Vordr CyberSecurity
Home
Verkada Store
Open Ticket
Login
Register
Categories
Glossary
Glossary
Decryption Key
87
Acceptable Interruption Window
113
Acceptable Use Policy
106
Access Control List ACL
87
Access Path
112
Access Point
112
Access Profile
102
Access Rights
96
Access Type
102
Account Management User
104
Accountability
84
Accounting Legend Code
98
Active Security Testing
118
Ad Hoc Netwrok
104
Administrative Safeguards
97
Advanced Encryption Standard AES
113
Advanced Penetration Testing
102
Advanced Persistent Threat APT
82
Adversary
99
Adware
96
Alert Situation
80
Alternate Facilities
71
Alternate Process
76
Analog
108
Anti Malware
77
Anti Virus Software
122
App Attack
116
Application Layer
72
Architecture
91
Asset
95
Asymmetric Key Public Key
99
Attack Mechanism
124
Attack Vector
106
Attack
105
Attentuation
106
Audit Trail
96
Authentication
99
Authenticity
95
Availability
102
Backdoor
98
Bandwidth
103
Banner Grabbing
99
Banner
84
Baseline Security
93
Bastion Host
99
Bastion
85
Behavioral Outcome
83
Biometrics
100
Bit Error Rate
91
Black Core
87
Blended Attack
99
Block Cipher Algorithm
104
Block Cipher
99
Botnet
104
Boundary
96
Bridge
106
Bring Your Own Device
65
Broadcast
90
Brute Force Attack
98
Brute Force
92
Buffer Overflow
111
Business Continuity Plan
101
Business Impact Analysis Assessment
100
Category
87
Central Services Node
72
Certificate Management
96
Certification Revocation List
58
Chain of Custody
133
Chain of Evidence
82
Challenge Response Protocol
101
Checksum
108
Chief Information Security Officer CISO
57
Chief Security Officer
107
Cipher Text
97
Cipher
126
Ciphony
90
Claimant
63
Cleartext
88
Cloud Computing
104
Cold Site
122
Collision
87
Common Access Card CAC
87
Common Attack Pattern Enumeration and Classification CAPEC
102
Compartmentalization
98
Compliance Documents
98
Compliance
93
Computer Emergency Response Team CERT
96
Computer Forensics
117
Confidentiality
64
Configuration Management
67
Consumerization
98
Containment
103
Content Filtering
105
Control
95
Countermeasure
87
Critical Infrastructure
83
Criticality Analysis
77
Criticality
92
Cross Site Scripting XSS
80
Cryptography
75
Cryptosystem
84
Cyber Security Architecture
90
Cyber Security
89
Cybercop
92
Cyber Espionage
90
Cyberwarfare
76
Data Asset
79
Data Classification
66
Data Custodian
81
Data Element
50
Data Encryption Standard
83
Data Flow Control
101
Data Leakage
74
Data Owner
91
Data Retention
99
Data Retention Device DTD
59
Database
82
Decentralization
75
Decryption Key
85
Decryption
85
Defense in Depth
92
Demilitarized Zone DMZ
78
Denial of Serve Attack DOS
89
Digital Certificate
87
Digital Evidence
113
Digital Forensics
79
Digital Signature
90
Disaster Recovery Plan DRP
56
Disaster
86
Discretionary Access Control
98
Disk Imaging
88
Distruption
85
Distributed Denial of Service DDOS
77
Domain Name System DNS Exfiltration
88
Domain Name Service DNS
100
Dual Use Certificate
57
Due Care
98
Due Diligence
92
Duplicate Digital Evidence
81
Dynamic Ports
92
Ecommerce
84
Egovernment
69
Easter Egg
85
Egress Filtering
72
Electronic Key Entry
56
Electronic Key Management System
74
Electronic Signature
70
Electronically Generated Key
91
Elliptical Curve Cryptography ECC
95
Embedded Cryptographic System
91
Embedded Cryptography
60
Encapsulation Security Payload
90
Encipher
70
Encryption Algorithm
53
Encryption Certificate
87
Encryption Key
88
Encryption
105
End Cryptographic Unit
72
End End Encryption
57
Enterprise Architecture
70
Enterprise Risk Management
76
Enterprise
92
Entrapment
71
Eradication
91
Ethernet
86
Event
85
Evidence
95
Exercise Key
78
Exploit Code
87
Exploit
52
Exploitable Channel
54
External Network
88
External Security Testing
78
Fail Safe
106
Fail Soft
95
Failover
115
False Positive
90
Federal Information System
80
File Encryption
75
Filename Anomaly
96
File Protection
79
File Security
61
File Transfer Protocol FTP
49
Fill Device
82
Firewall Control Proxy
88
Firewall
74
Firmware
91
Flaw Hypothesis Methodology
82
Flooding
84
Focused Testing
74
Forensic Copy
103
Forensic Examination
93
Forensic Specialist
90
Forensically Clean
106
Forensics
70
Forward Cipher
104
Freeware
85
Full Disk Encryption FDE
63
Gateway
83
Gethostbyaddr
67
Global Information Grid GIG
105
Global Information Infrastructure GII
88
GNU
106
Gnutella
92
Governance Risk Management and Compliance
76
Governance
87
Graduated Security
57
Group Authenticator
57
Guard System
74
Guessing Entropy
89
Guideline
78
Hacker
86
Handshaking Procedures
73
Hard Copy Key
57
Hardening
100
Hardware
63
Hardwired Key
82
Hash Based Message Authentication Code HMAC
87
Hash Function
98
Hash Functions
88
Hash Total
167
Hash Value
95
Hashing
73
High Assurance Guard HAG
79
High Availability
51
High Impact System
84
High Impact
91
Hijack Attack
85
Hijacking
100
Honeyclient
58
Honeymonkey
93
Honeypot
92
Hop
73
Host Based Intrustion Detection System HIDS
50
Host
89
Host Site
85
Hot Wash
90
Http Proxy
74
Https
80
Hub
103
Hybrid Attack
102
Hybrid Encyrption
98
Hybrid Security Control
86
Hyperlink
59
Hypertext Markup Language HTML
83
Hypertext Transfer Protocol HTTP
98
Identity
84
Incident Handling
96
Incident
48
Incremental Backups
91
Inetd
78
Inference Attack
68
Information Warfare
56
Ingress Filtering
70
Input Validation Attacks
91
Integrity Star Property
55
Integrity
86
Internet Control Message Protocol ICMP
55
Internet Engineering Task Force IETF
122
Internet Message Access Protocol IMAP
88
Internet Protocol IP
61
Internet Protocol Security IPSEC
89
Internet Protocol
95
Internet Standard
96
Internet
58
Interrupt
88
Intranet
91
Intrusion Detection ID
116
IP Flood
119
IP Forwarding
136
IP Spoofing
106
ISO
88
Issue Specific Policy
70
ItuT
104
Jitter
97
Jump Bag
81
Cybersecurity Definitions K
99
Kerberos
101
Kernel
90
Lattice Techniques
76
Layer 2 Forwarding Protocol L2F
85
Layer 2 Tunneling Protocol L2TP
88
Least Privilege
55
Legion
67
Lightweight Directory Access protocol LDAP
72
Link State
57
List Based Access Control
86
Loadable Kernel Modules LKM
81
Log Clipping
80
Logic Bombs
118
Logic Gate
74
Loopback Address
96
Cybersecurity Definitions M
91
Mac Address
102
Malicious Code
83
Malware
92
Mandatory Access Control MAC
80
Masquerade Attack
96
MD5
93
Measures of Effectiveness MOE
100
Monoculture
92
Morris Worm
87
Multicast
90
Multi Homed
79
Multiplexing
98
National Institute of Standards and Technology NIST
58
Natural Disaster
96
Netmask
75
Network Based IDS
78
Network Mapping
98
Network Taps
104
Non Printable Character
59
Non Repudiation
54
Null Session
93
Cybersecurity Definitions O
104
Octet
93
One Way Encryption
73
OSI Layers
103
OSI
108
Overload
197
Cybersecurity Definitions R
190
Cybersecurity Definitions U
153
Cybersecurity Definitions V
206
Cybersecurity Definitions Y
192
Glossary Popular Knowledge
Cybersecurity Definitions V
Overload
Cybersecurity Definitions Y
Cybersecurity Definitions R
Hash Total
** The time is base on America/Chicago timezone