A
- ACL (Access Control List): A set of rules used to control network traffic and reduce unauthorized access. To learn how this is done within the Microsoft 365 environment, go to https://learn.microsoft.com/en-us/microsoft-365/enterprise/microsoft-365-isolation-in-microsoft-365?view=o365-worldwide
- AES (Advanced Encryption Standard): A symmetric encryption algorithm widely used to secure data. Read the NIST publication for an overview: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197-upd1.pdf
- Authentication: The process of verifying the identity of a user or system. For an overview of Microsoft Entra Multifactor authentication, go to https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-mfa-multi-factor-authentication
B
- Brute Force Attack: A method of cracking passwords or encryption keys by trying all possible combinations. For an overview of the five types of brute force attacks, go to the Fortinet site here: https://www.fortinet.com/resources/cyberglossary/brute-force-attack
- BYOD (Bring Your Own Device): A policy allowing employees to use their personal devices for work. SHRM has a sample BYOD policy template you can review here: https://www.shrm.org/topics-tools/tools/policies/bringyourowndevicepolicy
C
- CIA Triad: Stands for Confidentiality, Integrity, and Availability, the three core principles of information security. NIST SPECIAL PUBLICATION 1800-26A has an overview you can access here: https://www.nccoe.nist.gov/publication/1800-26/VolA/index.html
- Certificate Authority (CA): An entity that issues digital certificates for securing communications. Read the Digicert description here: https://www.digicert.com/blog/what-is-a-certificate-authority
- Cloud Security: Measures taken to protect cloud-based applications and data. If you’re interested in cloud security, bookmark the Cloud Security Alliance’s Cloud Controls Matrix: https://cloudsecurityalliance.org/research/cloud-controls-matrix
D
- DDoS (Distributed Denial of Service) Attack: An attack that overwhelms a target system with excessive traffic, causing disruption. Cloudflare provides an overview of DDoS here: https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/
- DMZ (Demilitarized Zone): A network segment that separates internal networks from untrusted external networks. NIST has a great alphabetical glossary where you can learn terms like DMZ: https://csrc.nist.gov/glossary/term/demilitarized_zone
- Data Loss Prevention (DLP): A strategy for detecting and preventing unauthorized data access or transfer. https://infinitekb.com/dlp
E
- Encryption: The process of converting data into a coded format to prevent unauthorized access. Cisco has a good explanation of the types of encryption here: https://www.cisco.com/c/en/us/products/security/encryption-explained.html#~types-of-data-encryption
- Endpoint Security: Measures taken to protect devices like computers and smartphones from threats. Many organizations use Microsoft Intune to manage Endpoint security and establish policies. To get an overview of Intune, go to https://learn.microsoft.com/en-us/mem/intune/protect/endpoint-security
F
- Firewall: A security device or software that filters network traffic based on predefined rules.
- Forensics: The practice of investigating cyber incidents to determine causes and impacts.
G
- GRC (Governance, Risk, and Compliance): A framework for aligning IT with business objectives while managing risks and ensuring compliance.
H
- HIDS (Host-based Intrusion Detection System): A system that monitors and detects threats on individual devices.
- Hashing: A cryptographic process that transforms data into a fixed-size output for integrity verification.
I
- IDS (Intrusion Detection System): A system that monitors network traffic for suspicious activity.
- Incident Response: The process of handling and mitigating cybersecurity incidents.
- Integrity: The principle of ensuring data accuracy and consistency.
J
- Job Rotation: A security practice that reduces fraud and insider threats by regularly changing employees’ roles.
K
- Kerberos: A network authentication protocol that uses tickets to allow secure access to resources.
L
- Least Privilege: A security principle that grants users only the access necessary to perform their job functions.
- Logging: The recording of system and network activities for monitoring and analysis.
M
- Malware: Malicious software such as viruses, worms, and ransomware.
- MitM (Man-in-the-Middle) Attack: A cyber attack where a hacker intercepts communications between two parties.
N
- Network Security: Measures taken to protect data as it travels across or is stored on networks.
- NIST (National Institute of Standards and Technology): A U.S. agency that develops cybersecurity guidelines and standards.
O
- OAuth: An open-standard authorization framework that allows secure API access without sharing passwords.
- On-Premises Security: Security measures applied to data and systems physically hosted within an organization.
P
- Penetration Testing: A simulated cyber attack to identify vulnerabilities in systems.
- Phishing: A social engineering attack that tricks users into providing sensitive information.
Q
- Quarantine: The isolation of a suspected malicious file or device to prevent further damage.
R
- Ransomware: A type of malware that encrypts data and demands payment for its release.
- Risk Assessment: The process of identifying and evaluating security risks.
S
- SOC (Security Operations Center): A centralized unit that monitors and responds to security threats.
- Symmetric Encryption: An encryption method where the same key is used for encryption and decryption.
T
- TLS (Transport Layer Security): A cryptographic protocol that secures internet communications.
- Threat Intelligence: The collection and analysis of information to understand and mitigate cyber threats.
U
- UAC (User Account Control): A security feature in Windows that prevents unauthorized changes to the system.
V
- VPN (Virtual Private Network): A secure connection that encrypts data transmitted over the internet.
- Vulnerability Assessment: The process of identifying and mitigating security weaknesses.
W
- WPA (Wi-Fi Protected Access): A security standard that protects wireless networks.
- Whitelisting: A security practice that allows only approved applications or users to access resources.
X
- XML Injection: A cyber attack that exploits vulnerabilities in XML-based applications.
Y
- Yubikey: A physical security key used for two-factor authentication.
Z
- Zero Trust: A security model that assumes no implicit trust and requires continuous verification of access requests.