Vordr CyberSecurity
Home
Verkada Store
Open Ticket
Login
Register
Categories
Glossary
Glossary
Decryption Key
64
Acceptable Interruption Window
87
Acceptable Use Policy
80
Access Control List ACL
64
Access Path
82
Access Point
79
Access Profile
75
Access Rights
72
Access Type
74
Account Management User
77
Accountability
63
Accounting Legend Code
74
Active Security Testing
92
Ad Hoc Netwrok
73
Administrative Safeguards
73
Advanced Encryption Standard AES
80
Advanced Penetration Testing
76
Advanced Persistent Threat APT
56
Adversary
76
Adware
72
Alert Situation
59
Alternate Facilities
47
Alternate Process
56
Analog
76
Anti Malware
54
Anti Virus Software
85
App Attack
83
Application Layer
57
Architecture
62
Asset
65
Asymmetric Key Public Key
78
Attack Mechanism
84
Attack Vector
81
Attack
79
Attentuation
79
Audit Trail
68
Authentication
69
Authenticity
67
Availability
76
Backdoor
70
Bandwidth
73
Banner Grabbing
69
Banner
59
Baseline Security
71
Bastion Host
72
Bastion
66
Behavioral Outcome
57
Biometrics
70
Bit Error Rate
65
Black Core
61
Blended Attack
73
Block Cipher Algorithm
73
Block Cipher
72
Botnet
72
Boundary
68
Bridge
80
Bring Your Own Device
45
Broadcast
62
Brute Force Attack
67
Brute Force
70
Buffer Overflow
82
Business Continuity Plan
75
Business Impact Analysis Assessment
67
Category
64
Central Services Node
50
Certificate Management
67
Certification Revocation List
41
Chain of Custody
84
Chain of Evidence
56
Challenge Response Protocol
66
Checksum
79
Chief Information Security Officer CISO
38
Chief Security Officer
71
Cipher Text
67
Cipher
87
Ciphony
68
Claimant
44
Cleartext
60
Cloud Computing
68
Cold Site
90
Collision
54
Common Access Card CAC
59
Common Attack Pattern Enumeration and Classification CAPEC
68
Compartmentalization
70
Compliance Documents
64
Compliance
67
Computer Emergency Response Team CERT
71
Computer Forensics
84
Confidentiality
45
Configuration Management
43
Consumerization
75
Containment
80
Content Filtering
70
Control
75
Countermeasure
60
Critical Infrastructure
70
Criticality Analysis
58
Criticality
72
Cross Site Scripting XSS
63
Cryptography
58
Cryptosystem
68
Cyber Security Architecture
71
Cyber Security
65
Cybercop
70
Cyber Espionage
71
Cyberwarfare
59
Data Asset
58
Data Classification
46
Data Custodian
67
Data Element
38
Data Encryption Standard
65
Data Flow Control
64
Data Leakage
54
Data Owner
72
Data Retention
75
Data Retention Device DTD
43
Database
64
Decentralization
56
Decryption Key
70
Decryption
69
Defense in Depth
74
Demilitarized Zone DMZ
58
Denial of Serve Attack DOS
71
Digital Certificate
68
Digital Evidence
78
Digital Forensics
65
Digital Signature
68
Disaster Recovery Plan DRP
43
Disaster
71
Discretionary Access Control
77
Disk Imaging
66
Distruption
68
Distributed Denial of Service DDOS
58
Domain Name System DNS Exfiltration
72
Domain Name Service DNS
72
Dual Use Certificate
44
Due Care
67
Due Diligence
71
Duplicate Digital Evidence
63
Dynamic Ports
68
Ecommerce
65
Egovernment
56
Easter Egg
65
Egress Filtering
58
Electronic Key Entry
42
Electronic Key Management System
60
Electronic Signature
54
Electronically Generated Key
67
Elliptical Curve Cryptography ECC
65
Embedded Cryptographic System
70
Embedded Cryptography
44
Encapsulation Security Payload
71
Encipher
52
Encryption Algorithm
37
Encryption Certificate
71
Encryption Key
66
Encryption
88
End Cryptographic Unit
50
End End Encryption
45
Enterprise Architecture
58
Enterprise Risk Management
55
Enterprise
70
Entrapment
57
Eradication
71
Ethernet
68
Event
67
Evidence
75
Exercise Key
55
Exploit Code
65
Exploit
44
Exploitable Channel
38
External Network
70
External Security Testing
59
Fail Safe
67
Fail Soft
75
Failover
86
False Positive
69
Federal Information System
63
File Encryption
57
Filename Anomaly
72
File Protection
59
File Security
49
File Transfer Protocol FTP
38
Fill Device
62
Firewall Control Proxy
74
Firewall
58
Firmware
66
Flaw Hypothesis Methodology
60
Flooding
66
Focused Testing
56
Forensic Copy
72
Forensic Examination
71
Forensic Specialist
67
Forensically Clean
78
Forensics
54
Forward Cipher
78
Freeware
69
Full Disk Encryption FDE
51
Gateway
64
Gethostbyaddr
55
Global Information Grid GIG
75
Global Information Infrastructure GII
63
GNU
76
Gnutella
69
Governance Risk Management and Compliance
59
Governance
67
Graduated Security
43
Group Authenticator
40
Guard System
56
Guessing Entropy
65
Guideline
60
Hacker
65
Handshaking Procedures
54
Hard Copy Key
43
Hardening
81
Hardware
49
Hardwired Key
58
Hash Based Message Authentication Code HMAC
65
Hash Function
74
Hash Functions
64
Hash Total
145
Hash Value
78
Hashing
58
High Assurance Guard HAG
57
High Availability
39
High Impact System
68
High Impact
69
Hijack Attack
61
Hijacking
80
Honeyclient
46
Honeymonkey
64
Honeypot
74
Hop
55
Host Based Intrustion Detection System HIDS
40
Host
66
Host Site
63
Hot Wash
67
Http Proxy
58
Https
59
Hub
81
Hybrid Attack
75
Hybrid Encyrption
76
Hybrid Security Control
64
Hyperlink
47
Hypertext Markup Language HTML
59
Hypertext Transfer Protocol HTTP
81
Identity
56
Incident Handling
77
Incident
40
Incremental Backups
70
Inetd
61
Inference Attack
51
Information Warfare
41
Ingress Filtering
54
Input Validation Attacks
67
Integrity Star Property
41
Integrity
67
Internet Control Message Protocol ICMP
43
Internet Engineering Task Force IETF
91
Internet Message Access Protocol IMAP
66
Internet Protocol IP
48
Internet Protocol Security IPSEC
69
Internet Protocol
74
Internet Standard
68
Internet
47
Interrupt
67
Intranet
71
Intrusion Detection ID
87
IP Flood
92
IP Forwarding
116
IP Spoofing
82
ISO
68
Issue Specific Policy
57
ItuT
76
Jitter
76
Jump Bag
62
Cybersecurity Definitions K
74
Kerberos
81
Kernel
65
Lattice Techniques
55
Layer 2 Forwarding Protocol L2F
66
Layer 2 Tunneling Protocol L2TP
67
Least Privilege
41
Legion
47
Lightweight Directory Access protocol LDAP
52
Link State
44
List Based Access Control
67
Loadable Kernel Modules LKM
59
Log Clipping
61
Logic Bombs
81
Logic Gate
56
Loopback Address
74
Cybersecurity Definitions M
71
Mac Address
77
Malicious Code
60
Malware
70
Mandatory Access Control MAC
60
Masquerade Attack
71
MD5
66
Measures of Effectiveness MOE
77
Monoculture
71
Morris Worm
63
Multicast
67
Multi Homed
64
Multiplexing
74
National Institute of Standards and Technology NIST
45
Natural Disaster
72
Netmask
55
Network Based IDS
60
Network Mapping
84
Network Taps
78
Non Printable Character
45
Non Repudiation
41
Null Session
74
Cybersecurity Definitions O
71
Octet
66
One Way Encryption
56
OSI Layers
81
OSI
77
Overload
140
Cybersecurity Definitions R
128
Cybersecurity Definitions U
99
Cybersecurity Definitions V
140
Cybersecurity Definitions Y
130
Glossary Popular Knowledge
Hash Total
Overload
Cybersecurity Definitions V
Cybersecurity Definitions Y
Cybersecurity Definitions R
** The time is base on America/Chicago timezone