📖

Cybersecurity Glossary

Understand cybersecurity jargon with our comprehensive glossary

🔍
A

AES(Advanced Encryption Standard)

Technical

Symmetric encryption standard adopted by the U.S. government. Uses 128, 192, or 256-bit keys.

APT(Advanced Persistent Threat)

Threats

Advanced persistent threat: a targeted and sophisticated attack conducted by motivated actors (nation-states, organized groups) over an extended period.

B

BCP(Business Continuity Plan)

Governance

Business continuity plan: a documented set of procedures enabling the maintenance or resumption of critical operations in case of major disruption.

BIA(Business Impact Analysis)

Governance

Business impact analysis: a process to identify and evaluate the potential effects of an interruption to critical processes.

Examples:

  • RTO/RPO identification
  • Dependency assessment
C

CISO(Chief Information Security Officer)

Governance

Chief Information Security Officer: an executive responsible for cybersecurity strategy and governance.

CVSS(Common Vulnerability Scoring System)

Technical

Standard system for scoring the severity of computer vulnerabilities, scale from 0 to 10.

D

DDoS(Distributed Denial of Service)

Threats

Distributed denial of service attack: overwhelming a system with massive traffic from multiple sources to make it unavailable.

DLP(Data Loss Prevention)

Technical

Data loss prevention: set of technologies and processes to prevent the leakage or exfiltration of sensitive data.

DRP(Disaster Recovery Plan)

Governance

Disaster recovery plan: procedures for restoring IT systems and data after a disaster.

E

EDR(Endpoint Detection and Response)

Technical

Endpoint detection and response: advanced security solution that continuously monitors and analyzes endpoints to detect and respond to threats.

F

Firewall

Technical

Network security device that controls incoming and outgoing traffic according to predefined security rules.

G

GDPR(General Data Protection Regulation)

Compliance

European regulation governing the processing and circulation of personal data. Fines up to 4% of global revenue.

I

IAM(Identity and Access Management)

Technical

Identity and access management: framework of policies and technologies to ensure the right people access the right resources.

IDS(Intrusion Detection System)

Technical

Intrusion detection system: device that monitors network traffic to detect suspicious activities.

IPS(Intrusion Prevention System)

Technical

Intrusion prevention system: like an IDS but automatically blocks detected threats.

ISO 22301

Compliance

International standard for business continuity management systems (BCMS).

ISO 27001

Compliance

International standard defining requirements for an information security management system (ISMS).

M

MFA(Multi-Factor Authentication)

Technical

Multi-factor authentication: security method requiring at least two distinct identity proofs.

MTD(Maximum Tolerable Downtime)

Governance

Maximum tolerable downtime: time beyond which the interruption of a process jeopardizes the organization's survival.

N

NIS2

Compliance

European Network and Information Security 2 directive strengthening cybersecurity requirements for essential and important entities.

P

Penetration Test

Technical

Security assessment simulating a cyberattack to identify exploitable vulnerabilities in a system.

Phishing

Threats

Social engineering technique using fraudulent emails to steal sensitive information or spread malware.

R

Ransomware

Threats

Malicious software that encrypts the victim's data and demands a ransom for decryption.

RPO(Recovery Point Objective)

Governance

Maximum acceptable data loss measured in time. Ex: RPO of 1h = maximum 1 hour of data lost.

RTO(Recovery Time Objective)

Governance

Maximum acceptable interruption duration to restore a process. Ex: RTO of 4h = restoration within 4 hours.

S

SIEM(Security Information and Event Management)

Technical

Solution centralizing the collection, analysis, and correlation of security events in real-time.

SOAR(Security Orchestration, Automation and Response)

Technical

Technologies enabling automation and orchestration of security incident responses.

SOC(Security Operations Center)

Governance

Security operations center: centralized team monitoring, detecting, and responding to security incidents 24/7.

V

VPN(Virtual Private Network)

Technical

Virtual private network: secure and encrypted connection established over a public network (Internet).

Vulnerability

Technical

Weakness in a system, application, or process that can be exploited to compromise security.

X

XDR(Extended Detection and Response)

Technical

Evolution of EDR integrating detection across endpoints, networks, cloud, and applications in a unified platform.

Z

Zero Trust

Technical

Security model based on the principle "never trust, always verify". Every connection must be authenticated and authorized.

Zero-Day

Threats

Vulnerability unknown to vendors and without an available patch, exploited by attackers before public discovery.

Need Expert Guidance?

Our experts help you navigate the complexity of cybersecurity