Cyber Security Glossary

Your reference guide to important cybersecurity terms.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A

 

Application Security

Application security refers to the practices, technologies, and controls implemented to protect software applications from security threats and vulnerabilities throughout their lifecycle.

Attack Surface Reduction (ASR)

Attack surface reduction is the process of limiting the number of potential entry points that attackers could exploit to gain access to systems or data.

Advanced Persistent Threat (APT)

An advanced persistent threat is a highly sophisticated and targeted cyberattack in which an attacker infiltrates a network and maintains long-term, stealthy access to steal data or monitor activity.

Asset Discovery

Asset discovery is the process of identifying and mapping previously unknown or unmanaged digital assets that exist within an organization’s external environment.

Authenticated Scanning

Authenticated scanning, also called credentialed scanning, is a type of vulnerability assessment that uses login credentials to analyze the security of systems, web applications, or APIs behind authentication mechanisms.

Attack Surface

The attack surface represents the complete set of potential entry points where an attacker could attempt to exploit vulnerabilities in a system, application, or network.

Automated Security Testing

Automated security testing involves using specialized tools to perform consistent and repeatable security checks that identify vulnerabilities within applications or systems.

B

 

Backdoor

A backdoor is a hidden method of bypassing normal authentication or security controls to gain unauthorized access to a system, application, or network.

Backup

A backup is a copy of important data that is stored separately to ensure information can be restored in case of data loss, corruption, or cyber incidents such as ransomware attacks.

Behavioral Analysis

Behavioral analysis is a security technique that monitors system or user behavior to detect unusual activities that may indicate a cyber threat or malicious activity.

Botnet

A botnet is a network of compromised computers or devices controlled by attackers and often used to launch large-scale cyberattacks such as distributed denial-of-service (DDoS) attacks.

Brute Force Attack

A brute force attack is a method used by attackers to gain access to accounts or systems by systematically trying many combinations of passwords or encryption keys until the correct one is found.

Business Continuity

Business continuity refers to the processes and strategies organizations implement to ensure critical operations continue during and after a cyber incident, system failure, or disaster.

Bug Bounty Program

A bug bounty program is a security initiative where organizations reward ethical hackers or security researchers for discovering and responsibly reporting vulnerabilities in their systems or applications.

Contact Us

info@cloytsecurity.com

1 Marina Park Drive Suite 1230, Boston, MA 02210, United States

Monday-Friday: 8am - 5pm

Get Started

Defend Your Business from Cyber Threats