Cybersecurity Glossary
Understand cybersecurity jargon with our comprehensive glossary
AES(Advanced Encryption Standard)
TechnicalSymmetric encryption standard adopted by the U.S. government. Uses 128, 192, or 256-bit keys.
APT(Advanced Persistent Threat)
ThreatsAdvanced persistent threat: a targeted and sophisticated attack conducted by motivated actors (nation-states, organized groups) over an extended period.
BCP(Business Continuity Plan)
GovernanceBusiness continuity plan: a documented set of procedures enabling the maintenance or resumption of critical operations in case of major disruption.
BIA(Business Impact Analysis)
GovernanceBusiness impact analysis: a process to identify and evaluate the potential effects of an interruption to critical processes.
Examples:
- •RTO/RPO identification
- •Dependency assessment
CISO(Chief Information Security Officer)
GovernanceChief Information Security Officer: an executive responsible for cybersecurity strategy and governance.
CVSS(Common Vulnerability Scoring System)
TechnicalStandard system for scoring the severity of computer vulnerabilities, scale from 0 to 10.
DDoS(Distributed Denial of Service)
ThreatsDistributed denial of service attack: overwhelming a system with massive traffic from multiple sources to make it unavailable.
DLP(Data Loss Prevention)
TechnicalData loss prevention: set of technologies and processes to prevent the leakage or exfiltration of sensitive data.
DRP(Disaster Recovery Plan)
GovernanceDisaster recovery plan: procedures for restoring IT systems and data after a disaster.
EDR(Endpoint Detection and Response)
TechnicalEndpoint detection and response: advanced security solution that continuously monitors and analyzes endpoints to detect and respond to threats.
Firewall
TechnicalNetwork security device that controls incoming and outgoing traffic according to predefined security rules.
GDPR(General Data Protection Regulation)
ComplianceEuropean regulation governing the processing and circulation of personal data. Fines up to 4% of global revenue.
IAM(Identity and Access Management)
TechnicalIdentity and access management: framework of policies and technologies to ensure the right people access the right resources.
IDS(Intrusion Detection System)
TechnicalIntrusion detection system: device that monitors network traffic to detect suspicious activities.
IPS(Intrusion Prevention System)
TechnicalIntrusion prevention system: like an IDS but automatically blocks detected threats.
ISO 22301
ComplianceInternational standard for business continuity management systems (BCMS).
ISO 27001
ComplianceInternational standard defining requirements for an information security management system (ISMS).
MFA(Multi-Factor Authentication)
TechnicalMulti-factor authentication: security method requiring at least two distinct identity proofs.
MTD(Maximum Tolerable Downtime)
GovernanceMaximum tolerable downtime: time beyond which the interruption of a process jeopardizes the organization's survival.
NIS2
ComplianceEuropean Network and Information Security 2 directive strengthening cybersecurity requirements for essential and important entities.
Penetration Test
TechnicalSecurity assessment simulating a cyberattack to identify exploitable vulnerabilities in a system.
Phishing
ThreatsSocial engineering technique using fraudulent emails to steal sensitive information or spread malware.
Ransomware
ThreatsMalicious software that encrypts the victim's data and demands a ransom for decryption.
RPO(Recovery Point Objective)
GovernanceMaximum acceptable data loss measured in time. Ex: RPO of 1h = maximum 1 hour of data lost.
RTO(Recovery Time Objective)
GovernanceMaximum acceptable interruption duration to restore a process. Ex: RTO of 4h = restoration within 4 hours.
SIEM(Security Information and Event Management)
TechnicalSolution centralizing the collection, analysis, and correlation of security events in real-time.
SOAR(Security Orchestration, Automation and Response)
TechnicalTechnologies enabling automation and orchestration of security incident responses.
SOC(Security Operations Center)
GovernanceSecurity operations center: centralized team monitoring, detecting, and responding to security incidents 24/7.
VPN(Virtual Private Network)
TechnicalVirtual private network: secure and encrypted connection established over a public network (Internet).
Vulnerability
TechnicalWeakness in a system, application, or process that can be exploited to compromise security.
XDR(Extended Detection and Response)
TechnicalEvolution of EDR integrating detection across endpoints, networks, cloud, and applications in a unified platform.
Zero Trust
TechnicalSecurity model based on the principle "never trust, always verify". Every connection must be authenticated and authorized.
Zero-Day
ThreatsVulnerability unknown to vendors and without an available patch, exploited by attackers before public discovery.
Need Expert Guidance?
Our experts help you navigate the complexity of cybersecurity