Vordr CyberSecurity
Home
Verkada Store
Open Ticket
Login
Register
Categories
Glossary
Glossary
Decryption Key
80
Acceptable Interruption Window
109
Acceptable Use Policy
100
Access Control List ACL
82
Access Path
105
Access Point
102
Access Profile
95
Access Rights
89
Access Type
94
Account Management User
97
Accountability
79
Accounting Legend Code
91
Active Security Testing
110
Ad Hoc Netwrok
96
Administrative Safeguards
92
Advanced Encryption Standard AES
104
Advanced Penetration Testing
92
Advanced Persistent Threat APT
71
Adversary
94
Adware
92
Alert Situation
74
Alternate Facilities
66
Alternate Process
70
Analog
103
Anti Malware
71
Anti Virus Software
114
App Attack
106
Application Layer
67
Architecture
85
Asset
88
Asymmetric Key Public Key
95
Attack Mechanism
110
Attack Vector
100
Attack
101
Attentuation
100
Audit Trail
91
Authentication
93
Authenticity
87
Availability
96
Backdoor
92
Bandwidth
94
Banner Grabbing
93
Banner
78
Baseline Security
88
Bastion Host
94
Bastion
81
Behavioral Outcome
77
Biometrics
94
Bit Error Rate
84
Black Core
78
Blended Attack
90
Block Cipher Algorithm
95
Block Cipher
94
Botnet
97
Boundary
89
Bridge
101
Bring Your Own Device
61
Broadcast
84
Brute Force Attack
89
Brute Force
87
Buffer Overflow
106
Business Continuity Plan
90
Business Impact Analysis Assessment
94
Category
80
Central Services Node
65
Certificate Management
92
Certification Revocation List
55
Chain of Custody
126
Chain of Evidence
75
Challenge Response Protocol
93
Checksum
99
Chief Information Security Officer CISO
51
Chief Security Officer
99
Cipher Text
89
Cipher
119
Ciphony
82
Claimant
58
Cleartext
80
Cloud Computing
97
Cold Site
116
Collision
80
Common Access Card CAC
77
Common Attack Pattern Enumeration and Classification CAPEC
94
Compartmentalization
92
Compliance Documents
89
Compliance
87
Computer Emergency Response Team CERT
88
Computer Forensics
110
Confidentiality
60
Configuration Management
60
Consumerization
95
Containment
99
Content Filtering
102
Control
89
Countermeasure
84
Critical Infrastructure
82
Criticality Analysis
73
Criticality
87
Cross Site Scripting XSS
75
Cryptography
71
Cryptosystem
80
Cyber Security Architecture
84
Cyber Security
84
Cybercop
88
Cyber Espionage
85
Cyberwarfare
72
Data Asset
75
Data Classification
62
Data Custodian
77
Data Element
47
Data Encryption Standard
78
Data Flow Control
93
Data Leakage
69
Data Owner
88
Data Retention
90
Data Retention Device DTD
56
Database
77
Decentralization
71
Decryption Key
80
Decryption
81
Defense in Depth
88
Demilitarized Zone DMZ
74
Denial of Serve Attack DOS
85
Digital Certificate
83
Digital Evidence
108
Digital Forensics
75
Digital Signature
85
Disaster Recovery Plan DRP
53
Disaster
84
Discretionary Access Control
93
Disk Imaging
83
Distruption
82
Distributed Denial of Service DDOS
71
Domain Name System DNS Exfiltration
84
Domain Name Service DNS
95
Dual Use Certificate
54
Due Care
88
Due Diligence
87
Duplicate Digital Evidence
77
Dynamic Ports
87
Ecommerce
80
Egovernment
67
Easter Egg
79
Egress Filtering
68
Electronic Key Entry
53
Electronic Key Management System
70
Electronic Signature
66
Electronically Generated Key
87
Elliptical Curve Cryptography ECC
87
Embedded Cryptographic System
86
Embedded Cryptography
57
Encapsulation Security Payload
87
Encipher
65
Encryption Algorithm
47
Encryption Certificate
83
Encryption Key
83
Encryption
102
End Cryptographic Unit
67
End End Encryption
55
Enterprise Architecture
66
Enterprise Risk Management
70
Enterprise
87
Entrapment
67
Eradication
88
Ethernet
83
Event
82
Evidence
93
Exercise Key
72
Exploit Code
83
Exploit
50
Exploitable Channel
50
External Network
83
External Security Testing
73
Fail Safe
100
Fail Soft
91
Failover
113
False Positive
85
Federal Information System
75
File Encryption
70
Filename Anomaly
91
File Protection
76
File Security
58
File Transfer Protocol FTP
46
Fill Device
78
Firewall Control Proxy
83
Firewall
72
Firmware
86
Flaw Hypothesis Methodology
78
Flooding
81
Focused Testing
71
Forensic Copy
98
Forensic Examination
86
Forensic Specialist
85
Forensically Clean
101
Forensics
66
Forward Cipher
98
Freeware
81
Full Disk Encryption FDE
60
Gateway
81
Gethostbyaddr
64
Global Information Grid GIG
94
Global Information Infrastructure GII
78
GNU
99
Gnutella
89
Governance Risk Management and Compliance
74
Governance
84
Graduated Security
54
Group Authenticator
53
Guard System
70
Guessing Entropy
85
Guideline
75
Hacker
80
Handshaking Procedures
71
Hard Copy Key
54
Hardening
94
Hardware
60
Hardwired Key
77
Hash Based Message Authentication Code HMAC
82
Hash Function
90
Hash Functions
84
Hash Total
163
Hash Value
91
Hashing
69
High Assurance Guard HAG
73
High Availability
49
High Impact System
78
High Impact
88
Hijack Attack
80
Hijacking
96
Honeyclient
56
Honeymonkey
88
Honeypot
88
Hop
69
Host Based Intrustion Detection System HIDS
46
Host
85
Host Site
79
Hot Wash
83
Http Proxy
70
Https
74
Hub
95
Hybrid Attack
98
Hybrid Encyrption
94
Hybrid Security Control
81
Hyperlink
56
Hypertext Markup Language HTML
78
Hypertext Transfer Protocol HTTP
94
Identity
74
Incident Handling
91
Incident
46
Incremental Backups
86
Inetd
75
Inference Attack
64
Information Warfare
52
Ingress Filtering
65
Input Validation Attacks
86
Integrity Star Property
52
Integrity
83
Internet Control Message Protocol ICMP
53
Internet Engineering Task Force IETF
117
Internet Message Access Protocol IMAP
82
Internet Protocol IP
58
Internet Protocol Security IPSEC
85
Internet Protocol
89
Internet Standard
93
Internet
57
Interrupt
84
Intranet
89
Intrusion Detection ID
113
IP Flood
112
IP Forwarding
131
IP Spoofing
103
ISO
84
Issue Specific Policy
65
ItuT
95
Jitter
94
Jump Bag
77
Cybersecurity Definitions K
95
Kerberos
98
Kernel
86
Lattice Techniques
72
Layer 2 Forwarding Protocol L2F
81
Layer 2 Tunneling Protocol L2TP
83
Least Privilege
52
Legion
64
Lightweight Directory Access protocol LDAP
65
Link State
54
List Based Access Control
80
Loadable Kernel Modules LKM
78
Log Clipping
76
Logic Bombs
110
Logic Gate
70
Loopback Address
90
Cybersecurity Definitions M
88
Mac Address
98
Malicious Code
79
Malware
88
Mandatory Access Control MAC
76
Masquerade Attack
89
MD5
87
Measures of Effectiveness MOE
94
Monoculture
89
Morris Worm
82
Multicast
86
Multi Homed
74
Multiplexing
91
National Institute of Standards and Technology NIST
55
Natural Disaster
88
Netmask
70
Network Based IDS
75
Network Mapping
94
Network Taps
97
Non Printable Character
56
Non Repudiation
51
Null Session
89
Cybersecurity Definitions O
97
Octet
89
One Way Encryption
67
OSI Layers
98
OSI
103
Overload
173
Cybersecurity Definitions R
169
Cybersecurity Definitions U
128
Cybersecurity Definitions V
182
Cybersecurity Definitions Y
169
Glossary Popular Knowledge
Cybersecurity Definitions V
Overload
Cybersecurity Definitions R
Cybersecurity Definitions Y
Hash Total
** The time is base on America/Chicago timezone