Security+

A

B

C

D

E

F

  • Firewall: A security device or software that filters network traffic based on predefined rules.
  • Forensics: The practice of investigating cyber incidents to determine causes and impacts.

G

  • GRC (Governance, Risk, and Compliance): A framework for aligning IT with business objectives while managing risks and ensuring compliance.

H

  • HIDS (Host-based Intrusion Detection System): A system that monitors and detects threats on individual devices.
  • Hashing: A cryptographic process that transforms data into a fixed-size output for integrity verification.

I

  • IDS (Intrusion Detection System): A system that monitors network traffic for suspicious activity.
  • Incident Response: The process of handling and mitigating cybersecurity incidents.
  • Integrity: The principle of ensuring data accuracy and consistency.

J

  • Job Rotation: A security practice that reduces fraud and insider threats by regularly changing employees’ roles.

K

  • Kerberos: A network authentication protocol that uses tickets to allow secure access to resources.

L

  • Least Privilege: A security principle that grants users only the access necessary to perform their job functions.
  • Logging: The recording of system and network activities for monitoring and analysis.

M

  • Malware: Malicious software such as viruses, worms, and ransomware.
  • MitM (Man-in-the-Middle) Attack: A cyber attack where a hacker intercepts communications between two parties.

N

  • Network Security: Measures taken to protect data as it travels across or is stored on networks.
  • NIST (National Institute of Standards and Technology): A U.S. agency that develops cybersecurity guidelines and standards.

O

  • OAuth: An open-standard authorization framework that allows secure API access without sharing passwords.
  • On-Premises Security: Security measures applied to data and systems physically hosted within an organization.

P

  • Penetration Testing: A simulated cyber attack to identify vulnerabilities in systems.
  • Phishing: A social engineering attack that tricks users into providing sensitive information.

Q

  • Quarantine: The isolation of a suspected malicious file or device to prevent further damage.

R

  • Ransomware: A type of malware that encrypts data and demands payment for its release.
  • Risk Assessment: The process of identifying and evaluating security risks.

S

  • SOC (Security Operations Center): A centralized unit that monitors and responds to security threats.
  • Symmetric Encryption: An encryption method where the same key is used for encryption and decryption.

T

  • TLS (Transport Layer Security): A cryptographic protocol that secures internet communications.
  • Threat Intelligence: The collection and analysis of information to understand and mitigate cyber threats.

U

  • UAC (User Account Control): A security feature in Windows that prevents unauthorized changes to the system.

V

  • VPN (Virtual Private Network): A secure connection that encrypts data transmitted over the internet.
  • Vulnerability Assessment: The process of identifying and mitigating security weaknesses.

W

  • WPA (Wi-Fi Protected Access): A security standard that protects wireless networks.
  • Whitelisting: A security practice that allows only approved applications or users to access resources.

X

  • XML Injection: A cyber attack that exploits vulnerabilities in XML-based applications.

Y

  • Yubikey: A physical security key used for two-factor authentication.

Z

  • Zero Trust: A security model that assumes no implicit trust and requires continuous verification of access requests.
Scroll to Top