Cybersecurity Glossary
939 terms across 10 categories
Showing all 939 terms
Protection for additive manufacturing.
Security risks in distributed network architectures where high-speed data processing occurs outside centralized security perimeters.
Specialized security measures developed to address the increased complexity and speed of 5G networks.
A security mechanism that regulates which users, systems, or processes can view, modify, or execute specific resources based on identity, role, context, or other attributes.
Network security rules governing resource access permissions to protect sensitive data.
Systems that dynamically respond to threats.
Authentication processes that modify security requirements in real time based on user behavior and risk levels.
Techniques that modify analysis approaches based on the evolving behavior of malware samples.
Dynamic partitioning of networks based on real-time risk assessments and threat intelligence.
The dynamic evaluation of user and system behaviors to assign real-time risk scores for access decisions.
New enhancements in the Advanced Encryption Standard designed to bolster cryptographic security.
Techniques for identifying and dismantling sophisticated botnets orchestrated by cybercriminals.
A proactive process of identifying, quantifying, and addressing potential cyber threats against systems.
A field studying attacks that manipulate ML model inputs or training data to cause misclassification, evade security detection systems, extract sensitive model information, or degrade model performanc…
The practice of mimicking specific threat actors' tactics and techniques for security testing.
Detailed blueprints that replicate known attacker behaviors to assess and improve cybersecurity readiness.
Programs that replicate attacker behavior to test and improve an organization's defensive capabilities.
Protection for aircraft production.
Security risks arising from autonomous AI agents that can plan, call APIs, execute code, browse the web, and take multi-step actions — creating novel attack surfaces for privilege escalation, unintend…
Protection for farming UAVs.