Cybersecurity Encyclopedia

Browse CyberExperts' glossary of cybersecurity terms, threats, controls, and defensive concepts. This archive is designed to help readers quickly understand common security language and connect related topics across modern cyber risk, compliance, and incident response.

Use the search box or jump by letter to find definitions for topics like malware, phishing, supply chain attacks, cloud security, and defense-in-depth.

608 glossary entries Focused on practical cybersecurity language Useful for SMB buyers, practitioners, and learners

A

Access Control

Access control is the process of restricting who or what can view, use, or change systems, applications, data, and physical resources....

Read definition →

Access Package

An access package is a defined bundle of permissions, groups, or application access offered together for a particular user type, role, or purpose....

Read definition →

Access Review

An access review is a structured check of who has access to which systems, roles, or data and whether that access is still appropriate....

Read definition →

Access Risk Scoring

Access risk scoring is the evaluation of users, roles, entitlements, or sessions to estimate how much security risk a given access state creates....

Read definition →

Access Token

An access token is a credential issued after authentication that allows a user, application, or service to access specific resources for a limited time....

Read definition →

Account Recovery

Account recovery is the process used to restore account access when a user is locked out, loses a factor, or can no longer authenticate normally....

Read definition →

Admin Tiering

Admin tiering is the separation of administrative accounts, systems, and tasks into trust tiers to reduce privilege exposure and lateral compromise....

Read definition →

Administrative Unit

An administrative unit is a defined subset of users, groups, devices, or resources that can be managed separately within a broader identity or administrative system....

Read definition →

Adversary Emulation

Adversary emulation is a security testing approach that recreates the tactics, techniques, and procedures of real-world threat actors in a controlled way....

Read definition →

Adware

Adware is software that displays advertising, but some forms also track users, degrade privacy, or create security exposure....

Read definition →

Air Gap

An air gap is a security isolation approach in which a system or network is separated from untrusted or internet-connected environments to reduce exposure....

Read definition →

Alert Fatigue

Alert fatigue is the reduced effectiveness of analysts caused by large volumes of noisy, repetitive, or low-value security alerts....

Read definition →

Anonymization

Anonymization is the process of transforming data so individuals are no longer identifiable in a practical and reasonably likely way....

Read definition →

Anti-Tamper

Anti-tamper is the use of controls intended to detect, prevent, or complicate unauthorized modification of software or its execution state....

Read definition →

Antimalware

Antimalware is security software designed to detect, block, quarantine, and remove malicious programs from devices and networks....

Read definition →

API Abuse

API abuse is the misuse of an application programming interface to extract data, automate attacks, bypass controls, or cause operational harm....

Read definition →

API Authentication

API authentication is the process of verifying the identity of a user, application, or service attempting to access an application programming interface....

Read definition →

API Discovery

API discovery is the process of identifying known, unknown, documented, and undocumented APIs across an organization’s environment....

Read definition →

API Schema Validation

API schema validation is the process of checking whether API requests and responses match the expected structure, types, and constraints defined by the service....

Read definition →

API Security

API security is the practice of protecting application programming interfaces from unauthorized access, abuse, data exposure, and logic flaws....

Read definition →

API Versioning

API versioning is the practice of managing changes to an API through distinct versions so clients can evolve without immediate breakage....

Read definition →

Application Reputation

Application reputation is the assessment of how trustworthy a piece of software appears based on observed behavior, origin, prevalence, signing, or threat intelligence....

Read definition →

Argon2

Argon2 is a modern password-hashing function designed to make password cracking more expensive through configurable time, memory, and parallelism costs....

Read definition →

Asset Management

Asset management is the practice of identifying, tracking, and governing systems, devices, software, and data that an organization relies on....

Read definition →

Attack Path Analysis

Attack path analysis is the process of identifying how attackers could chain together identities, systems, privileges, and weaknesses to reach a high-value target....

Read definition →

Attack Surface

An attack surface is the total set of systems, services, identities, applications, and exposures that an attacker could potentially target....

Read definition →

Attack Vector

An attack vector is the path, method, or weakness an attacker uses to gain access, deliver malicious activity, or move toward a target....

Read definition →

Audit Logging

Audit logging is the recording of system, user, administrative, or application actions in a way that supports review, investigation, and accountability....

Read definition →

Audit Trail

An audit trail is a chronological record of actions, changes, or events that supports accountability, investigation, and review....

Read definition →

Authenticator App

An authenticator app is a mobile or desktop application that helps users generate or approve authentication factors such as one-time codes or push requests....

Read definition →

Authenticator Reset

An authenticator reset is the process of removing, replacing, or re-establishing an authentication factor when the original authenticator is lost, changed, or no longer truste...

Read definition →

Authorization Code Flow

Authorization code flow is an OAuth pattern in which a client first receives an authorization code and then exchanges it for tokens through a back-channel request....

Read definition →

Authorization Server

An authorization server is the component that authenticates, evaluates consent or policy, and issues tokens to clients in OAuth or OIDC-based systems....

Read definition →

B

Backup Code

A backup code is a one-time recovery code a user can store and later use if their normal authentication factor is unavailable....

Read definition →

Backup Integrity

Backup integrity is the assurance that backup data is complete, uncorrupted, unmodified in unauthorized ways, and actually usable for recovery....

Read definition →

Banner Grabbing

Banner grabbing is the practice of collecting service and software details from exposed systems to support reconnaissance and assessment....

Read definition →

bcrypt

bcrypt is an adaptive password-hashing function designed to make password verification slower and more resistant to offline cracking than fast hashes....

Read definition →

Behavioral Biometrics

Behavioral biometrics are patterns in how a person interacts with devices or systems that can be used as a signal for identity confidence or fraud detection....

Read definition →

Blast Radius

Blast radius is the scope of systems, identities, data, or operations that can be affected when a security control fails or an attacker gains access....

Read definition →

Botnet

A botnet is a network of compromised devices that attackers remotely control to launch coordinated malicious activity at scale....

Read definition →

Break Glass Account

A break glass account is an emergency-access account reserved for exceptional situations when normal administrative access is unavailable or unsuitable....

Read definition →

Break-Fix Access

Break-fix access is temporary elevated access granted to troubleshoot, repair, or restore a system during an operational issue or outage....

Read definition →

Browser Isolation

Browser isolation is the separation of web browsing activity from the main endpoint so risky web content cannot interact directly with the local device....

Read definition →

Browser Security

Browser security is the practice of protecting web browsers, browser data, and browsing activity from malicious content, abuse, and exploitation....

Read definition →

Bug Bounty Program

A bug bounty program is a security initiative that rewards eligible researchers for finding and responsibly reporting vulnerabilities in defined systems or applications....

Read definition →

Business Continuity

Business continuity is the capability to keep critical operations running during and after disruption through planning, resilience, and coordinated response....

Read definition →

Business Logic Flaw

A business logic flaw is a weakness in how an application’s intended workflow, rules, or decision logic can be manipulated to achieve unauthorized outcomes....

Read definition →

C

Canary Token

A canary token is a planted digital artifact designed to trigger an alert when someone accesses, moves, or uses it unexpectedly....

Read definition →

Case Management

Case management is the structured tracking of security investigations, incidents, tasks, evidence, ownership, and decisions from intake through closure....

Read definition →

Certificate Pinning

Certificate pinning is the practice of restricting trust to a specific certificate, public key, or expected trust set rather than any broadly trusted issuer....

Read definition →

Certificate Policy

A certificate policy is a formal statement that defines the rules, assurance expectations, and acceptable uses for certificates issued under a PKI program....

Read definition →

Certificate Rekey

Certificate rekey is the process of replacing the key pair associated with a certificate while issuing a new certificate for the same or similar identity....

Read definition →

Clickjacking

Clickjacking is an attack that tricks a user into clicking or interacting with hidden or disguised elements from another page or application....

Read definition →

Cloud Security

Cloud security refers to the controls, policies, and technologies used to protect data, workloads, and identities in cloud environments....

Read definition →

Code Integrity

Code integrity is the assurance that software or scripts running on a system are approved, untampered, and consistent with expected trust policy....

Read definition →

Code Signing

Code signing is the practice of digitally signing software, scripts, or binaries so recipients can verify the publisher and detect tampering....

Read definition →

Common Name (CN)

Common Name (CN) is a traditional certificate subject field that historically identified the primary name associated with a certificate....

Read definition →

Conditional Access

Conditional access is a policy-based identity control that allows, blocks, or limits access based on factors such as user, device, location, risk, or application context....

Read definition →

Container Security

Container security is the practice of protecting container images, runtimes, orchestration environments, and supporting pipelines from compromise and misuse....

Read definition →

Context-Aware Access

Context-aware access is an access control approach that evaluates signals such as user, device, location, risk, and behavior before allowing or limiting access....

Read definition →

Control Framework

A control framework is an organized set of control objectives, requirements, and practices used to structure security and risk management efforts....

Read definition →

Cookie Theft

Cookie theft is the unauthorized capture of browser cookies, especially session cookies, so an attacker can reuse them for access or tracking....

Read definition →

Credential Hygiene

Credential hygiene is the practice of creating, storing, rotating, and protecting passwords, keys, and tokens in ways that reduce misuse and exposure....

Read definition →

Credential Rotation

Credential rotation is the process of replacing passwords, keys, tokens, certificates, or other secrets on a controlled schedule or after a risk event....

Read definition →

Cross-Tenant Access

Cross-tenant access is access granted from one organization’s identity environment into resources or applications hosted in another tenant or organizational boundary....

Read definition →

Cryptographic Module

A cryptographic module is a hardware or software component that performs cryptographic operations such as encryption, decryption, signing, or key storage within a defined secu...

Read definition →

CSP Nonce

A CSP nonce is a one-time value used in a Content Security Policy to allow only specific trusted inline scripts or styles to execute....

Read definition →

CSRF Token

A CSRF token is a unique value included in a request so the server can verify that the request came from the legitimate application flow....

Read definition →

Cyber Hygiene

Cyber hygiene is the routine practice of maintaining systems, identities, devices, and user behavior in ways that reduce common security risks over time....

Read definition →

Cyber Resilience

Cyber resilience is the ability to prepare for, withstand, respond to, and recover from cyber incidents while keeping critical operations running....

Read definition →

Cyberattack

A cyberattack is a deliberate attempt to access, disrupt, damage, or misuse systems, networks, or digital information....

Read definition →

Cybersecurity

Cybersecurity is the practice of protecting systems, networks, applications, and data from unauthorized access, disruption, and digital attacks....

Read definition →

D

Data Breach

A data breach is an incident in which sensitive, confidential, or protected information is exposed, stolen, or accessed without authorization....

Read definition →

Data Classification

Data classification is the practice of labeling information by sensitivity, value, or handling requirements so it can be protected appropriately....

Read definition →

Data Exfiltration

Data exfiltration is the unauthorized movement or theft of data from a system, application, cloud environment, or organization-controlled network....

Read definition →

Data Governance

Data governance is the framework of policies, ownership, standards, and controls used to manage data quality, use, protection, and accountability....

Read definition →

Data Localization

Data localization is a requirement that certain data remain stored, processed, or managed within a defined national or regional boundary....

Read definition →

Data Masking

Data masking is the practice of obscuring sensitive data so it remains useful for a limited purpose without exposing the original values fully....

Read definition →

Data Minimization

Data minimization is the practice of collecting, storing, sharing, and retaining only the data that is genuinely necessary for a defined purpose....

Read definition →

Data Processor

A data processor is an entity that processes personal data on behalf of a controller rather than deciding the overall purpose itself....

Read definition →

Data Retention

Data retention is the practice of keeping information for defined periods based on business, legal, operational, and security needs....

Read definition →

Data Sovereignty

Data sovereignty is the principle that data is subject to the laws and governance of the jurisdiction in which it is stored or processed....

Read definition →

Data Tokenization

Data tokenization is the process of replacing a sensitive data value with a non-sensitive token that represents it without exposing the original value directly....

Read definition →

Delegated Access

Delegated access is a model in which one user, application, or service is granted permission to act on behalf of another within defined limits....

Read definition →

Deprecated Endpoint

A deprecated endpoint is an API route or interface that is still available but marked for retirement and no longer considered the preferred supported path....

Read definition →

Deprovisioning

Deprovisioning is the process of removing or disabling identities, accounts, credentials, and access when they are no longer needed....

Read definition →

Desktop Hardening

Desktop hardening is the strengthening of workstation security through configuration, policy, software restriction, and operational controls....

Read definition →

Detection Coverage

Detection coverage is the extent to which a security program can identify relevant attacker behaviors, risks, and incident types across its environment....

Read definition →

Detection Engineering

Detection engineering is the practice of designing, testing, tuning, and maintaining security detections so meaningful attacker behavior can be identified with high confidence...

Read definition →

Detection Tuning

Detection tuning is the process of refining alerts, rules, thresholds, and logic so detections are more accurate, useful, and actionable....

Read definition →

Device Attestation

Device attestation is the process of verifying security-related claims about a device, such as hardware state, integrity, or management posture....

Read definition →

Device Certificate

A device certificate is a digital certificate issued to a specific device so it can prove identity and participate in trusted access or management flows....

Read definition →

Device Challenge

A device challenge is an additional verification step used to confirm that a device or client context meets expected trust conditions before access continues....

Read definition →

Device Code Flow

Device code flow is an OAuth pattern that lets devices with limited input capabilities obtain authorization through a separate trusted user device....

Read definition →

Device Compliance

Device compliance is the state in which an endpoint meets an organization’s defined security, configuration, and management requirements....

Read definition →

Device Control

Device control is the management of whether endpoints may use external hardware such as USB drives, phones, storage devices, or other peripherals....

Read definition →

Device Posture

Device posture is the assessed security condition of a device based on factors such as configuration, compliance, health, and management state....

Read definition →

Device Registration

Device registration is the process of enrolling a device with an identity or management system so it can be recognized and governed for access decisions....

Read definition →

Device Trust

Device trust is the confidence that a device meets defined security and management requirements before it is allowed to access protected resources....

Read definition →

Digital Signature

A digital signature is a cryptographic mechanism that proves a message or file came from the holder of a private key and was not altered afterward....

Read definition →

Directory Service

A directory service is a system that stores and organizes identity information such as users, groups, devices, and related access attributes....

Read definition →

Discoverable Credential

A discoverable credential is an authenticator-stored credential that can be found and used without the user first typing an account identifier in the traditional way....

Read definition →

Disk Encryption

Disk encryption is the encryption of an entire storage device or disk volume to protect data if the device is lost, stolen, or accessed offline....

Read definition →

DLL Hijacking

DLL hijacking is an attack technique where a program loads a malicious or unintended dynamic library instead of the legitimate one it expected....

Read definition →

Driver Signing

Driver signing is the use of digital signatures to verify that system drivers come from a trusted source and have not been tampered with....

Read definition →

Dual Control

Dual control is a security principle requiring two authorized people or two independent approvals for a sensitive action or access event....

Read definition →

E

Email OTP

Email OTP is an authentication method in which a one-time passcode is sent to the user’s email address for verification....

Read definition →

Email Security

Email security is the set of controls, policies, and practices used to protect email accounts, messages, and users from abuse, fraud, and compromise....

Read definition →

Encryption

Encryption is the process of converting readable data into protected ciphertext so only authorized parties can access it....

Read definition →

Endpoint Security

Endpoint security is the practice of protecting laptops, desktops, servers, mobile devices, and other endpoints from compromise and misuse....

Read definition →

Entitlement Creep

Entitlement creep is the gradual accumulation of permissions over time as users change roles, projects, or responsibilities without losing old access....

Read definition →

Entropy Source

An entropy source is the underlying source of randomness used to generate cryptographic keys, nonces, tokens, and other security-sensitive values....

Read definition →

Envelope Encryption

Envelope encryption is an encryption design in which data is encrypted with a data key, and that data key is then encrypted with a separate key-encryption key....

Read definition →

Espionage

Cyber espionage is the covert theft of sensitive information or intellectual property for political, military, or commercial advantage....

Read definition →

Evidence Preservation

Evidence preservation is the practice of protecting logs, files, system state, and other artifacts so they remain available and trustworthy for investigation....

Read definition →

Exception Management

Exception management is the process of reviewing, approving, documenting, and tracking deviations from security policies, standards, or required controls....

Read definition →

Exposure Management

Exposure management is the practice of identifying, understanding, prioritizing, and reducing the weaknesses and attack paths that create meaningful cyber risk....

Read definition →

Exposure Window

An exposure window is the period during which a vulnerability, misconfiguration, stolen credential, or other weakness remains exploitable....

Read definition →

External Identity

An external identity is an identity belonging to a person or entity outside the core workforce that is granted access to some organizational resource or service....

Read definition →

F

Federated Identity

Federated identity is an access model in which one trusted identity system can authenticate users for other connected applications or organizations....

Read definition →

Federated Logout

Federated logout is the process of ending a user’s authenticated session across one or more connected systems in a federated identity environment....

Read definition →

Federation

Federation is an identity and access model in which one trusted system authenticates users for access to another connected system....

Read definition →

Federation Trust

Federation trust is the established relationship that allows one identity or service system to accept assertions or tokens from another trusted system....

Read definition →

FIDO2

FIDO2 is a set of standards for strong authentication that supports phishing-resistant and passwordless login using public-key cryptography....

Read definition →

Firewall

A firewall is a security control that filters network traffic based on rules to allow safe communications and block suspicious activity....

Read definition →

Firmware Security

Firmware security is the protection of low-level device code that initializes and controls hardware before or beneath the operating system....

Read definition →

Forensic Imaging

Forensic imaging is the creation of an exact, verifiable copy of digital storage so evidence can be analyzed without altering the original source....

Read definition →

G

Geo-Velocity

Geo-velocity is the calculated speed implied by successive authentication events from different locations, used as a signal for suspicious activity....

Read definition →

Golden Image

A golden image is a preapproved, standardized system image used as a trusted starting point for deploying new devices, servers, or workloads....

Read definition →

GraphQL Security

GraphQL security is the set of controls used to protect GraphQL APIs from unauthorized access, excessive queries, data exposure, and abuse....

Read definition →

H

Hash Function

A hash function is a one-way cryptographic process that turns input data into a fixed-size digest used for integrity and related security purposes....

Read definition →

Honeypot

A honeypot is a decoy system, service, or resource designed to attract, detect, or study unauthorized access attempts....

Read definition →

HOTP

HOTP is a counter-based one-time password method that generates verification codes from a shared secret and an incrementing counter....

Read definition →

I

Identity Governance

Identity governance is the practice of overseeing how identities, roles, approvals, and access rights are assigned, reviewed, and managed across an organization....

Read definition →

Identity Hygiene

Identity hygiene is the ongoing practice of keeping identity systems, accounts, permissions, and authentication methods clean, current, and well controlled....

Read definition →

Identity Inventory

Identity inventory is the maintained record of user accounts, service accounts, roles, groups, tokens, and identity systems across an environment....

Read definition →

Immutable Backup

An immutable backup is a backup copy that cannot be altered or deleted for a defined period, even by administrators under normal conditions....

Read definition →

Impossible Travel

Impossible travel is a login anomaly in which a user appears to authenticate from distant locations within a time frame that is unrealistic for normal travel....

Read definition →

Incident Commander

An incident commander is the person responsible for directing, coordinating, and prioritizing response activities during a security incident....

Read definition →

Insider Threat

An insider threat is a security risk posed by someone with legitimate access to an organization's systems, data, or operations....

Read definition →

ISO 27001

ISO 27001 is an international standard for establishing, maintaining, and improving an information security management system (ISMS)....

Read definition →

Isolation Strategy

An isolation strategy is a planned approach for separating affected systems, identities, or services to contain malicious activity and reduce spread....

Read definition →

Issuing CA

An issuing CA is the certificate authority that directly signs and issues end-entity certificates to users, devices, or services....

Read definition →

J

JWKS

JWKS, or JSON Web Key Set, is a standardized format for publishing the public keys that services use to verify signed tokens....

Read definition →

JWT Validation

JWT validation is the process of verifying the integrity, issuer, audience, lifetime, and claims of a JSON Web Token before trusting it....

Read definition →

K

Key Ceremony

A key ceremony is a formal, controlled procedure for generating, activating, splitting, rotating, or retiring high-value cryptographic keys....

Read definition →

Key Compromise

Key compromise is the exposure, theft, misuse, or unauthorized control of a cryptographic key that should have remained trusted and secret....

Read definition →

Key Custodian

A key custodian is a person or role entrusted with part of the governance, access, or oversight for sensitive cryptographic keys....

Read definition →

Key Destruction

Key destruction is the permanent elimination of cryptographic key material so it can no longer be used to decrypt, sign, or authenticate....

Read definition →

Key Escrow

Key escrow is the practice of storing a recoverable copy or recovery path for cryptographic keys with a designated trusted authority or system....

Read definition →

Key Loading

Key loading is the act of placing cryptographic keys into a device, application, module, or operational environment for use....

Read definition →

Key Management

Key management is the creation, storage, distribution, use, rotation, and retirement of cryptographic keys throughout their lifecycle....

Read definition →

Key Recovery

Key recovery is the process of regaining access to cryptographic keys or the protected data they control after loss, corruption, or administrative need....

Read definition →

Key Rotation

Key rotation is the replacement of an active cryptographic key with a new key on a planned schedule or in response to risk....

Read definition →

Key Usage

Key usage is a certificate attribute that defines which cryptographic purposes a key is intended or permitted to support....

Read definition →

Key Wrapping

Key wrapping is the process of encrypting one cryptographic key with another key so it can be stored or transported more safely....

Read definition →

Keystore

A keystore is a protected storage location or container used to hold cryptographic keys, certificates, and related trust material....

Read definition →

Kill Chain Analysis

Kill chain analysis is the process of examining an attack through sequential stages to understand how the adversary gained access, moved, and achieved objectives....

Read definition →

Kubernetes Security

Kubernetes security is the practice of protecting clusters, control planes, workloads, identities, and configurations in Kubernetes environments....

Read definition →

L

Lateral Movement

Lateral movement is the process attackers use to move from one compromised system, account, or segment to other parts of an environment....

Read definition →

Lawful Basis

Lawful basis is the legal justification an organization relies on to process personal data under applicable privacy law....

Read definition →

Least Functionality

Least functionality is the security principle of enabling only the features, services, ports, software, and capabilities that are actually needed....

Read definition →

Least Privilege

Least privilege is the security principle of giving users, systems, and processes only the minimum access needed to perform their functions....

Read definition →

Load Balancer

A load balancer is a system that distributes traffic across multiple servers or services to improve performance, resilience, and availability....

Read definition →

Local Storage Security

Local storage security is the protection of data stored in browser local storage, especially when that data affects authentication or sensitive application state....

Read definition →

Log Management

Log management is the process of collecting, storing, organizing, and using system and application logs for security, operations, and investigation....

Read definition →

Login Reputation

Login reputation is the accumulated trust or suspicion associated with a login source, pattern, device, IP, or identity behavior over time....

Read definition →

M

Machine Certificate

A machine certificate is a digital certificate assigned to a device, server, or workload so that system can authenticate itself cryptographically....

Read definition →

Mailbox Delegation

Mailbox delegation is the granting of controlled access for one user or service to read, manage, or send from another mailbox under defined permissions....

Read definition →

Malvertising

Malvertising is the use of malicious online advertising to deliver scams, malware, redirects, or exploit content to users....

Read definition →

Malware

Malware is malicious software designed to damage systems, steal information, spy on users, or enable unauthorized access....

Read definition →

Malware Triage

Malware triage is the rapid initial assessment of a suspicious file or sample to determine likely risk, priority, and next investigative steps....

Read definition →

Managed Device

A managed device is an endpoint that is enrolled, configured, and monitored under an organization’s security and administration controls....

Read definition →

Measured Boot

Measured Boot is a startup security process that records measurements of boot components so the system can later prove what loaded during startup....

Read definition →

MFA Fatigue

MFA fatigue is an attack tactic that overwhelms a user with repeated authentication prompts in the hope they will eventually approve one....

Read definition →

Microsegmentation

Microsegmentation is a security approach that divides environments into smaller trust zones to limit lateral movement and reduce blast radius....

Read definition →

N

Name Constraints

Name constraints are certificate constraints that limit what subject names or identity namespaces a subordinate CA may issue certificates for....

Read definition →

Network Security

Network security is the collection of controls and practices used to protect networks and data in transit from unauthorized access or disruption....

Read definition →

Nonce

A nonce is a value intended to be used only once in a cryptographic or security-sensitive context....

Read definition →

Number Matching

Number matching is an MFA mechanism that requires the user to enter or select a displayed number to confirm they initiated the login request....

Read definition →

O

OAuth 2.0

OAuth 2.0 is a framework for delegated authorization that allows an application to access resources on behalf of a user or client without sharing the user’s password directl...

Read definition →

OAuth Consent Phishing

OAuth consent phishing is an attack in which a user is tricked into granting a malicious or deceptive application access to data or account capabilities through an authorizati...

Read definition →

OAuth Scope

An OAuth scope is a defined permission boundary that limits what actions or resources a delegated token or client may access....

Read definition →

OCSP Stapling

OCSP stapling is a method where a server provides recent certificate status information during the TLS handshake instead of making the client fetch it separately....

Read definition →

OpenID Connect (OIDC)

OpenID Connect (OIDC) is an identity layer built on OAuth 2.0 that enables applications to verify a user’s identity and obtain basic profile information....

Read definition →

P

Passkey

A passkey is a modern authentication credential that uses public-key cryptography to let users sign in without relying on a traditional password....

Read definition →

Password Blacklist

A password blacklist is a set of passwords that users are not allowed to choose because they are too common, too weak, or already known to attackers....

Read definition →

Password Manager

A password manager is a tool that stores, generates, and helps manage passwords and other secrets more securely than manual reuse or memory alone....

Read definition →

Password Policy

A password policy is a set of rules and standards that define how passwords should be created, used, protected, and changed within an organization....

Read definition →

Password Spraying

Password spraying is an attack in which a small number of common passwords are tried across many accounts to avoid lockouts and find weak credentials....

Read definition →

Patch Management

Patch management is the process of testing, deploying, and tracking software and system updates to reduce security and stability risk....

Read definition →

Phishing

Phishing is a social engineering attack that tricks users into revealing credentials, financial information, or other sensitive data....

Read definition →

PKCE

PKCE is an OAuth security extension that protects authorization code flows from interception by binding the code exchange to the original client....

Read definition →

Policy as Code

Policy as code is the practice of expressing governance and security rules in machine-readable form so they can be tested and enforced automatically....

Read definition →

Post-Exploitation

Post-exploitation refers to the actions an attacker takes after gaining initial access in order to expand control, gather data, persist, or achieve their objective....

Read definition →

Privacy by Design

Privacy by Design is the practice of building privacy considerations into products, systems, and processes from the start rather than as a late add-on....

Read definition →

Prompt Bombing

Prompt bombing is an attack in which repeated MFA push requests are sent to a user in hopes they will eventually approve one out of fatigue or confusion....

Read definition →

Pseudonymization

Pseudonymization is the replacement of direct identifiers with alternate values so data is less directly attributable to a person without additional information....

Read definition →

Public Key Pinning

Public key pinning is the practice of restricting trust to one or more expected public keys rather than trusting any key that chains to a broadly accepted issuer....

Read definition →

Purple Team Exercise

A purple team exercise is a collaborative security assessment where offensive and defensive teams work together to test and improve detection and response....

Read definition →

Purple Teaming

Purple teaming is a collaborative security practice in which offensive and defensive teams work together to test, observe, and improve detection and response....

Read definition →

Purpose Limitation

Purpose limitation is the principle that personal or sensitive data should be used only for specific, legitimate, and clearly defined purposes....

Read definition →

Push MFA

Push MFA is a multi-factor authentication method in which a user approves or denies a login request through a push notification on another device....

Read definition →

Q

R

Ransomware

Ransomware is a form of malware that encrypts or blocks access to systems and data until a victim pays for recovery....

Read definition →

Rate Limiting

Rate limiting is the practice of restricting how frequently a user, client, or system can make requests within a given period....

Read definition →

Reauthentication

Reauthentication is the requirement for a user to verify identity again after an earlier login, usually before a sensitive action or after risk changes....

Read definition →

Referrer Policy

Referrer policy is a browser control that determines how much referring URL information is sent along with navigation or resource requests....

Read definition →

Refresh Token

A refresh token is a credential used to obtain new access tokens without requiring the user or application to authenticate again each time....

Read definition →

Remembered Device

A remembered device is a device or browser context the system recognizes from prior successful use and may treat with lower-friction access controls....

Read definition →

Remote Attestation

Remote attestation is the process of proving device or platform state to another system using integrity evidence rather than mere self-assertion....

Read definition →

Remote Wipe

Remote wipe is the ability to erase some or all data from a device through a centralized management or response action....

Read definition →

Resource Server

A resource server is the API or service that hosts protected data or functions and enforces access based on presented tokens or credentials....

Read definition →

Restore Testing

Restore testing is the process of verifying that backup data can actually be recovered successfully into usable systems, files, or services....

Read definition →

Revocation Checking

Revocation checking is the process of determining whether a certificate that appears valid by date has been explicitly marked untrusted before expiration....

Read definition →

Right to Be Forgotten

The Right to Be Forgotten is a privacy right under certain legal frameworks that allows individuals to request deletion of personal data under defined conditions....

Read definition →

Risk Acceptance

Risk acceptance is the deliberate decision to tolerate a known security risk instead of fully remediating, transferring, or avoiding it....

Read definition →

Risk Assessment

A risk assessment is the process of identifying threats, vulnerabilities, likelihood, and business impact to prioritize security decisions....

Read definition →

Risk Engine

A risk engine is a system that evaluates signals and calculates risk levels to influence authentication, authorization, or fraud decisions....

Read definition →

Role Explosion

Role explosion is the excessive growth of roles in an access control system, making the role model difficult to manage, review, and govern....

Read definition →

Role Mining

Role mining is the analysis of existing access patterns to identify useful role structures and reduce ad hoc permission complexity....

Read definition →

Root Cause Analysis

Root cause analysis is the process of identifying the underlying technical, human, or process failures that allowed an incident or security issue to occur....

Read definition →

Root Detection

Root detection is the identification of devices whose operating-system protections have been bypassed to grant elevated or unrestricted control....

Read definition →

Root of Trust

A root of trust is the foundational trusted component or assumption that other security decisions and verification chains depend on....

Read definition →

Runtime Integrity

Runtime integrity is the assurance that code and process behavior remain trustworthy during execution rather than only at startup or install time....

Read definition →

S

SAML

SAML is a federation standard used to exchange authentication and authorization information between identity providers and service providers....

Read definition →

SAML Assertion

A SAML assertion is a signed statement from an identity provider that tells a service provider information about an authenticated user....

Read definition →

Sandbox Analysis

Sandbox analysis is the examination of suspicious files, links, or code inside an isolated environment to observe behavior without risking production systems....

Read definition →

SCIM Provisioning

SCIM provisioning is the automated creation, update, and removal of identities and groups between connected systems using the SCIM standard....

Read definition →

Scoped Token

A scoped token is an access token that grants only a defined subset of permissions or resource access rather than broad unrestricted use....

Read definition →

Secret Management

Secret management is the practice of securely storing, distributing, rotating, and governing sensitive values such as passwords, API keys, tokens, and certificates....

Read definition →

Secret Scanning

Secret scanning is the process of searching code, repositories, logs, files, and workflows for exposed passwords, API keys, tokens, and other sensitive credentials....

Read definition →

Secret Sharing

Secret sharing is a method of dividing a secret into multiple pieces so no single piece is sufficient by itself to reconstruct the full secret....

Read definition →

Secret Zero

Secret zero is the initial credential or trust mechanism needed to obtain other secrets securely in a system or automation workflow....

Read definition →

Secrets Management

Secrets management is the practice of securely storing, controlling, rotating, and using sensitive credentials such as API keys, tokens, and passwords....

Read definition →

Secrets Sprawl

Secrets sprawl is the uncontrolled spread of passwords, API keys, tokens, certificates, and other sensitive credentials across systems, code, documents, and user workflows....

Read definition →

Secure Boot

Secure Boot is a startup security mechanism that verifies whether boot components are signed and trusted before they are allowed to run....

Read definition →

Secure by Default

Secure by default means products, platforms, and systems should ship with baseline settings that reduce risk without requiring users to discover and enable protection on their...

Read definition →

Secure by Design

Secure by design is the principle of building products, systems, and architectures so security is part of the design from the start rather than bolted on later....

Read definition →

Secure Element

A secure element is a dedicated hardware component designed to store sensitive material and perform trusted operations in a highly isolated environment....

Read definition →

Secure Enclave

A secure enclave is an isolated hardware-backed environment used to protect sensitive operations and data such as cryptographic keys or biometric verification material....

Read definition →

Security Baseline

A security baseline is a defined set of minimum security settings and controls that systems, devices, or applications are expected to meet....

Read definition →

Security Champion

A security champion is a team member embedded in a business, engineering, or operations function who helps promote and reinforce security practices locally....

Read definition →

Security Data Lake

A security data lake is a centralized repository used to store large volumes of raw and processed security telemetry for analysis, investigation, and detection....

Read definition →

Security Debt

Security debt is the accumulated future risk and remediation burden created by postponed security work, weak design choices, or repeated short-term tradeoffs....

Read definition →

Security Key

A security key is a hardware authentication device used to prove identity through cryptographic operations rather than reusable shared secrets....

Read definition →

Service Account

A service account is a non-human account used by applications, services, scripts, or automated processes to authenticate and perform tasks....

Read definition →

Service Mesh Security

Service mesh security is the set of controls used to secure communication, identity, policy, and observability between services in a microservices environment....

Read definition →

Session Binding

Session binding is the practice of tying an authenticated session to expected attributes such as device, browser, network, or cryptographic context....

Read definition →

Session Continuity

Session continuity is the ability for an authenticated user or client to remain signed in and continue interacting without repeated full login prompts....

Read definition →

Session Cookie

A session cookie is a browser cookie used to maintain a user’s authenticated or active session state with a web application....

Read definition →

Session Fixation

Session fixation is an attack in which an attacker forces or predicts a session identifier and then waits for the victim to authenticate under that same session....

Read definition →

Session Impersonation

Session impersonation is the ability for an administrator or support workflow to assume or simulate a user session for troubleshooting or operational purposes....

Read definition →

Session Management

Session management is the set of controls used to create, maintain, protect, and end authenticated user sessions in applications and services....

Read definition →

Session Risk Scoring

Session risk scoring is the process of evaluating an active authenticated session for suspicious signals that may justify additional controls or termination....

Read definition →

Shadow API

A shadow API is an undocumented, unmanaged, forgotten, or poorly governed application interface that exists outside normal security visibility and control....

Read definition →

Shadow Identity

Shadow identity is an unmanaged or poorly governed account, identity, or access path that exists outside normal security visibility and control....

Read definition →

Signed Update

A signed update is a software or firmware update that includes a digital signature so the recipient can verify authenticity and integrity before installing it....

Read definition →

SMS OTP

SMS OTP is an authentication factor in which a one-time passcode is sent to the user by text message for verification....

Read definition →

SOC 2

SOC 2 is an attestation framework used to evaluate controls relevant to security, availability, processing integrity, confidentiality, and privacy....

Read definition →

Spam

Spam is unsolicited bulk messaging often used for advertising, fraud, phishing, and large-scale malicious delivery....

Read definition →

Split Knowledge

Split knowledge is a security principle where no single person knows or controls the full value of a sensitive secret or credential....

Read definition →

Spyware

Spyware is malware that secretly monitors users, gathers sensitive information, or tracks behavior without consent....

Read definition →

Step-Down Access

Step-down access is the reduction of privileges or session capability after a sensitive action, elevated state, or high-trust condition is no longer justified....

Read definition →

Stream Cipher

A stream cipher is a symmetric encryption method that encrypts data as a continuous stream rather than in fixed-size blocks....

Read definition →

Subordinate CA

A subordinate CA is a certificate authority that derives its trust from a higher certificate authority rather than acting as the ultimate root....

Read definition →

Supply Chain Integrity

Supply chain integrity is the assurance that software, hardware, firmware, or other delivered components have not been tampered with or substituted improperly....

Read definition →

Syncable Authenticator

A syncable authenticator is an authenticator model in which credentials can be securely synchronized across a user’s devices rather than remaining bound to only one device....

Read definition →

T

Tabletop Exercise

A tabletop exercise is a structured discussion-based simulation used to test how people, teams, and leaders would respond to a cybersecurity incident or crisis....

Read definition →

Tamper Protection

Tamper protection is a security control that helps prevent unauthorized users or malware from disabling, modifying, or weakening security protections....

Read definition →

Tenant Isolation

Tenant isolation is the separation of customer data, permissions, and operations so one tenant cannot access or affect another tenant’s environment....

Read definition →

Third-Party Risk

Third-party risk is the security, operational, and compliance exposure created by vendors, suppliers, contractors, and other outside relationships....

Read definition →

Threat Intelligence

Threat intelligence is collected and analyzed information about threats, threat actors, tactics, and indicators used to support better security decisions....

Read definition →

Threat Modeling

Threat modeling is the structured process of identifying how a system could be attacked, what matters most to protect, and which safeguards should be prioritized....

Read definition →

TLS Handshake

A TLS handshake is the exchange that establishes trust parameters, cryptographic choices, and session keys before protected communication begins....

Read definition →

Token Binding

Token binding is the practice of associating a token with a specific client or cryptographic context so the token is harder to reuse elsewhere....

Read definition →

Token Theft

Token theft is the unauthorized capture or reuse of authentication or session tokens that allow access to systems or applications....

Read definition →

Token Vault

A token vault is the protected system that stores the mapping between tokens and the original sensitive values they represent....

Read definition →

TOTP

TOTP is a time-based one-time password method that generates short-lived verification codes from a shared secret and the current time....

Read definition →

Transaction Signing

Transaction signing is the cryptographic confirmation of a specific transaction or action so the approval is bound to the exact details being authorized....

Read definition →

Trojan Horse

A trojan horse is malware that disguises itself as legitimate software or content so a victim will install or run it....

Read definition →

Trust Anchor

A trust anchor is the certificate or key material a relying system already trusts and uses as the starting point for validating certificate chains....

Read definition →

Trust Store

A trust store is the set of root certificates or trust anchors a system uses to decide which certificate chains it will accept....

Read definition →

Trusted Browser

A trusted browser is a browser context recognized by a system as meeting enough conditions to receive smoother or lower-friction access decisions....

Read definition →

Trusted Device

A trusted device is an endpoint that an organization recognizes as meeting the conditions required for higher-confidence access decisions....

Read definition →

U

V

Virus

A computer virus is a type of malware that attaches to files or programs and spreads when infected content is executed....

Read definition →

Vulnerability

A vulnerability is a weakness in software, hardware, configuration, or process that attackers can exploit to gain access or cause harm....

Read definition →

Vulnerability Scanning

Vulnerability scanning is the automated process of checking systems, applications, or environments for known weaknesses, missing patches, or insecure configurations....

Read definition →

W

Watering Hole Attack

A watering hole attack compromises or imitates a website that a target group is likely to visit so the attacker can infect, monitor, or exploit those visitors....

Read definition →

WebAuthn

WebAuthn is a web standard that enables browsers and applications to use public-key authenticators for strong user authentication....

Read definition →

Workload Identity

Workload identity is the mechanism by which an application, service, or compute workload proves its identity to access other systems securely....

Read definition →

Worm

A worm is self-replicating malware that spreads across devices or networks by exploiting vulnerabilities or weak security controls....

Read definition →

Z

Zero Trust

Zero Trust is a security model that assumes no user, device, or connection should be inherently trusted without continuous verification....

Read definition →

Zero-day

A zero-day vulnerability is a flaw that attackers can exploit before a vendor or defender has a reliable patch or mitigation in place....

Read definition →