Cybersecurity Encyclopedia

Browse CyberExperts' glossary of cybersecurity terms, threats, controls, and defensive concepts. This archive is designed to help readers quickly understand common security language and connect related topics across modern cyber risk, compliance, and incident response.

Use the search box or jump by letter to find definitions for topics like malware, phishing, supply chain attacks, cloud security, and defense-in-depth.

375 glossary entries Focused on practical cybersecurity language Useful for SMB buyers, practitioners, and learners

A

Access Control

Access control is the process of restricting who or what can view, use, or change systems, applications, data, and physical resources....

Read definition →

Access Package

An access package is a defined bundle of permissions, groups, or application access offered together for a particular user type, role, or purpose....

Read definition →

Access Review

An access review is a structured check of who has access to which systems, roles, or data and whether that access is still appropriate....

Read definition →

Access Risk Scoring

Access risk scoring is the evaluation of users, roles, entitlements, or sessions to estimate how much security risk a given access state creates....

Read definition →

Access Token

An access token is a credential issued after authentication that allows a user, application, or service to access specific resources for a limited time....

Read definition →

Account Recovery

Account recovery is the process used to restore account access when a user is locked out, loses a factor, or can no longer authenticate normally....

Read definition →

Admin Tiering

Admin tiering is the separation of administrative accounts, systems, and tasks into trust tiers to reduce privilege exposure and lateral compromise....

Read definition →

Administrative Unit

An administrative unit is a defined subset of users, groups, devices, or resources that can be managed separately within a broader identity or administrative system....

Read definition →

Adversary Emulation

Adversary emulation is a security testing approach that recreates the tactics, techniques, and procedures of real-world threat actors in a controlled way....

Read definition →

Adware

Adware is software that displays advertising, but some forms also track users, degrade privacy, or create security exposure....

Read definition →

Air Gap

An air gap is a security isolation approach in which a system or network is separated from untrusted or internet-connected environments to reduce exposure....

Read definition →

Alert Fatigue

Alert fatigue is the reduced effectiveness of analysts caused by large volumes of noisy, repetitive, or low-value security alerts....

Read definition →

Antimalware

Antimalware is security software designed to detect, block, quarantine, and remove malicious programs from devices and networks....

Read definition →

API Abuse

API abuse is the misuse of an application programming interface to extract data, automate attacks, bypass controls, or cause operational harm....

Read definition →

API Authentication

API authentication is the process of verifying the identity of a user, application, or service attempting to access an application programming interface....

Read definition →

API Discovery

API discovery is the process of identifying known, unknown, documented, and undocumented APIs across an organization’s environment....

Read definition →

API Schema Validation

API schema validation is the process of checking whether API requests and responses match the expected structure, types, and constraints defined by the service....

Read definition →

API Security

API security is the practice of protecting application programming interfaces from unauthorized access, abuse, data exposure, and logic flaws....

Read definition →

API Versioning

API versioning is the practice of managing changes to an API through distinct versions so clients can evolve without immediate breakage....

Read definition →

Asset Management

Asset management is the practice of identifying, tracking, and governing systems, devices, software, and data that an organization relies on....

Read definition →

Attack Path Analysis

Attack path analysis is the process of identifying how attackers could chain together identities, systems, privileges, and weaknesses to reach a high-value target....

Read definition →

Attack Surface

An attack surface is the total set of systems, services, identities, applications, and exposures that an attacker could potentially target....

Read definition →

Attack Vector

An attack vector is the path, method, or weakness an attacker uses to gain access, deliver malicious activity, or move toward a target....

Read definition →

Audit Logging

Audit logging is the recording of system, user, administrative, or application actions in a way that supports review, investigation, and accountability....

Read definition →

Audit Trail

An audit trail is a chronological record of actions, changes, or events that supports accountability, investigation, and review....

Read definition →

Authorization Code Flow

Authorization code flow is an OAuth pattern in which a client first receives an authorization code and then exchanges it for tokens through a back-channel request....

Read definition →

Authorization Server

An authorization server is the component that authenticates, evaluates consent or policy, and issues tokens to clients in OAuth or OIDC-based systems....

Read definition →

B

Backup Integrity

Backup integrity is the assurance that backup data is complete, uncorrupted, unmodified in unauthorized ways, and actually usable for recovery....

Read definition →

Banner Grabbing

Banner grabbing is the practice of collecting service and software details from exposed systems to support reconnaissance and assessment....

Read definition →

Behavioral Biometrics

Behavioral biometrics are patterns in how a person interacts with devices or systems that can be used as a signal for identity confidence or fraud detection....

Read definition →

Blast Radius

Blast radius is the scope of systems, identities, data, or operations that can be affected when a security control fails or an attacker gains access....

Read definition →

Botnet

A botnet is a network of compromised devices that attackers remotely control to launch coordinated malicious activity at scale....

Read definition →

Break Glass Account

A break glass account is an emergency-access account reserved for exceptional situations when normal administrative access is unavailable or unsuitable....

Read definition →

Break-Fix Access

Break-fix access is temporary elevated access granted to troubleshoot, repair, or restore a system during an operational issue or outage....

Read definition →

Browser Security

Browser security is the practice of protecting web browsers, browser data, and browsing activity from malicious content, abuse, and exploitation....

Read definition →

Bug Bounty Program

A bug bounty program is a security initiative that rewards eligible researchers for finding and responsibly reporting vulnerabilities in defined systems or applications....

Read definition →

Business Continuity

Business continuity is the capability to keep critical operations running during and after disruption through planning, resilience, and coordinated response....

Read definition →

Business Logic Flaw

A business logic flaw is a weakness in how an application’s intended workflow, rules, or decision logic can be manipulated to achieve unauthorized outcomes....

Read definition →

C

Canary Token

A canary token is a planted digital artifact designed to trigger an alert when someone accesses, moves, or uses it unexpectedly....

Read definition →

Case Management

Case management is the structured tracking of security investigations, incidents, tasks, evidence, ownership, and decisions from intake through closure....

Read definition →

Cloud Security

Cloud security refers to the controls, policies, and technologies used to protect data, workloads, and identities in cloud environments....

Read definition →

Code Signing

Code signing is the practice of digitally signing software, scripts, or binaries so recipients can verify the publisher and detect tampering....

Read definition →

Conditional Access

Conditional access is a policy-based identity control that allows, blocks, or limits access based on factors such as user, device, location, risk, or application context....

Read definition →

Container Security

Container security is the practice of protecting container images, runtimes, orchestration environments, and supporting pipelines from compromise and misuse....

Read definition →

Context-Aware Access

Context-aware access is an access control approach that evaluates signals such as user, device, location, risk, and behavior before allowing or limiting access....

Read definition →

Control Framework

A control framework is an organized set of control objectives, requirements, and practices used to structure security and risk management efforts....

Read definition →

Credential Hygiene

Credential hygiene is the practice of creating, storing, rotating, and protecting passwords, keys, and tokens in ways that reduce misuse and exposure....

Read definition →

Credential Rotation

Credential rotation is the process of replacing passwords, keys, tokens, certificates, or other secrets on a controlled schedule or after a risk event....

Read definition →

Cross-Tenant Access

Cross-tenant access is access granted from one organization’s identity environment into resources or applications hosted in another tenant or organizational boundary....

Read definition →

Cyber Hygiene

Cyber hygiene is the routine practice of maintaining systems, identities, devices, and user behavior in ways that reduce common security risks over time....

Read definition →

Cyber Resilience

Cyber resilience is the ability to prepare for, withstand, respond to, and recover from cyber incidents while keeping critical operations running....

Read definition →

Cyberattack

A cyberattack is a deliberate attempt to access, disrupt, damage, or misuse systems, networks, or digital information....

Read definition →

Cybersecurity

Cybersecurity is the practice of protecting systems, networks, applications, and data from unauthorized access, disruption, and digital attacks....

Read definition →

D

Data Breach

A data breach is an incident in which sensitive, confidential, or protected information is exposed, stolen, or accessed without authorization....

Read definition →

Data Classification

Data classification is the practice of labeling information by sensitivity, value, or handling requirements so it can be protected appropriately....

Read definition →

Data Exfiltration

Data exfiltration is the unauthorized movement or theft of data from a system, application, cloud environment, or organization-controlled network....

Read definition →

Data Governance

Data governance is the framework of policies, ownership, standards, and controls used to manage data quality, use, protection, and accountability....

Read definition →

Data Masking

Data masking is the practice of obscuring sensitive data so it remains useful for a limited purpose without exposing the original values fully....

Read definition →

Data Minimization

Data minimization is the practice of collecting, storing, sharing, and retaining only the data that is genuinely necessary for a defined purpose....

Read definition →

Data Retention

Data retention is the practice of keeping information for defined periods based on business, legal, operational, and security needs....

Read definition →

Data Tokenization

Data tokenization is the process of replacing a sensitive data value with a non-sensitive token that represents it without exposing the original value directly....

Read definition →

Delegated Access

Delegated access is a model in which one user, application, or service is granted permission to act on behalf of another within defined limits....

Read definition →

Deprecated Endpoint

A deprecated endpoint is an API route or interface that is still available but marked for retirement and no longer considered the preferred supported path....

Read definition →

Deprovisioning

Deprovisioning is the process of removing or disabling identities, accounts, credentials, and access when they are no longer needed....

Read definition →

Detection Coverage

Detection coverage is the extent to which a security program can identify relevant attacker behaviors, risks, and incident types across its environment....

Read definition →

Detection Engineering

Detection engineering is the practice of designing, testing, tuning, and maintaining security detections so meaningful attacker behavior can be identified with high confidence...

Read definition →

Detection Tuning

Detection tuning is the process of refining alerts, rules, thresholds, and logic so detections are more accurate, useful, and actionable....

Read definition →

Device Attestation

Device attestation is the process of verifying security-related claims about a device, such as hardware state, integrity, or management posture....

Read definition →

Device Code Flow

Device code flow is an OAuth pattern that lets devices with limited input capabilities obtain authorization through a separate trusted user device....

Read definition →

Device Compliance

Device compliance is the state in which an endpoint meets an organization’s defined security, configuration, and management requirements....

Read definition →

Device Posture

Device posture is the assessed security condition of a device based on factors such as configuration, compliance, health, and management state....

Read definition →

Device Registration

Device registration is the process of enrolling a device with an identity or management system so it can be recognized and governed for access decisions....

Read definition →

Device Trust

Device trust is the confidence that a device meets defined security and management requirements before it is allowed to access protected resources....

Read definition →

Directory Service

A directory service is a system that stores and organizes identity information such as users, groups, devices, and related access attributes....

Read definition →

E

Email Security

Email security is the set of controls, policies, and practices used to protect email accounts, messages, and users from abuse, fraud, and compromise....

Read definition →

Encryption

Encryption is the process of converting readable data into protected ciphertext so only authorized parties can access it....

Read definition →

Endpoint Security

Endpoint security is the practice of protecting laptops, desktops, servers, mobile devices, and other endpoints from compromise and misuse....

Read definition →

Entitlement Creep

Entitlement creep is the gradual accumulation of permissions over time as users change roles, projects, or responsibilities without losing old access....

Read definition →

Espionage

Cyber espionage is the covert theft of sensitive information or intellectual property for political, military, or commercial advantage....

Read definition →

Evidence Preservation

Evidence preservation is the practice of protecting logs, files, system state, and other artifacts so they remain available and trustworthy for investigation....

Read definition →

Exception Management

Exception management is the process of reviewing, approving, documenting, and tracking deviations from security policies, standards, or required controls....

Read definition →

Exposure Management

Exposure management is the practice of identifying, understanding, prioritizing, and reducing the weaknesses and attack paths that create meaningful cyber risk....

Read definition →

Exposure Window

An exposure window is the period during which a vulnerability, misconfiguration, stolen credential, or other weakness remains exploitable....

Read definition →

External Identity

An external identity is an identity belonging to a person or entity outside the core workforce that is granted access to some organizational resource or service....

Read definition →

F

Federated Identity

Federated identity is an access model in which one trusted identity system can authenticate users for other connected applications or organizations....

Read definition →

Federated Logout

Federated logout is the process of ending a user’s authenticated session across one or more connected systems in a federated identity environment....

Read definition →

Federation

Federation is an identity and access model in which one trusted system authenticates users for access to another connected system....

Read definition →

Federation Trust

Federation trust is the established relationship that allows one identity or service system to accept assertions or tokens from another trusted system....

Read definition →

Firewall

A firewall is a security control that filters network traffic based on rules to allow safe communications and block suspicious activity....

Read definition →

Forensic Imaging

Forensic imaging is the creation of an exact, verifiable copy of digital storage so evidence can be analyzed without altering the original source....

Read definition →

G

Geo-Velocity

Geo-velocity is the calculated speed implied by successive authentication events from different locations, used as a signal for suspicious activity....

Read definition →

Golden Image

A golden image is a preapproved, standardized system image used as a trusted starting point for deploying new devices, servers, or workloads....

Read definition →

GraphQL Security

GraphQL security is the set of controls used to protect GraphQL APIs from unauthorized access, excessive queries, data exposure, and abuse....

Read definition →

H

Honeypot

A honeypot is a decoy system, service, or resource designed to attract, detect, or study unauthorized access attempts....

Read definition →

I

Identity Governance

Identity governance is the practice of overseeing how identities, roles, approvals, and access rights are assigned, reviewed, and managed across an organization....

Read definition →

Identity Hygiene

Identity hygiene is the ongoing practice of keeping identity systems, accounts, permissions, and authentication methods clean, current, and well controlled....

Read definition →

Identity Inventory

Identity inventory is the maintained record of user accounts, service accounts, roles, groups, tokens, and identity systems across an environment....

Read definition →

Immutable Backup

An immutable backup is a backup copy that cannot be altered or deleted for a defined period, even by administrators under normal conditions....

Read definition →

Impossible Travel

Impossible travel is a login anomaly in which a user appears to authenticate from distant locations within a time frame that is unrealistic for normal travel....

Read definition →

Incident Commander

An incident commander is the person responsible for directing, coordinating, and prioritizing response activities during a security incident....

Read definition →

Insider Threat

An insider threat is a security risk posed by someone with legitimate access to an organization's systems, data, or operations....

Read definition →

ISO 27001

ISO 27001 is an international standard for establishing, maintaining, and improving an information security management system (ISMS)....

Read definition →

Isolation Strategy

An isolation strategy is a planned approach for separating affected systems, identities, or services to contain malicious activity and reduce spread....

Read definition →

J

JWKS

JWKS, or JSON Web Key Set, is a standardized format for publishing the public keys that services use to verify signed tokens....

Read definition →

JWT Validation

JWT validation is the process of verifying the integrity, issuer, audience, lifetime, and claims of a JSON Web Token before trusting it....

Read definition →

K

Kill Chain Analysis

Kill chain analysis is the process of examining an attack through sequential stages to understand how the adversary gained access, moved, and achieved objectives....

Read definition →

Kubernetes Security

Kubernetes security is the practice of protecting clusters, control planes, workloads, identities, and configurations in Kubernetes environments....

Read definition →

L

Lateral Movement

Lateral movement is the process attackers use to move from one compromised system, account, or segment to other parts of an environment....

Read definition →

Least Functionality

Least functionality is the security principle of enabling only the features, services, ports, software, and capabilities that are actually needed....

Read definition →

Least Privilege

Least privilege is the security principle of giving users, systems, and processes only the minimum access needed to perform their functions....

Read definition →

Load Balancer

A load balancer is a system that distributes traffic across multiple servers or services to improve performance, resilience, and availability....

Read definition →

Log Management

Log management is the process of collecting, storing, organizing, and using system and application logs for security, operations, and investigation....

Read definition →

M

Mailbox Delegation

Mailbox delegation is the granting of controlled access for one user or service to read, manage, or send from another mailbox under defined permissions....

Read definition →

Malvertising

Malvertising is the use of malicious online advertising to deliver scams, malware, redirects, or exploit content to users....

Read definition →

Malware

Malware is malicious software designed to damage systems, steal information, spy on users, or enable unauthorized access....

Read definition →

Malware Triage

Malware triage is the rapid initial assessment of a suspicious file or sample to determine likely risk, priority, and next investigative steps....

Read definition →

Managed Device

A managed device is an endpoint that is enrolled, configured, and monitored under an organization’s security and administration controls....

Read definition →

MFA Fatigue

MFA fatigue is an attack tactic that overwhelms a user with repeated authentication prompts in the hope they will eventually approve one....

Read definition →

Microsegmentation

Microsegmentation is a security approach that divides environments into smaller trust zones to limit lateral movement and reduce blast radius....

Read definition →

N

Network Security

Network security is the collection of controls and practices used to protect networks and data in transit from unauthorized access or disruption....

Read definition →

Number Matching

Number matching is an MFA mechanism that requires the user to enter or select a displayed number to confirm they initiated the login request....

Read definition →

O

OAuth 2.0

OAuth 2.0 is a framework for delegated authorization that allows an application to access resources on behalf of a user or client without sharing the user’s password directl...

Read definition →

OAuth Consent Phishing

OAuth consent phishing is an attack in which a user is tricked into granting a malicious or deceptive application access to data or account capabilities through an authorizati...

Read definition →

OAuth Scope

An OAuth scope is a defined permission boundary that limits what actions or resources a delegated token or client may access....

Read definition →

OpenID Connect (OIDC)

OpenID Connect (OIDC) is an identity layer built on OAuth 2.0 that enables applications to verify a user’s identity and obtain basic profile information....

Read definition →

P

Passkey

A passkey is a modern authentication credential that uses public-key cryptography to let users sign in without relying on a traditional password....

Read definition →

Password Blacklist

A password blacklist is a set of passwords that users are not allowed to choose because they are too common, too weak, or already known to attackers....

Read definition →

Password Manager

A password manager is a tool that stores, generates, and helps manage passwords and other secrets more securely than manual reuse or memory alone....

Read definition →

Password Policy

A password policy is a set of rules and standards that define how passwords should be created, used, protected, and changed within an organization....

Read definition →

Password Spraying

Password spraying is an attack in which a small number of common passwords are tried across many accounts to avoid lockouts and find weak credentials....

Read definition →

Patch Management

Patch management is the process of testing, deploying, and tracking software and system updates to reduce security and stability risk....

Read definition →

Phishing

Phishing is a social engineering attack that tricks users into revealing credentials, financial information, or other sensitive data....

Read definition →

PKCE

PKCE is an OAuth security extension that protects authorization code flows from interception by binding the code exchange to the original client....

Read definition →

Policy as Code

Policy as code is the practice of expressing governance and security rules in machine-readable form so they can be tested and enforced automatically....

Read definition →

Post-Exploitation

Post-exploitation refers to the actions an attacker takes after gaining initial access in order to expand control, gather data, persist, or achieve their objective....

Read definition →

Prompt Bombing

Prompt bombing is an attack in which repeated MFA push requests are sent to a user in hopes they will eventually approve one out of fatigue or confusion....

Read definition →

Purple Team Exercise

A purple team exercise is a collaborative security assessment where offensive and defensive teams work together to test and improve detection and response....

Read definition →

Purple Teaming

Purple teaming is a collaborative security practice in which offensive and defensive teams work together to test, observe, and improve detection and response....

Read definition →

R

Ransomware

Ransomware is a form of malware that encrypts or blocks access to systems and data until a victim pays for recovery....

Read definition →

Rate Limiting

Rate limiting is the practice of restricting how frequently a user, client, or system can make requests within a given period....

Read definition →

Refresh Token

A refresh token is a credential used to obtain new access tokens without requiring the user or application to authenticate again each time....

Read definition →

Resource Server

A resource server is the API or service that hosts protected data or functions and enforces access based on presented tokens or credentials....

Read definition →

Restore Testing

Restore testing is the process of verifying that backup data can actually be recovered successfully into usable systems, files, or services....

Read definition →

Risk Acceptance

Risk acceptance is the deliberate decision to tolerate a known security risk instead of fully remediating, transferring, or avoiding it....

Read definition →

Risk Assessment

A risk assessment is the process of identifying threats, vulnerabilities, likelihood, and business impact to prioritize security decisions....

Read definition →

Role Explosion

Role explosion is the excessive growth of roles in an access control system, making the role model difficult to manage, review, and govern....

Read definition →

Role Mining

Role mining is the analysis of existing access patterns to identify useful role structures and reduce ad hoc permission complexity....

Read definition →

Root Cause Analysis

Root cause analysis is the process of identifying the underlying technical, human, or process failures that allowed an incident or security issue to occur....

Read definition →

S

SAML

SAML is a federation standard used to exchange authentication and authorization information between identity providers and service providers....

Read definition →

SAML Assertion

A SAML assertion is a signed statement from an identity provider that tells a service provider information about an authenticated user....

Read definition →

Sandbox Analysis

Sandbox analysis is the examination of suspicious files, links, or code inside an isolated environment to observe behavior without risking production systems....

Read definition →

SCIM Provisioning

SCIM provisioning is the automated creation, update, and removal of identities and groups between connected systems using the SCIM standard....

Read definition →

Scoped Token

A scoped token is an access token that grants only a defined subset of permissions or resource access rather than broad unrestricted use....

Read definition →

Secret Scanning

Secret scanning is the process of searching code, repositories, logs, files, and workflows for exposed passwords, API keys, tokens, and other sensitive credentials....

Read definition →

Secret Zero

Secret zero is the initial credential or trust mechanism needed to obtain other secrets securely in a system or automation workflow....

Read definition →

Secrets Management

Secrets management is the practice of securely storing, controlling, rotating, and using sensitive credentials such as API keys, tokens, and passwords....

Read definition →

Secrets Sprawl

Secrets sprawl is the uncontrolled spread of passwords, API keys, tokens, certificates, and other sensitive credentials across systems, code, documents, and user workflows....

Read definition →

Secure by Default

Secure by default means products, platforms, and systems should ship with baseline settings that reduce risk without requiring users to discover and enable protection on their...

Read definition →

Secure by Design

Secure by design is the principle of building products, systems, and architectures so security is part of the design from the start rather than bolted on later....

Read definition →

Security Baseline

A security baseline is a defined set of minimum security settings and controls that systems, devices, or applications are expected to meet....

Read definition →

Security Champion

A security champion is a team member embedded in a business, engineering, or operations function who helps promote and reinforce security practices locally....

Read definition →

Security Data Lake

A security data lake is a centralized repository used to store large volumes of raw and processed security telemetry for analysis, investigation, and detection....

Read definition →

Security Debt

Security debt is the accumulated future risk and remediation burden created by postponed security work, weak design choices, or repeated short-term tradeoffs....

Read definition →

Service Account

A service account is a non-human account used by applications, services, scripts, or automated processes to authenticate and perform tasks....

Read definition →

Service Mesh Security

Service mesh security is the set of controls used to secure communication, identity, policy, and observability between services in a microservices environment....

Read definition →

Session Binding

Session binding is the practice of tying an authenticated session to expected attributes such as device, browser, network, or cryptographic context....

Read definition →

Session Impersonation

Session impersonation is the ability for an administrator or support workflow to assume or simulate a user session for troubleshooting or operational purposes....

Read definition →

Session Management

Session management is the set of controls used to create, maintain, protect, and end authenticated user sessions in applications and services....

Read definition →

Session Risk Scoring

Session risk scoring is the process of evaluating an active authenticated session for suspicious signals that may justify additional controls or termination....

Read definition →

Shadow API

A shadow API is an undocumented, unmanaged, forgotten, or poorly governed application interface that exists outside normal security visibility and control....

Read definition →

Shadow Identity

Shadow identity is an unmanaged or poorly governed account, identity, or access path that exists outside normal security visibility and control....

Read definition →

SOC 2

SOC 2 is an attestation framework used to evaluate controls relevant to security, availability, processing integrity, confidentiality, and privacy....

Read definition →

Spam

Spam is unsolicited bulk messaging often used for advertising, fraud, phishing, and large-scale malicious delivery....

Read definition →

Spyware

Spyware is malware that secretly monitors users, gathers sensitive information, or tracks behavior without consent....

Read definition →

T

Tabletop Exercise

A tabletop exercise is a structured discussion-based simulation used to test how people, teams, and leaders would respond to a cybersecurity incident or crisis....

Read definition →

Tamper Protection

Tamper protection is a security control that helps prevent unauthorized users or malware from disabling, modifying, or weakening security protections....

Read definition →

Tenant Isolation

Tenant isolation is the separation of customer data, permissions, and operations so one tenant cannot access or affect another tenant’s environment....

Read definition →

Third-Party Risk

Third-party risk is the security, operational, and compliance exposure created by vendors, suppliers, contractors, and other outside relationships....

Read definition →

Threat Intelligence

Threat intelligence is collected and analyzed information about threats, threat actors, tactics, and indicators used to support better security decisions....

Read definition →

Threat Modeling

Threat modeling is the structured process of identifying how a system could be attacked, what matters most to protect, and which safeguards should be prioritized....

Read definition →

Token Binding

Token binding is the practice of associating a token with a specific client or cryptographic context so the token is harder to reuse elsewhere....

Read definition →

Token Theft

Token theft is the unauthorized capture or reuse of authentication or session tokens that allow access to systems or applications....

Read definition →

Trojan Horse

A trojan horse is malware that disguises itself as legitimate software or content so a victim will install or run it....

Read definition →

Trusted Device

A trusted device is an endpoint that an organization recognizes as meeting the conditions required for higher-confidence access decisions....

Read definition →

U

V

Virus

A computer virus is a type of malware that attaches to files or programs and spreads when infected content is executed....

Read definition →

Vulnerability

A vulnerability is a weakness in software, hardware, configuration, or process that attackers can exploit to gain access or cause harm....

Read definition →

Vulnerability Scanning

Vulnerability scanning is the automated process of checking systems, applications, or environments for known weaknesses, missing patches, or insecure configurations....

Read definition →

W

Watering Hole Attack

A watering hole attack compromises or imitates a website that a target group is likely to visit so the attacker can infect, monitor, or exploit those visitors....

Read definition →

Workload Identity

Workload identity is the mechanism by which an application, service, or compute workload proves its identity to access other systems securely....

Read definition →

Worm

A worm is self-replicating malware that spreads across devices or networks by exploiting vulnerabilities or weak security controls....

Read definition →

Z

Zero Trust

Zero Trust is a security model that assumes no user, device, or connection should be inherently trusted without continuous verification....

Read definition →

Zero-day

A zero-day vulnerability is a flaw that attackers can exploit before a vendor or defender has a reliable patch or mitigation in place....

Read definition →