| cybersecurity | |
| phishing | |
| malware | |
| ransomware | |
| zero-day | |
| exploit | |
| vulnerability | |
| threat actor | |
| social engineering | |
| DDoS | |
| endpoint security | |
| firewall | |
| encryption | |
| authentication | |
| penetration testing | |
| threat intelligence | |
| compliance | |
| zero trust | |
| multi-factor authentication (MFA) | |
| incident response | |
| patch management | |
| rootkit | |
| spyware | |
| adware | |
| trojan | |
| worm | |
| virus | |
| botnet | |
| brute force attack | |
| man-in-the-middle (MitM) attack | |
| SQL injection | |
| cross-site scripting (XSS) | |
| denial of service (DoS) | |
| distributed denial of service (DDoS) | |
| VPN (Virtual Private Network) | |
| intrusion detection system (IDS) | |
| intrusion prevention system (IPS) | |
| security operations center (SOC) | |
| ethical hacking | |
| black hat hacker | |
| white hat hacker | |
| cybercrime | |
| cyber espionage | |
| data breach | |
| data loss prevention (DLP) | |
| cloud security | |
| mobile security | |
| internet of things (IoT) security | |
| application security | |
| network security | |
| security information and event management (SIEM) | |
| AI in cybersecurity | |
| blockchain security | |
| risk assessment | |
| access control | |
| cryptography | |
| decryption | |
| dark web | |
| cyber resilience | |
| business continuity plan (BCP) | |
| disaster recovery | |
| security architecture | |
| threat hunting | |
| malvertising | |
| keylogger | |
| shadow IT | |
| supply chain attack | |
| ransomware-as-a-service (RaaS) | |
| phishing simulation | |
| advanced persistent threat (APT) | |
| vishing | |
| smishing | |
| quishing | |
| deepfake | |
| endpoint detection and response (EDR) | |
| security awareness training | |
| remote access | |
| secure web gateway (SWG) | |
| DNS tunneling | |
| buffer overflow | |
| evil twin | |
| identity and access management (IAM) | |
| payload | |
| cyber warfare | |
| digital forensics | |
| passwordless authentication | |
| quantum computing security | |
| regulatory compliance | |
| GDPR | |
| NIST framework | |
| ISO/IEC 27001 | |
| data integrity | |
| CIA triad | |
| cyber kill chain | |
| attack vector | |
| threat modeling | |
| software development security (SDLC) | |
| secure coding | |
| perimeter security | |
| endpoint hardening | |
| threat intelligence platform (TIP) | |
| cloud access security broker (CASB) | |
| firewall-as-a-service (FWaaS) | |
| secure access service edge (SASE) |