Cybersecurity & Cloud Glossary
Clear, practitioner-friendly definitions for the terms security and cloud teams rely on every day.
API Security
1 definition focused on day-to-day security work.
Accessibility
1 definition focused on day-to-day security work.
Application Security
1 definition focused on day-to-day security work.
Attack Methods
2 definitions focused on day-to-day security work.
Brute Force Attack
Attack MethodsA trial-and-error method of guessing passwords, encryption keys, or credentials by systematically trying all possibilities.
Read definition →Zero-Day Vulnerability
Attack MethodsA previously unknown software vulnerability that attackers exploit before the vendor has released a patch or fix.
Read definition →Automation
4 definitions focused on day-to-day security work.
CI/CD
AutomationContinuous Integration and Continuous Deployment - automated practices for building, testing, and releasing software rapidly and reliably.
Read definition →Cron Job
AutomationA scheduled task that runs automatically at specified times or intervals on Unix-like operating systems.
Read definition →Task Automation
AutomationUsing software to perform repetitive tasks automatically, reducing manual effort and errors.
Read definition →Terraform
AutomationAn open-source infrastructure-as-code tool that enables teams to define, provision, and manage cloud infrastructure using declarative configuration files.
Read definition →Character Encoding
1 definition focused on day-to-day security work.
Cloud Infrastructure
4 definitions focused on day-to-day security work.
AWS (Amazon Web Services)
Cloud InfrastructureAmazon's comprehensive cloud computing platform offering over 200 services for compute, storage, databases, networking, security, and application development.
Read definition →Azure (Microsoft Azure)
Cloud InfrastructureMicrosoft's cloud computing platform providing integrated services for compute, analytics, storage, networking, AI, and enterprise applications.
Read definition →CDN (Content Delivery Network)
Cloud InfrastructureA geographically distributed network of servers that cache and deliver web content from locations closest to end users, improving performance and reliability.
Read definition →Kubernetes
Cloud InfrastructureAn open-source container orchestration platform that automates deployment, scaling, and management of containerized applications across clusters of hosts.
Read definition →Cloud Security
3 definitions focused on day-to-day security work.
Cloud Security Posture Management (CSPM)
Cloud SecurityContinuous monitoring and remediation of cloud misconfigurations across accounts, services, and regions.
Read definition →Cloud Workload Protection Platform (CWPP)
Cloud SecuritySecurity tooling that safeguards cloud-native workloads—containers, serverless functions, and VMs—across build and runtime.
Read definition →Shared Responsibility Model
Cloud SecurityA framework that outlines which security tasks the cloud provider handles versus what the customer must secure.
Read definition →Computer Science
2 definitions focused on day-to-day security work.
Distributed System
Computer ScienceA collection of independent computers that appear to users as a single coherent system.
Read definition →Hexadecimal (Base-16)
Computer ScienceA numbering system using 16 symbols (0-9, A-F) commonly used in computing for compact binary representation.
Read definition →Content & Design
2 definitions focused on day-to-day security work.
Content Placeholder
Content & DesignTemporary text or media used in design mockups to represent actual content before it is available.
Read definition →Web Design
Content & DesignThe process of creating the visual appearance, layout, and user experience of websites and web applications.
Read definition →Cryptography
5 definitions focused on day-to-day security work.
Caesar Cipher (ROT13)
CryptographyA simple substitution cipher that shifts letters by a fixed number of positions in the alphabet.
Read definition →Cipher Algorithm
CryptographyA mathematical procedure for encrypting and decrypting data to protect confidentiality.
Read definition →Cryptographic Hash Function
CryptographyA one-way mathematical algorithm that converts data into a fixed-size string, used for integrity verification and password storage.
Read definition →TLS/SSL (Transport Layer Security / Secure Sockets Layer)
CryptographyCryptographic protocols that provide secure communication over networks by encrypting data in transit.
Read definition →XOR Cipher
CryptographyAn encryption method using the XOR (exclusive or) operation to combine plaintext with a key.
Read definition →Data Formats
2 definitions focused on day-to-day security work.
CSV (Comma-Separated Values)
Data FormatsA simple file format for tabular data where each line is a row and columns are separated by commas.
Read definition →Data Serialization
Data FormatsThe process of converting data structures into a format that can be stored or transmitted and reconstructed later.
Read definition →Data Management
1 definition focused on day-to-day security work.
Data Protection
1 definition focused on day-to-day security work.
Data Validation
1 definition focused on day-to-day security work.
Database
1 definition focused on day-to-day security work.
Design
3 definitions focused on day-to-day security work.
Color Theory
DesignPrinciples and guidelines for combining colors to create visually harmonious and effective designs.
Read definition →RGB Color Model
DesignAn additive color model using Red, Green, and Blue light to create a spectrum of colors for digital displays.
Read definition →Typography
DesignThe art and technique of arranging type to make written language legible, readable, and visually appealing.
Read definition →Development
10 definitions focused on day-to-day security work.
API (Application Programming Interface)
DevelopmentA set of rules and protocols that allows different software applications to communicate and exchange data.
Read definition →Cron Expression
DevelopmentA time-based job scheduling syntax using five or six fields to specify when tasks should run.
Read definition →Diff Algorithm
DevelopmentA computational method for comparing two sets of data and identifying differences between them.
Read definition →JSON (JavaScript Object Notation)
DevelopmentA lightweight data interchange format using human-readable text to represent structured data.
Read definition →Markdown
DevelopmentA lightweight markup language that uses plain text formatting to create structured documents.
Read definition →Regular Expressions (Regex)
DevelopmentPattern-matching syntax used to search, validate, and manipulate text based on rules.
Read definition →Text Diff (Difference)
DevelopmentA comparison showing line-by-line or character-by-character changes between two versions of text.
Read definition →Universally Unique Identifier (UUID)
DevelopmentA 128-bit identifier guaranteed to be unique across space and time without central coordination.
Read definition →Unix Timestamp
DevelopmentThe number of seconds elapsed since January 1, 1970 00:00:00 UTC (the Unix epoch).
Read definition →Webhook
DevelopmentAn HTTP callback that delivers real-time data from one application to another when a specific event occurs.
Read definition →Email Security
4 definitions focused on day-to-day security work.
DKIM (DomainKeys Identified Mail)
Email SecurityEmail authentication method that uses cryptographic signatures to verify that email content has not been tampered with in transit.
Read definition →DMARC (Domain-based Message Authentication, Reporting, and Conformance)
Email SecurityEmail validation system that builds on SPF and DKIM to prevent email spoofing and provide reporting on email authentication failures.
Read definition →Email Headers
Email SecurityMetadata attached to emails that shows routing information, authentication results, and delivery path.
Read definition →SPF (Sender Policy Framework)
Email SecurityEmail authentication method that specifies which mail servers are authorized to send email on behalf of your domain.
Read definition →Encoding
2 definitions focused on day-to-day security work.
Base64 Encoding
EncodingA binary-to-text encoding scheme that converts binary data into ASCII characters for safe transmission over text-based protocols.
Read definition →URL Encoding (Percent Encoding)
EncodingA mechanism for encoding special characters in URLs using percent signs followed by hexadecimal values.
Read definition →File Formats
1 definition focused on day-to-day security work.
Forensics
1 definition focused on day-to-day security work.
Identity & Access Management
6 definitions focused on day-to-day security work.
Authentication vs Authorization
Identity & Access ManagementAuthentication verifies who you are, while authorization determines what you can do.
Read definition →Identity and Access Management (IAM)
Identity & Access ManagementThe policies and technologies used to verify identities, govern permissions, and log access across systems.
Read definition →Multi-Factor Authentication (MFA)
Identity & Access ManagementAn authentication method that requires users to provide two or more verification factors to gain access.
Read definition →OAuth (Open Authorization)
Identity & Access ManagementAn open standard for delegated access authorization that allows applications to access user resources without exposing credentials.
Read definition →Privileged Access Management (PAM)
Identity & Access ManagementA framework for securing and auditing accounts with elevated permissions, such as admins, service accounts, and break-glass users.
Read definition →Session Management
Identity & Access ManagementThe process of securely maintaining user state and authentication across multiple HTTP requests.
Read definition →Networking
8 definitions focused on day-to-day security work.
Domain Name System (DNS)
NetworkingThe hierarchical naming system that translates human-readable domain names into IP addresses.
Read definition →IP Address Geolocation
NetworkingThe process of determining the geographic location of an internet-connected device using its IP address.
Read definition →MAC Address
NetworkingA unique hardware identifier assigned to network interfaces for local network communication.
Read definition →Network Protocol
NetworkingA set of rules defining how data is transmitted and received over a network.
Read definition →OUI (Organizationally Unique Identifier)
NetworkingThe first three bytes of a MAC address, assigned by IEEE to identify the manufacturer of a network device.
Read definition →Port Numbers
NetworkingNumerical identifiers (0-65535) used to route network traffic to specific services on a device.
Read definition →Subnet Mask
NetworkingA 32-bit number that divides an IP address into network and host portions for routing.
Read definition →WHOIS Database
NetworkingA public directory that stores registration information for domain names and IP address blocks.
Read definition →Networking & DNS
1 definition focused on day-to-day security work.
PKI & Certificates
3 definitions focused on day-to-day security work.
Certificate Transparency (CT)
PKI & CertificatesA public logging system that records all SSL/TLS certificates, enabling detection of misissued or malicious certificates.
Read definition →Public Key Infrastructure (PKI)
PKI & CertificatesA framework of policies, processes, and technologies for managing digital certificates and public-key encryption.
Read definition →X.509 Certificate
PKI & CertificatesA digital certificate standard that binds a public key to an identity, enabling encrypted connections and authentication.
Read definition →Privacy
1 definition focused on day-to-day security work.
Risk & Compliance
4 definitions focused on day-to-day security work.
Compliance Penalty
Risk & ComplianceFinancial fines and sanctions imposed for failing to meet regulatory data protection and security requirements.
Read definition →GDPR
Risk & ComplianceThe General Data Protection Regulation is the EU's comprehensive data privacy law that governs how organizations collect, process, and protect personal data.
Read definition →HIPAA
Risk & ComplianceThe Health Insurance Portability and Accountability Act establishes standards for protecting sensitive patient health information in the United States.
Read definition →SOC 2
Risk & ComplianceService Organization Control 2 is an auditing standard for service providers that store customer data, focusing on security, availability, processing integrity, confidentiality, and privacy.
Read definition →Risk & Resilience
10 definitions focused on day-to-day security work.
Business Impact Analysis (BIA)
Risk & ResilienceAn assessment that identifies critical business processes and quantifies the impact of their disruption.
Read definition →Cyber Insurance
Risk & ResilienceInsurance coverage that protects organizations against financial losses from cyberattacks and data breaches.
Read definition →Data Breach Cost
Risk & ResilienceThe total financial impact of a security incident, including detection, response, notification, and long-term damages.
Read definition →Incident Response Plan (IRP)
Risk & ResilienceA documented, tested approach for detecting, containing, and recovering from cybersecurity incidents.
Read definition →MITRE ATT&CK Framework
Risk & ResilienceA globally accessible knowledge base of adversary tactics, techniques, and procedures mapped to the attack lifecycle.
Read definition →Ransomware
Risk & ResilienceMalware that encrypts systems or exfiltrates data, demanding payment to restore access or prevent disclosure.
Read definition →Recovery Point Objective (RPO)
Risk & ResilienceThe maximum acceptable amount of data loss measured in time, defining how far back systems must be restored after an incident.
Read definition →Recovery Time Objective (RTO)
Risk & ResilienceThe maximum acceptable downtime for a system or service before business impact becomes unacceptable.
Read definition →Return on Security Investment (ROSI)
Risk & ResilienceA metric that quantifies the financial benefit of security investments relative to their cost.
Read definition →Risk Assessment
Risk & ResilienceA systematic process of identifying, analyzing, and evaluating cybersecurity risks to inform treatment decisions.
Read definition →Security
1 definition focused on day-to-day security work.
Security Foundations
3 definitions focused on day-to-day security work.
Attack Surface
Security FoundationsThe total number of points where an unauthorized user could try to enter data into, or extract data from, an environment.
Read definition →Principle of Least Privilege (PoLP)
Security FoundationsThe practice of granting users and services the minimum access they need to perform their duties.
Read definition →Zero Trust Architecture
Security FoundationsA security model that assumes breach, requiring continuous verification of every user, device, and workload regardless of location.
Read definition →Security Infrastructure
3 definitions focused on day-to-day security work.
Certificate Authority (CA)
Security InfrastructureA trusted entity that issues, validates, and revokes digital certificates used for secure communications.
Read definition →Firewall
Security InfrastructureA security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Read definition →VPN (Virtual Private Network)
Security InfrastructureAn encrypted network connection that creates a secure tunnel between a device and a remote network over the internet.
Read definition →Security Operations
6 definitions focused on day-to-day security work.
Endpoint Detection and Response (EDR)
Security OperationsSecurity software that monitors endpoints for malicious activity, enabling rapid detection and containment.
Read definition →Managed Detection and Response (MDR)
Security OperationsA security service that combines technology and human expertise to detect, investigate, and respond to threats 24/7.
Read definition →Security Information and Event Management (SIEM)
Security OperationsA platform that ingests security telemetry, correlates events, and surfaces alerts for investigation.
Read definition →Security Operations Center (SOC)
Security OperationsA dedicated function responsible for monitoring, detecting, and responding to cybersecurity threats in real time.
Read definition →Virtual Chief Information Security Officer (vCISO)
Security OperationsAn outsourced executive who provides strategic cybersecurity leadership and governance without the cost of a full-time hire.
Read definition →Vulnerability Management
Security OperationsThe continuous process of identifying, prioritizing, and remediating security weaknesses in systems and applications.
Read definition →Security Testing
1 definition focused on day-to-day security work.
Threat Intelligence
5 definitions focused on day-to-day security work.
IP Reputation
Threat IntelligenceA trustworthiness score assigned to IP addresses based on observed behavior, used to identify malicious traffic.
Read definition →Malware
Threat IntelligenceMalicious software designed to damage, disrupt, or gain unauthorized access to computer systems and data.
Read definition →Phishing
Threat IntelligenceA social engineering attack that uses fraudulent communications to trick recipients into revealing sensitive information or installing malware.
Read definition →Threat Intelligence
Threat IntelligenceEvidence-based knowledge about existing or emerging threats used to inform security decisions and response.
Read definition →URL/Domain Defanging
Threat IntelligenceA technique to render URLs and IPs non-clickable by replacing characters, preventing accidental access to malicious sites.
Read definition →Utilities
3 definitions focused on day-to-day security work.
Lorem Ipsum
UtilitiesPlaceholder text used in design and publishing to demonstrate visual form without meaningful content.
Read definition →QR Code
UtilitiesA two-dimensional barcode that stores data in a matrix pattern, readable by cameras and smartphones.
Read definition →Timezone Conversion
UtilitiesThe process of translating time from one geographic timezone to another, accounting for UTC offsets and daylight saving time.
Read definition →Vulnerability Management
1 definition focused on day-to-day security work.
Web Security
9 definitions focused on day-to-day security work.
Cross-Site Request Forgery (CSRF)
Web SecurityAn attack that tricks a victim into submitting unauthorized requests using their authenticated session.
Read definition →Cross-Site Scripting (XSS)
Web SecurityA web security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
Read definition →HTML Entity Encoding
Web SecurityA method of representing special characters in HTML using named or numeric references to prevent interpretation as code.
Read definition →HTTP Cookie
Web SecuritySmall pieces of data stored by web browsers, used for session management, personalization, and tracking.
Read definition →HTTP Security Headers
Web SecurityResponse headers that enable browser security protections against common web attacks.
Read definition →JSON Web Token (JWT)
Web SecurityA compact, URL-safe token format used to securely transmit claims between parties in web applications.
Read definition →Subresource Integrity (SRI)
Web SecurityA security feature that allows browsers to verify that files from CDNs have not been tampered with.
Read definition →Typosquatting
Web SecurityRegistering domain names similar to popular sites by exploiting common typing errors to deceive users.
Read definition →URL Redirection
Web SecurityA technique that forwards users from one URL to another, often used for site migrations or link shortening.
Read definition →Web Technologies
5 definitions focused on day-to-day security work.
API Endpoint
Web TechnologiesA specific URL where an API can be accessed, representing a function or resource in a web service.
Read definition →HTTP Status Codes
Web TechnologiesThree-digit codes returned by web servers to indicate the result of an HTTP request.
Read definition →Link Rot
Web TechnologiesThe phenomenon where hyperlinks become permanently unavailable as web pages are moved or deleted.
Read definition →URL (Uniform Resource Locator)
Web TechnologiesA web address that specifies the location of a resource on the internet, composed of protocol, domain, path, and optional parameters.
Read definition →User Agent String
Web TechnologiesA text string sent by web browsers to identify the browser, operating system, and device to web servers.
Read definition →Web Tools
1 definition focused on day-to-day security work.