Security Glossary
Your comprehensive guide to cybersecurity terminology. From basic concepts to advanced techniques.
Browse all cybersecurity terms
Cybersecurity Terms
8 terms found
A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.
The process of verifying the identity of a user, device, or system before granting access to resources.
A network of compromised computers (bots) controlled remotely by cybercriminals to perform malicious activities.
A trusted entity that issues digital certificates to verify the identity of websites, organizations, or individuals.
An attack that attempts to make a service unavailable by overwhelming it with traffic from multiple sources.
The process of converting readable data into an unreadable format to protect it from unauthorized access.
A security system that monitors and controls incoming and outgoing network traffic based on predetermined rules.
A decoy system designed to attract and detect unauthorized access attempts or malicious activities.