From CISO Marketplace — the hub for security professionals Visit

Cybersecurity Glossary

939 terms across 10 categories

Showing all 939 terms

3D Printing SecurityNetwork Security

Protection for additive manufacturing.

5G Edge VulnerabilitiesData Protection

Security risks in distributed network architectures where high-speed data processing occurs outside centralized security perimeters.

5G Network Security ProtocolsNetwork Security

Specialized security measures developed to address the increased complexity and speed of 5G networks.

Access ControlIdentity & Access

A security mechanism that regulates which users, systems, or processes can view, modify, or execute specific resources based on identity, role, context, or other attributes.

Access Control List (ACL)Identity & Access

Network security rules governing resource access permissions to protect sensitive data.

Active Defense MechanismsData Protection

Systems that dynamically respond to threats.

Adaptive AuthenticationIdentity & Access

Authentication processes that modify security requirements in real time based on user behavior and risk levels.

Adaptive Malware AnalysisMalware Protection

Techniques that modify analysis approaches based on the evolving behavior of malware samples.

Adaptive Network SegmentationNetwork Security

Dynamic partitioning of networks based on real-time risk assessments and threat intelligence.

Adaptive Risk ScoringIdentity & Access

The dynamic evaluation of user and system behaviors to assign real-time risk scores for access decisions.

Advanced AES InnovationsCryptography

New enhancements in the Advanced Encryption Standard designed to bolster cryptographic security.

Advanced Botnet DisruptionMalware Protection

Techniques for identifying and dismantling sophisticated botnets orchestrated by cybercriminals.

Advanced Threat ModelingThreat Intelligence

A proactive process of identifying, quantifying, and addressing potential cyber threats against systems.

Adversarial Machine LearningThreat Intelligence

A field studying attacks that manipulate ML model inputs or training data to cause misclassification, evade security detection systems, extract sensitive model information, or degrade model performanc

Adversary EmulationData Protection

The practice of mimicking specific threat actors' tactics and techniques for security testing.

Adversary Emulation PlansThreat Intelligence

Detailed blueprints that replicate known attacker behaviors to assess and improve cybersecurity readiness.

Adversary Simulation SoftwareThreat Intelligence

Programs that replicate attacker behavior to test and improve an organization's defensive capabilities.

Aerospace Manufacturing SecurityNetwork Security

Protection for aircraft production.

Agentic AI ThreatThreat Intelligence

Security risks arising from autonomous AI agents that can plan, call APIs, execute code, browse the web, and take multi-step actions — creating novel attack surfaces for privilege escalation, unintend

Agricultural Drone SecurityNetwork Security

Protection for farming UAVs.