network connectivity.
  • Worm: A type of malware, that replicates itself, across networks, or systems, without the need of human interaction, and causes harm, to the infected systems, or networks.
  • Worm: A type of malware, that spreads itself automatically, across networks, by exploiting vulnerabilities, without any user interaction.
  • Worm: A type of malware, that spreads itself, across a network, without the need for user intervention, and can cause harm, or slow down the network.
  • WPA (Wi-Fi Protected Access): A security protocol for wireless local area networks (WLANs) that provides stronger data encryption and authentication than the earlier WEP (Wired Equivalent Privacy) standard.
  • WPA (Wi-Fi Protected Access): A security protocol for wireless local area networks (WLANs) that provides stronger data protection and network access control.
  • WPA (Wi-Fi Protected Access): a security protocol for wireless networks, provides stronger data encryption and authentication than WEP.
  • WPA (Wi-Fi Protected Access): A security protocol used to secure Wi-Fi networks.
  • WPA (Wi-Fi Protected Access): WPA is a security protocol for wireless networks that provides stronger encryption and authentication than WEP.
  • WPA2 (Wi-Fi Protected Access 2): a security protocol for wireless networks, provides stronger data encryption and authentication than WPA.
  • WPA2 (Wi-Fi Protected Access 2): The successor to WPA, offering stronger data encryption and network security.
  • WPA2 (Wi-Fi Protected Access 2): WPA2 is the second version of the WPA security protocol for wireless networks. It provides stronger encryption and authentication than WPA.
  • WPA2 (Wi-Fi Protected Access II): A security protocol used to secure Wi-Fi networks, successor to WPA.
  • WPA3: Latest Wi-Fi security protocol designed to improve the security of Wi-Fi networks, replacing WPA2.
  • WPA3 (Wi-Fi Protected Access III): The latest version of the WPA security protocol for WLANs, offering stronger encryption and improved security features compared to its predecessors.
  • WPA3 (Wi-Fi Protected Access III): A security protocol used to secure Wi-Fi networks, successor to WPA2.
  • WPS (Wi-Fi Protected Setup): A security protocol used to secure Wi-Fi networks, now considered insecure.
  • X.509 certificate: A digital certificate used to authenticate an entity, such as a person or organization, in public key infrastructure.
  • X.509 Certificate: a digital certificate format used to verify the identity of a website or other entity in a secure network.
  • X.509 Certificate: A digital certificate that uses the X.509 standard to authenticate the identity of entities and secure data transmission over networks.
  • XSRF (Cross-Site Request Forgery): A type of attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated.
  • XSS (Cross-Site Scripting): a type of security vulnerability that allows attackers to inject malicious code into a website viewed by other users.
  • XSS (Cross-Site Scripting): A vulnerability in web applications where an attacker injects malicious script into a trusted website
  • XSS (Cross-Site Scripting) Attack: A type of attack, that involves injecting malicious code, into a web site, to steal sensitive information, or manipulate the behavior, of users visiting the site.
  • XSS (Cross-Site Scripting): A type of security vulnerability that allows an attacker to inject malicious scripts into web pages viewed by other users.
  • YAGNI (You Ain’t Gonna Need It): Agile software development principle, stating that you should only build what is needed right now, rather than planning for future functionality.
  • YARA: YARA is a tool for creating, sharing, and implementing a set of rules to identify and classify malware.
  • YARN (Yet Another Resource Negotiator): Hadoop component that manages resource allocation for the nodes in a cluster, enabling multiple users and applications to share the cluster.
  • YOLO (You Only Look Once): A real-time object detection system for computer vision, used to identify and locate objects in images/videos.
  • Yubikey: A hardware security key used for two-factor authentication to secure online accounts and applications.
  • Yubikey: A hardware-based security key used to securely authenticate users on computers, mobile devices, and online services, protecting against password theft and phishing.
  • Yubikey: A small USB device that can be used for authentication and encryption, often used for 2-Factor Authentication (2FA).
  • Zero Trust Architecture: a security model that assumes that actors inside a network are just as likely to be malicious as those outside of it.
  • Zero Trust Network (ZTN): A security model that assumes that any device, user, or network inside an organization’s perimeter cannot be trusted and must be verified before being granted access to resources.
  • Zero Trust Security: A security model that assumes that all network traffic is untrusted, and requires strict identity verification and authorization before granting access to network resources.
  • Zero Trust: A security model in which access to resources is granted only based on continuous evaluation and verification of a user’s identity and device posture.
  • Zero-Day Attack: A type of attack, that exploits a previously unknown vulnerability, in a system, or software, before a patch, or security update, is available, to cause widespread damage, or steal sensitive information.
  • Zero-day Exploit: A type of attack that takes advantage of a vulnerability in a software or system that has not yet been discovered or patched.
  • Zero-day exploit: A type of attack that takes advantage of a vulnerability in software or hardware that is unknown to the vendor and users.
  • Zero-Day Exploit: A vulnerability in software or hardware that is unknown to the vendor or to antivirus companies and can be exploited by attackers to conduct malicious activities.
  • Zero-day vulnerability: A type of security vulnerability that is unknown and unpatched, making it exploitable by attackers.
  • Zero-Day Vulnerability: A type of security vulnerability, that is unknown to the software vendor, or the general public, and is being actively exploited by attackers, before a patch or a fix is available.
  • Zero-day vulnerability: A type of vulnerability in software or hardware, that is unknown to the vendor and is being actively exploited by attackers.
  • Zero-Day vulnerability: A type of vulnerability that is unknown to the software vendor, and can be exploited by attackers, before a patch is available.
  • Zero-Day Vulnerability: A vulnerability in software or hardware that is unknown to the party responsible for patching or otherwise fixing the flaw, typically meaning that the vulnerability has yet to be discovered or patched.
  • Zero-Day Vulnerability: A vulnerability, that has been discovered, by an attacker, but has not yet been publicly disclosed, or patched, by the software vendor, leaving systems, at risk, of exploitation.
  • Zero-day: A previously unknown vulnerability that is exploited by an attacker before it is discovered by the vendor or security researchers.
  • Zerodium: A company that pays out high rewards for vulnerabilities and zero-day exploits in software and services, mainly for security researchers and hackers.
  • Zero-Knowledge Proof: a cryptographic method that enables one party to prove to another that a statement is true, without revealing any additional information beyond the statement itself.
  • Zero-knowledge proof: A method in cryptography to prove the validity of a statement without revealing any underlying information.
  • Zero-Knowledge Proof: a method of verifying the truth of a statement without revealing any additional information.
  • Zero-Trust Model: A security model that assumes that all network traffic is untrusted and requires explicit authorization before being granted access.
  • ZFS (Zettabyte File System): A scalable and robust filesystem designed for data storage, protection and management with advanced features such as snapshots, checksums, compression, and integration with storage pools.