Vordr CyberSecurity
Home
Verkada Store
Open Ticket
Login
Register
Categories
Glossary
Glossary
Decryption Key
65
Acceptable Interruption Window
88
Acceptable Use Policy
81
Access Control List ACL
65
Access Path
83
Access Point
80
Access Profile
76
Access Rights
73
Access Type
75
Account Management User
78
Accountability
64
Accounting Legend Code
75
Active Security Testing
93
Ad Hoc Netwrok
74
Administrative Safeguards
74
Advanced Encryption Standard AES
81
Advanced Penetration Testing
77
Advanced Persistent Threat APT
57
Adversary
77
Adware
73
Alert Situation
60
Alternate Facilities
48
Alternate Process
57
Analog
77
Anti Malware
55
Anti Virus Software
86
App Attack
84
Application Layer
58
Architecture
63
Asset
66
Asymmetric Key Public Key
79
Attack Mechanism
85
Attack Vector
82
Attack
80
Attentuation
80
Audit Trail
69
Authentication
70
Authenticity
68
Availability
77
Backdoor
71
Bandwidth
74
Banner Grabbing
70
Banner
60
Baseline Security
72
Bastion Host
73
Bastion
67
Behavioral Outcome
58
Biometrics
71
Bit Error Rate
66
Black Core
62
Blended Attack
74
Block Cipher Algorithm
74
Block Cipher
73
Botnet
74
Boundary
69
Bridge
81
Bring Your Own Device
46
Broadcast
63
Brute Force Attack
68
Brute Force
71
Buffer Overflow
83
Business Continuity Plan
76
Business Impact Analysis Assessment
68
Category
65
Central Services Node
51
Certificate Management
68
Certification Revocation List
42
Chain of Custody
85
Chain of Evidence
57
Challenge Response Protocol
67
Checksum
80
Chief Information Security Officer CISO
39
Chief Security Officer
72
Cipher Text
68
Cipher
88
Ciphony
69
Claimant
45
Cleartext
61
Cloud Computing
69
Cold Site
91
Collision
55
Common Access Card CAC
60
Common Attack Pattern Enumeration and Classification CAPEC
69
Compartmentalization
71
Compliance Documents
65
Compliance
68
Computer Emergency Response Team CERT
72
Computer Forensics
85
Confidentiality
46
Configuration Management
44
Consumerization
76
Containment
81
Content Filtering
71
Control
75
Countermeasure
61
Critical Infrastructure
71
Criticality Analysis
59
Criticality
73
Cross Site Scripting XSS
63
Cryptography
59
Cryptosystem
69
Cyber Security Architecture
72
Cyber Security
66
Cybercop
71
Cyber Espionage
72
Cyberwarfare
60
Data Asset
59
Data Classification
47
Data Custodian
68
Data Element
39
Data Encryption Standard
66
Data Flow Control
65
Data Leakage
55
Data Owner
73
Data Retention
75
Data Retention Device DTD
44
Database
65
Decentralization
57
Decryption Key
71
Decryption
70
Defense in Depth
75
Demilitarized Zone DMZ
59
Denial of Serve Attack DOS
72
Digital Certificate
69
Digital Evidence
79
Digital Forensics
66
Digital Signature
69
Disaster Recovery Plan DRP
44
Disaster
72
Discretionary Access Control
78
Disk Imaging
67
Distruption
69
Distributed Denial of Service DDOS
59
Domain Name System DNS Exfiltration
73
Domain Name Service DNS
73
Dual Use Certificate
45
Due Care
68
Due Diligence
72
Duplicate Digital Evidence
64
Dynamic Ports
69
Ecommerce
66
Egovernment
57
Easter Egg
66
Egress Filtering
59
Electronic Key Entry
43
Electronic Key Management System
61
Electronic Signature
55
Electronically Generated Key
68
Elliptical Curve Cryptography ECC
66
Embedded Cryptographic System
71
Embedded Cryptography
45
Encapsulation Security Payload
72
Encipher
53
Encryption Algorithm
38
Encryption Certificate
72
Encryption Key
67
Encryption
89
End Cryptographic Unit
51
End End Encryption
46
Enterprise Architecture
60
Enterprise Risk Management
56
Enterprise
71
Entrapment
58
Eradication
72
Ethernet
69
Event
68
Evidence
76
Exercise Key
56
Exploit Code
66
Exploit
45
Exploitable Channel
39
External Network
71
External Security Testing
60
Fail Safe
68
Fail Soft
75
Failover
87
False Positive
70
Federal Information System
64
File Encryption
58
Filename Anomaly
73
File Protection
60
File Security
50
File Transfer Protocol FTP
39
Fill Device
63
Firewall Control Proxy
75
Firewall
59
Firmware
67
Flaw Hypothesis Methodology
61
Flooding
67
Focused Testing
57
Forensic Copy
73
Forensic Examination
72
Forensic Specialist
68
Forensically Clean
79
Forensics
55
Forward Cipher
79
Freeware
70
Full Disk Encryption FDE
52
Gateway
65
Gethostbyaddr
56
Global Information Grid GIG
76
Global Information Infrastructure GII
64
GNU
77
Gnutella
70
Governance Risk Management and Compliance
60
Governance
68
Graduated Security
44
Group Authenticator
41
Guard System
57
Guessing Entropy
66
Guideline
61
Hacker
66
Handshaking Procedures
55
Hard Copy Key
44
Hardening
82
Hardware
50
Hardwired Key
59
Hash Based Message Authentication Code HMAC
66
Hash Function
75
Hash Functions
64
Hash Total
146
Hash Value
79
Hashing
59
High Assurance Guard HAG
58
High Availability
40
High Impact System
69
High Impact
70
Hijack Attack
63
Hijacking
81
Honeyclient
47
Honeymonkey
65
Honeypot
74
Hop
56
Host Based Intrustion Detection System HIDS
41
Host
67
Host Site
64
Hot Wash
68
Http Proxy
59
Https
60
Hub
82
Hybrid Attack
76
Hybrid Encyrption
77
Hybrid Security Control
65
Hyperlink
48
Hypertext Markup Language HTML
59
Hypertext Transfer Protocol HTTP
82
Identity
57
Incident Handling
78
Incident
41
Incremental Backups
71
Inetd
62
Inference Attack
52
Information Warfare
42
Ingress Filtering
55
Input Validation Attacks
68
Integrity Star Property
42
Integrity
68
Internet Control Message Protocol ICMP
44
Internet Engineering Task Force IETF
91
Internet Message Access Protocol IMAP
67
Internet Protocol IP
49
Internet Protocol Security IPSEC
70
Internet Protocol
75
Internet Standard
69
Internet
48
Interrupt
67
Intranet
72
Intrusion Detection ID
88
IP Flood
93
IP Forwarding
117
IP Spoofing
83
ISO
69
Issue Specific Policy
58
ItuT
77
Jitter
77
Jump Bag
63
Cybersecurity Definitions K
75
Kerberos
82
Kernel
66
Lattice Techniques
56
Layer 2 Forwarding Protocol L2F
66
Layer 2 Tunneling Protocol L2TP
68
Least Privilege
42
Legion
48
Lightweight Directory Access protocol LDAP
53
Link State
45
List Based Access Control
68
Loadable Kernel Modules LKM
60
Log Clipping
62
Logic Bombs
82
Logic Gate
57
Loopback Address
75
Cybersecurity Definitions M
72
Mac Address
78
Malicious Code
61
Malware
71
Mandatory Access Control MAC
61
Masquerade Attack
72
MD5
67
Measures of Effectiveness MOE
77
Monoculture
72
Morris Worm
64
Multicast
68
Multi Homed
65
Multiplexing
75
National Institute of Standards and Technology NIST
46
Natural Disaster
73
Netmask
55
Network Based IDS
61
Network Mapping
85
Network Taps
79
Non Printable Character
46
Non Repudiation
42
Null Session
75
Cybersecurity Definitions O
72
Octet
67
One Way Encryption
57
OSI Layers
82
OSI
78
Overload
140
Cybersecurity Definitions R
129
Cybersecurity Definitions U
99
Cybersecurity Definitions V
141
Cybersecurity Definitions Y
130
Glossary Popular Knowledge
Hash Total
Cybersecurity Definitions V
Overload
Cybersecurity Definitions Y
Cybersecurity Definitions R
** The time is base on America/Chicago timezone