Vordr CyberSecurity
Home
Verkada Store
Open Ticket
Login
Register
Categories
Glossary
Glossary
Decryption Key
87
Acceptable Interruption Window
114
Acceptable Use Policy
107
Access Control List ACL
88
Access Path
113
Access Point
113
Access Profile
103
Access Rights
97
Access Type
103
Account Management User
105
Accountability
85
Accounting Legend Code
99
Active Security Testing
119
Ad Hoc Netwrok
105
Administrative Safeguards
97
Advanced Encryption Standard AES
114
Advanced Penetration Testing
103
Advanced Persistent Threat APT
83
Adversary
100
Adware
97
Alert Situation
81
Alternate Facilities
71
Alternate Process
77
Analog
109
Anti Malware
77
Anti Virus Software
122
App Attack
117
Application Layer
73
Architecture
92
Asset
96
Asymmetric Key Public Key
100
Attack Mechanism
125
Attack Vector
107
Attack
106
Attentuation
107
Audit Trail
97
Authentication
100
Authenticity
96
Availability
103
Backdoor
98
Bandwidth
104
Banner Grabbing
99
Banner
84
Baseline Security
94
Bastion Host
100
Bastion
86
Behavioral Outcome
84
Biometrics
101
Bit Error Rate
92
Black Core
88
Blended Attack
100
Block Cipher Algorithm
105
Block Cipher
99
Botnet
105
Boundary
97
Bridge
107
Bring Your Own Device
66
Broadcast
91
Brute Force Attack
99
Brute Force
93
Buffer Overflow
112
Business Continuity Plan
101
Business Impact Analysis Assessment
100
Category
88
Central Services Node
73
Certificate Management
97
Certification Revocation List
59
Chain of Custody
133
Chain of Evidence
82
Challenge Response Protocol
102
Checksum
108
Chief Information Security Officer CISO
57
Chief Security Officer
107
Cipher Text
98
Cipher
127
Ciphony
91
Claimant
64
Cleartext
89
Cloud Computing
104
Cold Site
122
Collision
87
Common Access Card CAC
88
Common Attack Pattern Enumeration and Classification CAPEC
103
Compartmentalization
99
Compliance Documents
98
Compliance
93
Computer Emergency Response Team CERT
97
Computer Forensics
118
Confidentiality
64
Configuration Management
68
Consumerization
99
Containment
103
Content Filtering
106
Control
96
Countermeasure
88
Critical Infrastructure
83
Criticality Analysis
77
Criticality
92
Cross Site Scripting XSS
81
Cryptography
76
Cryptosystem
85
Cyber Security Architecture
91
Cyber Security
90
Cybercop
93
Cyber Espionage
90
Cyberwarfare
77
Data Asset
80
Data Classification
67
Data Custodian
81
Data Element
51
Data Encryption Standard
84
Data Flow Control
102
Data Leakage
75
Data Owner
92
Data Retention
100
Data Retention Device DTD
60
Database
83
Decentralization
76
Decryption Key
86
Decryption
86
Defense in Depth
93
Demilitarized Zone DMZ
79
Denial of Serve Attack DOS
90
Digital Certificate
88
Digital Evidence
113
Digital Forensics
80
Digital Signature
91
Disaster Recovery Plan DRP
56
Disaster
87
Discretionary Access Control
99
Disk Imaging
89
Distruption
85
Distributed Denial of Service DDOS
78
Domain Name System DNS Exfiltration
89
Domain Name Service DNS
101
Dual Use Certificate
58
Due Care
98
Due Diligence
93
Duplicate Digital Evidence
82
Dynamic Ports
92
Ecommerce
85
Egovernment
70
Easter Egg
85
Egress Filtering
73
Electronic Key Entry
57
Electronic Key Management System
75
Electronic Signature
71
Electronically Generated Key
92
Elliptical Curve Cryptography ECC
96
Embedded Cryptographic System
92
Embedded Cryptography
61
Encapsulation Security Payload
91
Encipher
71
Encryption Algorithm
54
Encryption Certificate
88
Encryption Key
89
Encryption
106
End Cryptographic Unit
73
End End Encryption
58
Enterprise Architecture
71
Enterprise Risk Management
76
Enterprise
93
Entrapment
71
Eradication
92
Ethernet
87
Event
86
Evidence
95
Exercise Key
79
Exploit Code
88
Exploit
53
Exploitable Channel
55
External Network
89
External Security Testing
79
Fail Safe
107
Fail Soft
96
Failover
116
False Positive
91
Federal Information System
80
File Encryption
76
Filename Anomaly
97
File Protection
80
File Security
62
File Transfer Protocol FTP
50
Fill Device
83
Firewall Control Proxy
89
Firewall
75
Firmware
92
Flaw Hypothesis Methodology
83
Flooding
85
Focused Testing
75
Forensic Copy
103
Forensic Examination
93
Forensic Specialist
90
Forensically Clean
106
Forensics
71
Forward Cipher
105
Freeware
85
Full Disk Encryption FDE
64
Gateway
84
Gethostbyaddr
68
Global Information Grid GIG
106
Global Information Infrastructure GII
89
GNU
106
Gnutella
93
Governance Risk Management and Compliance
76
Governance
87
Graduated Security
58
Group Authenticator
58
Guard System
75
Guessing Entropy
90
Guideline
79
Hacker
87
Handshaking Procedures
74
Hard Copy Key
58
Hardening
101
Hardware
64
Hardwired Key
83
Hash Based Message Authentication Code HMAC
88
Hash Function
98
Hash Functions
89
Hash Total
169
Hash Value
96
Hashing
74
High Assurance Guard HAG
79
High Availability
52
High Impact System
85
High Impact
92
Hijack Attack
86
Hijacking
101
Honeyclient
59
Honeymonkey
94
Honeypot
92
Hop
73
Host Based Intrustion Detection System HIDS
50
Host
90
Host Site
85
Hot Wash
90
Http Proxy
75
Https
80
Hub
104
Hybrid Attack
103
Hybrid Encyrption
98
Hybrid Security Control
87
Hyperlink
60
Hypertext Markup Language HTML
84
Hypertext Transfer Protocol HTTP
99
Identity
85
Incident Handling
97
Incident
49
Incremental Backups
92
Inetd
79
Inference Attack
69
Information Warfare
56
Ingress Filtering
71
Input Validation Attacks
92
Integrity Star Property
55
Integrity
87
Internet Control Message Protocol ICMP
56
Internet Engineering Task Force IETF
123
Internet Message Access Protocol IMAP
89
Internet Protocol IP
62
Internet Protocol Security IPSEC
90
Internet Protocol
96
Internet Standard
97
Internet
59
Interrupt
89
Intranet
92
Intrusion Detection ID
117
IP Flood
120
IP Forwarding
137
IP Spoofing
107
ISO
88
Issue Specific Policy
70
ItuT
105
Jitter
98
Jump Bag
81
Cybersecurity Definitions K
99
Kerberos
102
Kernel
91
Lattice Techniques
77
Layer 2 Forwarding Protocol L2F
85
Layer 2 Tunneling Protocol L2TP
89
Least Privilege
56
Legion
67
Lightweight Directory Access protocol LDAP
73
Link State
58
List Based Access Control
87
Loadable Kernel Modules LKM
82
Log Clipping
81
Logic Bombs
119
Logic Gate
75
Loopback Address
97
Cybersecurity Definitions M
92
Mac Address
103
Malicious Code
84
Malware
92
Mandatory Access Control MAC
81
Masquerade Attack
97
MD5
94
Measures of Effectiveness MOE
100
Monoculture
92
Morris Worm
87
Multicast
91
Multi Homed
79
Multiplexing
99
National Institute of Standards and Technology NIST
58
Natural Disaster
96
Netmask
76
Network Based IDS
79
Network Mapping
99
Network Taps
104
Non Printable Character
59
Non Repudiation
55
Null Session
94
Cybersecurity Definitions O
105
Octet
94
One Way Encryption
74
OSI Layers
104
OSI
108
Overload
199
Cybersecurity Definitions R
191
Cybersecurity Definitions U
153
Cybersecurity Definitions V
207
Cybersecurity Definitions Y
193
Glossary Popular Knowledge
Cybersecurity Definitions V
Overload
Cybersecurity Definitions Y
Cybersecurity Definitions R
Hash Total
** The time is base on America/Chicago timezone