Vordr CyberSecurity
Home
Verkada Store
Open Ticket
Login
Register
Categories
Glossary
Glossary
Decryption Key
95
Acceptable Interruption Window
116
Acceptable Use Policy
113
Access Control List ACL
92
Access Path
119
Access Point
120
Access Profile
110
Access Rights
101
Access Type
110
Account Management User
109
Accountability
89
Accounting Legend Code
103
Active Security Testing
125
Ad Hoc Netwrok
109
Administrative Safeguards
104
Advanced Encryption Standard AES
119
Advanced Penetration Testing
106
Advanced Persistent Threat APT
87
Adversary
104
Adware
102
Alert Situation
87
Alternate Facilities
76
Alternate Process
83
Analog
114
Anti Malware
82
Anti Virus Software
127
App Attack
120
Application Layer
78
Architecture
97
Asset
101
Asymmetric Key Public Key
105
Attack Mechanism
145
Attack Vector
114
Attack
111
Attentuation
111
Audit Trail
101
Authentication
104
Authenticity
100
Availability
114
Backdoor
104
Bandwidth
109
Banner Grabbing
104
Banner
88
Baseline Security
99
Bastion Host
105
Bastion
91
Behavioral Outcome
90
Biometrics
105
Bit Error Rate
94
Black Core
107
Blended Attack
105
Block Cipher Algorithm
108
Block Cipher
103
Botnet
110
Boundary
102
Bridge
111
Bring Your Own Device
68
Broadcast
100
Brute Force Attack
104
Brute Force
97
Buffer Overflow
117
Business Continuity Plan
104
Business Impact Analysis Assessment
103
Category
93
Central Services Node
77
Certificate Management
102
Certification Revocation List
64
Chain of Custody
136
Chain of Evidence
86
Challenge Response Protocol
105
Checksum
114
Chief Information Security Officer CISO
60
Chief Security Officer
115
Cipher Text
101
Cipher
138
Ciphony
95
Claimant
68
Cleartext
93
Cloud Computing
106
Cold Site
126
Collision
90
Common Access Card CAC
103
Common Attack Pattern Enumeration and Classification CAPEC
107
Compartmentalization
100
Compliance Documents
101
Compliance
97
Computer Emergency Response Team CERT
104
Computer Forensics
122
Confidentiality
67
Configuration Management
73
Consumerization
101
Containment
105
Content Filtering
107
Control
97
Countermeasure
91
Critical Infrastructure
87
Criticality Analysis
80
Criticality
94
Cross Site Scripting XSS
81
Cryptography
77
Cryptosystem
86
Cyber Security Architecture
91
Cyber Security
90
Cybercop
95
Cyber Espionage
91
Cyberwarfare
77
Data Asset
81
Data Classification
68
Data Custodian
82
Data Element
52
Data Encryption Standard
85
Data Flow Control
102
Data Leakage
75
Data Owner
93
Data Retention
107
Data Retention Device DTD
61
Database
84
Decentralization
77
Decryption Key
87
Decryption
87
Defense in Depth
94
Demilitarized Zone DMZ
83
Denial of Serve Attack DOS
91
Digital Certificate
89
Digital Evidence
115
Digital Forensics
81
Digital Signature
92
Disaster Recovery Plan DRP
57
Disaster
88
Discretionary Access Control
100
Disk Imaging
90
Distruption
87
Distributed Denial of Service DDOS
79
Domain Name System DNS Exfiltration
90
Domain Name Service DNS
101
Dual Use Certificate
59
Due Care
115
Due Diligence
93
Duplicate Digital Evidence
83
Dynamic Ports
93
Ecommerce
86
Egovernment
72
Easter Egg
90
Egress Filtering
74
Electronic Key Entry
57
Electronic Key Management System
76
Electronic Signature
72
Electronically Generated Key
93
Elliptical Curve Cryptography ECC
97
Embedded Cryptographic System
93
Embedded Cryptography
63
Encapsulation Security Payload
93
Encipher
73
Encryption Algorithm
55
Encryption Certificate
90
Encryption Key
90
Encryption
108
End Cryptographic Unit
74
End End Encryption
59
Enterprise Architecture
74
Enterprise Risk Management
77
Enterprise
95
Entrapment
73
Eradication
94
Ethernet
89
Event
87
Evidence
97
Exercise Key
80
Exploit Code
89
Exploit
55
Exploitable Channel
55
External Network
90
External Security Testing
80
Fail Safe
108
Fail Soft
97
Failover
118
False Positive
92
Federal Information System
88
File Encryption
77
Filename Anomaly
98
File Protection
81
File Security
63
File Transfer Protocol FTP
51
Fill Device
84
Firewall Control Proxy
90
Firewall
76
Firmware
94
Flaw Hypothesis Methodology
84
Flooding
86
Focused Testing
76
Forensic Copy
103
Forensic Examination
100
Forensic Specialist
91
Forensically Clean
107
Forensics
72
Forward Cipher
106
Freeware
87
Full Disk Encryption FDE
65
Gateway
86
Gethostbyaddr
70
Global Information Grid GIG
114
Global Information Infrastructure GII
106
GNU
116
Gnutella
95
Governance Risk Management and Compliance
77
Governance
89
Graduated Security
59
Group Authenticator
59
Guard System
76
Guessing Entropy
91
Guideline
80
Hacker
89
Handshaking Procedures
76
Hard Copy Key
59
Hardening
102
Hardware
66
Hardwired Key
84
Hash Based Message Authentication Code HMAC
89
Hash Function
99
Hash Functions
89
Hash Total
175
Hash Value
97
Hashing
76
High Assurance Guard HAG
83
High Availability
53
High Impact System
88
High Impact
92
Hijack Attack
86
Hijacking
102
Honeyclient
62
Honeymonkey
95
Honeypot
94
Hop
74
Host Based Intrustion Detection System HIDS
50
Host
91
Host Site
88
Hot Wash
96
Http Proxy
76
Https
81
Hub
117
Hybrid Attack
104
Hybrid Encyrption
99
Hybrid Security Control
88
Hyperlink
61
Hypertext Markup Language HTML
93
Hypertext Transfer Protocol HTTP
100
Identity
99
Incident Handling
98
Incident
50
Incremental Backups
93
Inetd
80
Inference Attack
69
Information Warfare
57
Ingress Filtering
72
Input Validation Attacks
93
Integrity Star Property
56
Integrity
89
Internet Control Message Protocol ICMP
57
Internet Engineering Task Force IETF
124
Internet Message Access Protocol IMAP
89
Internet Protocol IP
63
Internet Protocol Security IPSEC
90
Internet Protocol
97
Internet Standard
98
Internet
61
Interrupt
90
Intranet
94
Intrusion Detection ID
118
IP Flood
124
IP Forwarding
137
IP Spoofing
108
ISO
90
Issue Specific Policy
71
ItuT
115
Jitter
100
Jump Bag
82
Cybersecurity Definitions K
101
Kerberos
111
Kernel
93
Lattice Techniques
78
Layer 2 Forwarding Protocol L2F
86
Layer 2 Tunneling Protocol L2TP
90
Least Privilege
57
Legion
80
Lightweight Directory Access protocol LDAP
74
Link State
60
List Based Access Control
90
Loadable Kernel Modules LKM
83
Log Clipping
81
Logic Bombs
128
Logic Gate
76
Loopback Address
101
Cybersecurity Definitions M
93
Mac Address
104
Malicious Code
85
Malware
94
Mandatory Access Control MAC
82
Masquerade Attack
104
MD5
95
Measures of Effectiveness MOE
118
Monoculture
94
Morris Worm
88
Multicast
92
Multi Homed
80
Multiplexing
100
National Institute of Standards and Technology NIST
59
Natural Disaster
101
Netmask
77
Network Based IDS
80
Network Mapping
100
Network Taps
105
Non Printable Character
59
Non Repudiation
55
Null Session
95
Cybersecurity Definitions O
107
Octet
95
One Way Encryption
76
OSI Layers
110
OSI
109
Overload
205
Cybersecurity Definitions R
197
Cybersecurity Definitions U
160
Cybersecurity Definitions V
213
Cybersecurity Definitions Y
200
Glossary Popular Knowledge
Cybersecurity Definitions V
Overload
Cybersecurity Definitions Y
Cybersecurity Definitions R
Hash Total
** The time is base on America/Chicago timezone