Cyber Security Glossary
Your reference guide to important cybersecurity terms.
A
Application Security
Application security refers to the practices, technologies, and controls implemented to protect software applications from security threats and vulnerabilities throughout their lifecycle.
Attack Surface Reduction (ASR)
Attack surface reduction is the process of limiting the number of potential entry points that attackers could exploit to gain access to systems or data.
Advanced Persistent Threat (APT)
An advanced persistent threat is a highly sophisticated and targeted cyberattack in which an attacker infiltrates a network and maintains long-term, stealthy access to steal data or monitor activity.
Asset Discovery
Asset discovery is the process of identifying and mapping previously unknown or unmanaged digital assets that exist within an organization’s external environment.
Authenticated Scanning
Authenticated scanning, also called credentialed scanning, is a type of vulnerability assessment that uses login credentials to analyze the security of systems, web applications, or APIs behind authentication mechanisms.
Attack Surface
The attack surface represents the complete set of potential entry points where an attacker could attempt to exploit vulnerabilities in a system, application, or network.
Automated Security Testing
Automated security testing involves using specialized tools to perform consistent and repeatable security checks that identify vulnerabilities within applications or systems.
B
Backdoor
A backdoor is a hidden method of bypassing normal authentication or security controls to gain unauthorized access to a system, application, or network.
Backup
A backup is a copy of important data that is stored separately to ensure information can be restored in case of data loss, corruption, or cyber incidents such as ransomware attacks.
Behavioral Analysis
Behavioral analysis is a security technique that monitors system or user behavior to detect unusual activities that may indicate a cyber threat or malicious activity.
Botnet
A botnet is a network of compromised computers or devices controlled by attackers and often used to launch large-scale cyberattacks such as distributed denial-of-service (DDoS) attacks.
Brute Force Attack
A brute force attack is a method used by attackers to gain access to accounts or systems by systematically trying many combinations of passwords or encryption keys until the correct one is found.
Business Continuity
Business continuity refers to the processes and strategies organizations implement to ensure critical operations continue during and after a cyber incident, system failure, or disaster.
Bug Bounty Program
A bug bounty program is a security initiative where organizations reward ethical hackers or security researchers for discovering and responsibly reporting vulnerabilities in their systems or applications.
Contact Us
info@cloytsecurity.com
1 Marina Park Drive Suite 1230, Boston, MA 02210, United States
Monday-Friday: 8am - 5pm
Get Started
Defend Your Business from Cyber Threats