Vordr CyberSecurity
Home
Verkada Store
Open Ticket
Login
Register
Categories
Glossary
Glossary
Decryption Key
94
Acceptable Interruption Window
116
Acceptable Use Policy
112
Access Control List ACL
92
Access Path
118
Access Point
119
Access Profile
109
Access Rights
101
Access Type
109
Account Management User
108
Accountability
88
Accounting Legend Code
102
Active Security Testing
124
Ad Hoc Netwrok
108
Administrative Safeguards
104
Advanced Encryption Standard AES
118
Advanced Penetration Testing
105
Advanced Persistent Threat APT
87
Adversary
103
Adware
101
Alert Situation
86
Alternate Facilities
76
Alternate Process
82
Analog
113
Anti Malware
82
Anti Virus Software
127
App Attack
119
Application Layer
77
Architecture
96
Asset
100
Asymmetric Key Public Key
104
Attack Mechanism
144
Attack Vector
113
Attack
110
Attentuation
110
Audit Trail
100
Authentication
103
Authenticity
100
Availability
114
Backdoor
104
Bandwidth
108
Banner Grabbing
104
Banner
88
Baseline Security
98
Bastion Host
104
Bastion
90
Behavioral Outcome
89
Biometrics
104
Bit Error Rate
93
Black Core
107
Blended Attack
104
Block Cipher Algorithm
108
Block Cipher
102
Botnet
109
Boundary
101
Bridge
110
Bring Your Own Device
67
Broadcast
99
Brute Force Attack
103
Brute Force
96
Buffer Overflow
116
Business Continuity Plan
104
Business Impact Analysis Assessment
103
Category
92
Central Services Node
76
Certificate Management
101
Certification Revocation List
63
Chain of Custody
135
Chain of Evidence
86
Challenge Response Protocol
104
Checksum
114
Chief Information Security Officer CISO
60
Chief Security Officer
115
Cipher Text
100
Cipher
137
Ciphony
94
Claimant
67
Cleartext
92
Cloud Computing
105
Cold Site
126
Collision
89
Common Access Card CAC
102
Common Attack Pattern Enumeration and Classification CAPEC
106
Compartmentalization
100
Compliance Documents
101
Compliance
97
Computer Emergency Response Team CERT
103
Computer Forensics
121
Confidentiality
67
Configuration Management
72
Consumerization
100
Containment
104
Content Filtering
106
Control
97
Countermeasure
90
Critical Infrastructure
87
Criticality Analysis
80
Criticality
94
Cross Site Scripting XSS
81
Cryptography
76
Cryptosystem
85
Cyber Security Architecture
91
Cyber Security
90
Cybercop
94
Cyber Espionage
91
Cyberwarfare
77
Data Asset
80
Data Classification
67
Data Custodian
82
Data Element
51
Data Encryption Standard
84
Data Flow Control
102
Data Leakage
75
Data Owner
92
Data Retention
106
Data Retention Device DTD
60
Database
84
Decentralization
76
Decryption Key
86
Decryption
86
Defense in Depth
93
Demilitarized Zone DMZ
82
Denial of Serve Attack DOS
90
Digital Certificate
88
Digital Evidence
114
Digital Forensics
80
Digital Signature
91
Disaster Recovery Plan DRP
57
Disaster
88
Discretionary Access Control
99
Disk Imaging
89
Distruption
87
Distributed Denial of Service DDOS
78
Domain Name System DNS Exfiltration
89
Domain Name Service DNS
101
Dual Use Certificate
58
Due Care
115
Due Diligence
93
Duplicate Digital Evidence
82
Dynamic Ports
93
Ecommerce
85
Egovernment
71
Easter Egg
90
Egress Filtering
73
Electronic Key Entry
57
Electronic Key Management System
75
Electronic Signature
71
Electronically Generated Key
92
Elliptical Curve Cryptography ECC
96
Embedded Cryptographic System
92
Embedded Cryptography
62
Encapsulation Security Payload
92
Encipher
72
Encryption Algorithm
54
Encryption Certificate
89
Encryption Key
89
Encryption
107
End Cryptographic Unit
73
End End Encryption
58
Enterprise Architecture
73
Enterprise Risk Management
77
Enterprise
94
Entrapment
73
Eradication
93
Ethernet
88
Event
86
Evidence
97
Exercise Key
79
Exploit Code
88
Exploit
54
Exploitable Channel
55
External Network
89
External Security Testing
79
Fail Safe
107
Fail Soft
96
Failover
117
False Positive
91
Federal Information System
87
File Encryption
76
Filename Anomaly
97
File Protection
80
File Security
62
File Transfer Protocol FTP
50
Fill Device
83
Firewall Control Proxy
89
Firewall
76
Firmware
93
Flaw Hypothesis Methodology
83
Flooding
86
Focused Testing
75
Forensic Copy
103
Forensic Examination
100
Forensic Specialist
91
Forensically Clean
106
Forensics
71
Forward Cipher
105
Freeware
87
Full Disk Encryption FDE
64
Gateway
85
Gethostbyaddr
69
Global Information Grid GIG
113
Global Information Infrastructure GII
105
GNU
115
Gnutella
94
Governance Risk Management and Compliance
77
Governance
89
Graduated Security
58
Group Authenticator
58
Guard System
75
Guessing Entropy
90
Guideline
79
Hacker
88
Handshaking Procedures
75
Hard Copy Key
58
Hardening
101
Hardware
65
Hardwired Key
83
Hash Based Message Authentication Code HMAC
88
Hash Function
98
Hash Functions
89
Hash Total
174
Hash Value
96
Hashing
75
High Assurance Guard HAG
83
High Availability
52
High Impact System
87
High Impact
92
Hijack Attack
86
Hijacking
101
Honeyclient
61
Honeymonkey
94
Honeypot
93
Hop
74
Host Based Intrustion Detection System HIDS
50
Host
90
Host Site
88
Hot Wash
95
Http Proxy
75
Https
81
Hub
116
Hybrid Attack
103
Hybrid Encyrption
99
Hybrid Security Control
87
Hyperlink
60
Hypertext Markup Language HTML
92
Hypertext Transfer Protocol HTTP
99
Identity
99
Incident Handling
97
Incident
50
Incremental Backups
92
Inetd
79
Inference Attack
69
Information Warfare
57
Ingress Filtering
71
Input Validation Attacks
92
Integrity Star Property
56
Integrity
88
Internet Control Message Protocol ICMP
56
Internet Engineering Task Force IETF
124
Internet Message Access Protocol IMAP
89
Internet Protocol IP
62
Internet Protocol Security IPSEC
90
Internet Protocol
96
Internet Standard
97
Internet
60
Interrupt
89
Intranet
93
Intrusion Detection ID
118
IP Flood
124
IP Forwarding
137
IP Spoofing
107
ISO
90
Issue Specific Policy
70
ItuT
114
Jitter
99
Jump Bag
82
Cybersecurity Definitions K
100
Kerberos
110
Kernel
92
Lattice Techniques
77
Layer 2 Forwarding Protocol L2F
86
Layer 2 Tunneling Protocol L2TP
89
Least Privilege
56
Legion
80
Lightweight Directory Access protocol LDAP
73
Link State
60
List Based Access Control
89
Loadable Kernel Modules LKM
82
Log Clipping
81
Logic Bombs
127
Logic Gate
75
Loopback Address
101
Cybersecurity Definitions M
92
Mac Address
103
Malicious Code
84
Malware
93
Mandatory Access Control MAC
81
Masquerade Attack
103
MD5
94
Measures of Effectiveness MOE
118
Monoculture
94
Morris Worm
88
Multicast
91
Multi Homed
80
Multiplexing
99
National Institute of Standards and Technology NIST
59
Natural Disaster
101
Netmask
77
Network Based IDS
79
Network Mapping
99
Network Taps
105
Non Printable Character
59
Non Repudiation
55
Null Session
94
Cybersecurity Definitions O
106
Octet
94
One Way Encryption
76
OSI Layers
110
OSI
109
Overload
204
Cybersecurity Definitions R
196
Cybersecurity Definitions U
159
Cybersecurity Definitions V
212
Cybersecurity Definitions Y
199
Glossary Popular Knowledge
Cybersecurity Definitions V
Overload
Cybersecurity Definitions Y
Cybersecurity Definitions R
Hash Total
** The time is base on America/Chicago timezone