The Cyber Glossary: Comprehensive Cybersecurity Terms
Browse alphabetically or search directly for the cybersecurity terms your team needs right now.Learn more about our mission.
A
- a mod bDefinition
- a1, ...aiDefinition
- Acceptable Use AgreementDefinition
- AccessDefinition
- Access and Identity ManagementDefinition
- Access ComplexityDefinition
- Access ControlDefinition
- Access Control EntryDefinition
- Access Control MatrixDefinition
- Access Control MechanismDefinition
- Access Control ModelDefinition
- Access Control PolicyDefinition
- Access Control Policy ToolDefinition
- Access Control RuleDefinition
- Access Control Rule Logic Circuit SimulationDefinition
- Access Control SystemDefinition
- Access Cross Domain Solution(Access Cross Domain Solution)
- Access LevelDefinition
- Access Level ControlDefinition
- Access ListDefinition
- Access ManagementDefinition
- Access Point (AP)(Access Point)
- Access Point Name(Access Point Name)
- Access ProfileDefinition
- Access Program (SAP)(Special Access Program)
- Access Rights ManagementDefinition
- Access StrumDefinition
- Access TypeDefinition
- Access VectorDefinition
- AcquirerDefinition
- AcquisitionDefinition
- Acquisition, Development, and Installation ControlsDefinition
- Active AttackDefinition
- Active ContentDefinition
- Active DirectoryDefinition
- Active Directory Authentication LibraryDefinition
- Active Directory Certificate Services(Active Directory Certificate Services)
- Active Directory Federation Services(Active Directory Federation Services)
- Active Directory Forest RecoveryDefinition
- Active Directory ServicesDefinition
- Active Directory/Domain Name SystemDefinition
- AD(Active Directory)
- AD DS(Active Directory Domain Services)
- AD FS(Active Directory Federation Services)
- Ad Hoc Health Information Exchanges (HIEs)(Health Information Exchange)
- Ad Hoc NetworkDefinition
- AD/DNS(Active Directory/Domain Name System)
- ADAL(Azure Active Directory Authentication Library)
- AdaptabilityDefinition
- Adaptive Network ControlDefinition
- Adaptive Security ApplianceDefinition
- ADC(Application Delivery Controller)
- ADCS(Active Directory Certificate Services)
- AdditionDefinition
- Adequate SecurityDefinition
- ADFR(Automated Digital Forensics Recovery)
- ADFS(Active Directory Federation Services)
- ADFSL(Association of Digital Forensics, Security and Law)
- Administration Control CenterDefinition
- Administrative DomainDefinition
- Administrative Incident (COMSEC)Definition
- ADP(Alternate Data Streams)
- ADRSC(Address Compressed)
- ADS(Alternate Data Streams)
- Advanced Configuration and Power InterfaceDefinition
- Advanced Cyber ThreatDefinition
- Advanced Encryption StandardDefinition
- Advanced Encryption Standard-Cipher Block ChainingDefinition
- Advanced Encryption Standard-Cipher-based Message Authentication CodeDefinition
- Advanced Encryption Standard-Counter ModeDefinition
- Advanced Encryption Standard-eXtended Cipher Block ChainingDefinition
- Advanced Encryption Standard-Galois Counter ModeDefinition
- Advanced Encryption Standard-Galois Message Authentication CodeDefinition
- Advanced Encryption Standard–Counter with CBC-MACDefinition
- Advanced Key ProcessorDefinition
- Advanced Malware ProtectionDefinition
- Advanced Multi-Layered Unification FilesystemDefinition
- Advanced Network Technologies DivisionDefinition
- Advanced Persistent ThreatDefinition
- Advanced Persistent ThreatsDefinition
- Advanced Reduced Instruction Set Computing (RISC) Machine(ARM)
- Advanced Research Projects AgencyDefinition
- Advanced Satellite Multimedia Systems ConferenceDefinition
- Advanced Technology Academic Research CenterDefinition
- Advanced Technology Attachment(Integrated Drive Electronics)
- Advanced Threat ProtectionDefinition
- Advanced Threat Protection: NetworkDefinition
- Advancement of Medical InstrumentationDefinition
- Adversarial Machine LearningDefinition
- Adversarial Tactics, Techniques & Common KnowledgeDefinition
- AdversaryDefinition
- Adverse ConsequenceDefinition
- AdversityDefinition
- AdvisoryDefinition
- AE(Authenticated Encryption)
- AE Title(Application Entity Title)
- AEAD(Authenticated Encryption with Associated Data)
- AES(Advanced Encryption Standard)
- AES Key WrapDefinition
- AES Key Wrap with PaddingDefinition
- AES New Instructions(Advanced Encryption Standard New Instructions)
- AES-CBC(Advanced Encryption Standard - Cipher Block Chaining)
- AES-CCM(Advanced Encryption Standard with Counter with Cipher Block Chaining-Message Authentication Code)
- AES-CMAC(Advanced Encryption Standard - Cipher-based Message Authentication Code)
- AES-CTR(Advanced Encryption Standard - Counter mode)
- AES-GCM(Advanced Encryption Standard with Galois/Counter Mode)
- AES-GMAC(Advanced Encryption Standard - Galois Message Authentication Code)
- AES-NI(Advanced Encryption Standard New Instructions)
- AES-XCBC(Advanced Encryption Standard eXtended Cipher Block Chaining)
- AF(Augmented Firewall)
- Affine TransformationDefinition
- AFPMDefinition
- AFR(Annualized Failure Rate)
- AFRL(Air Force Research Laboratory)
- After Action ReportDefinition
- AFW(Application Firewall)
- AGA(American Gas Association)
- AgencyDefinition
- Agency DashboardDefinition
- Agency Financial ReportDefinition
- Agency for Healthcare Research and Quality(AHRQ)
- Agency-Wide Adaptive Risk Enumeration(AWARE)
- AgentDefinition
- AggregateDefinition
- Aggregated InformationDefinition
- AggregationDefinition
- AgilityDefinition
- AgreementDefinition
- AH(Authentication Header)
- AHA(Attack Helvetia Assessment)
- AHRQ(Agency for Healthcare Research and Quality)
- AI(Artificial Intelligence)
- AI/ML(Artificial Intelligence / Machine Learning)
- AIA(Artificial Intelligence Assistant)
- AIAA(Automated Indicator and Action Aggregator)
- AIaaS(Artificial Intelligence as a Service)
- AIC(Automation, Integration, and Collaboration)
- AID(Application Identifier)
- AIDC(Automatic Identification and Data Capture)
- AIK(Attestation Identity Key)
- AIM(AOL Instant Messenger)
- Air Force Research LaboratoryDefinition
- Air GapDefinition
- AirdropDefinition
- AIS(Automated Indicator Sharing)
- AIT(Adaptive Intelligent Threat)
- AJAX(Asynchronous JavaScript and XML)
- AKA(Authentication and Key Agreement)
- AKM(Automated Key Management)
- AKP(Advanced Key Protection)
- Alaris System MaintenanceDefinition
- ALC(Application Lifecycle Configuration)
- ALE(Annualized Loss Expectancy)
- AlertDefinition
- ALG(Application Layer Gateway)
- AlgorithmDefinition
- Algorithm IdentifierDefinition
- Algorithm Originator-Usage PeriodDefinition
- Algorithm Security LifetimeDefinition
- Algorithmic OptimizationDefinition
- Algorithms for Intrusion MeasurementDefinition
- All Source IntelligenceDefinition
- Allan DeviationDefinition
- Alliance for Telecommunications Industry SolutionsDefinition
- Allied NationDefinition
- AllocationDefinition
- AllowedDefinition
- allowlistDefinition
- ALM/PLM(Application Lifecycle Management/Product Lifecycle Management)
- AlphabetDefinition
- Alphabet SizeDefinition
- Also Known AsDefinition
- Alternate COMSEC Account ManagerDefinition
- Alternate COMSEC CustodianDefinition
- Alternate Data StreamDefinition
- Alternate FacilityDefinition
- Alternate MAC/PHYDefinition
- Alternating CurrentDefinition
- AMA(American Medical Association)
- Amazon Web ServicesDefinition
- Ambiguity RuleDefinition
- AMCIS(Association for the Management of Information Systems)
- AMD Platform Secure BootDefinition
- AMD PSB(AMD Platform Secure Boot)
- AMD Security ProcessorDefinition
- American Chemistry CouncilDefinition
- American Fuel and Petrochemical ManufacturersDefinition
- American Gas AssociationDefinition
- American Hospital AssociationDefinition
- American Hospital Association Preferred Cybersecurity ProviderDefinition
- American Institute of Aeronautics and AstronauticsDefinition
- American Medical AssociationDefinition
- American National StandardDefinition
- American National Standards InstituteDefinition
- American National Standards Institute/International Committee for Information Technology StandardsDefinition
- American Petroleum InstituteDefinition
- American Public Power AssociationDefinition
- American Registry for Internet NumbersDefinition
- American Standard Code for Information Interchange(ASCII)
- American Water Works AssociationDefinition
- AnalyzeDefinition
- AnonymityDefinition
- AnonymizationDefinition
- Anonymized DataDefinition
- Anonymized InformationDefinition
- AnonymizersDefinition
- Anonymous IdentifierDefinition
- ANS(Autonomous Network Security)
- ANSI(American National Standards Institute)
- ANSI/INCITS(American National Standards Institute / InterNational Committee for Information Technology Standards)
- ANSI/NIST-ITL(American National Standards Institute/National Institute of Standards and Technology - Information Technology Laboratory)
- anti-CSRFDefinition
- Anti-ForensicDefinition
- Anti-JamDefinition
- Anti-Signal FingerprintDefinition
- Anti-Signal SpoofDefinition
- Anti-SpoofDefinition
- Anti-TamperDefinition
- Anti-tamperingDefinition
- AntispoofingDefinition
- Antispyware SoftwareDefinition
- AntivirusDefinition
- Antivirus SoftwareDefinition
- AO(Authorizing Official)
- AODR(Authorizing Official Designated Representative)
- AP(Access Point)
- APCO(Association of Public-Safety Communications Officials)
- APCP(Asynchronous Procedure Call Protocol)
- APDU(Application Protocol Data Unit)
- APEC(Fictional Context (Actual Expansion Required))
- Aperiodic Templates TestDefinition
- API(Application Programming Interface)
- APN(Access Point Name)
- APNIC(Asia Pacific Network Information Centre)
- APNS(Apple Push Notification Service)
- App ID(Application Identifier)
- APPA(Automated Privacy Policy Analysis)
- AppAuthDefinition
- Apple Push NotificationDefinition
- Apple Push Notification SystemDefinition
- Applicability StatementDefinition
- ApplicantDefinition
- ApplicationDefinition
- Application AllowlistingDefinition
- Application Authentication SystemDefinition
- Application Binary InterfaceDefinition
- Application Delivery ControllerDefinition
- Application Entity TitleDefinition
- Application FirewallDefinition
- Application IdentificationDefinition
- Application IdentifierDefinition
- Application InterconnectionDefinition
- Application Interface Capability ProvidedDefinition
- Application LayerDefinition
- Application Level GatewayDefinition
- Application Lifecycle Management / Product Lifecycle ManagementDefinition
- Application Programming Interface(API)
- Application Protocol Data UnitDefinition
- Application Security TestingDefinition
- Application SessionDefinition
- Application Specific Integrated CircuitDefinition
- Application TranslationDefinition
- Application VirtualizationDefinition
- Application WhitelistingDefinition
- Application-Proxy GatewayDefinition
- Application-Specific Integrated Circuits (ASICs)(Application-Specific Integrated Circuits)
- Application-Specific Key Derivation FunctionsDefinition
- Applied Cybersecurity DivisionDefinition
- Apply Cryptographic ProtectionDefinition
- Approval StatusDefinition
- Approval to ConnectDefinition
- Approval to OperateDefinition
- ApprovedDefinition
- Approved Entropy SourceDefinition
- Approved Hash AlgorithmsDefinition
- Approved Security FunctionDefinition
- Approximate Entropy TestDefinition
- AppSec(Application Security)
- APS(Automated Protection Systems)
- APT(Advanced Persistent Threat)
- APU(Accelerated Processing Unit)
- AQL(Arcsight Query Language)
- ArchitectureDefinition
- Architecture and Infrastructure CommitteeDefinition
- Architecture ConstructsDefinition
- Architecture DescriptionDefinition
- Architecture Design PrinciplesDefinition
- Architecture FrameworkDefinition
- Architecture ViewDefinition
- Architecture ViewpointDefinition
- ArchiveDefinition
- Archive FacilityDefinition
- ARF(Abuse Reporting Format)
- Ariel Query LanguageDefinition
- ARIN(American Registry for Internet Numbers)
- ARM(Advanced RISC Machines)
- ARMP(Advanced Risk Management Protocol)
- ARP(Address Resolution Protocol)
- ARPA(Advanced Research Projects Agency)
- ArrayDefinition
- Assessment ApproachDefinition
- Assessment BoundaryDefinition
- Assessment CompletenessDefinition
- Assessment Criterion/CriteriaDefinition
- Assessment ElementDefinition
- Assessment Element AttributeDefinition
- Assessment Element TextDefinition
- Assessment FindingsDefinition
- Assessment MethodDefinition
- Assessment ObjectDefinition
- Assessment ObjectiveDefinition
- Assessment PlanDefinition
- Assessment ProcedureDefinition
- Assessment TimelinessDefinition
- AssessorDefinition
- AssetDefinition
- Asset FrameworkDefinition
- Asset IdentificationDefinition
- Asset Identification ElementDefinition
- Asset ReportDefinition
- Asset Report RequestDefinition
- Asset Reporting FormatDefinition
- Asset Reporting Format ReportDefinition
- Asset TagDefinition
- Assignment OperationDefinition
- Assignment StatementDefinition
- Associated DataDefinition
- AssociationDefinition
- Association for Advancing AutomationDefinition
- Association for Automatic Identification and MobilityDefinition
- Association for the Advancement of Medical InstrumentationDefinition
- Association of Metropolitan Water AgenciesDefinition
- Association of Public Safety Communications OfficialsDefinition
- Association of State Dam Safety OfficialsDefinition
- AssumptionDefinition
- AssuranceDefinition
- Assurance CaseDefinition
- Assurance EvidenceDefinition
- Assurance MessageDefinition
- Assurance of Domain Parameter ValidityDefinition
- Assurance of IntegrityDefinition
- Assurance of possessionDefinition
- Assurance of Public Key ValidityDefinition
- Assurance of ValidityDefinition
- Assurance SignatureDefinition
- assurance_timeDefinition
- Assured Information SharingDefinition
- Assured SoftwareDefinition
- AST(Application Security Testing)
- ASTM(American Society for Testing and Materials)
- Asymmetric CryptographyDefinition
- Asymmetric-key cryptographyDefinition
- Asymptotic AnalysisDefinition
- Asymptotic DistributionDefinition
- Asynchronous Connection-LessDefinition
- Asynchronous JavaScript and XML(AJAX)
- Asynchronous Transfer Mode(ATM)
- ATE(Automated Test Equipment)
- AttackDefinition
- Attack MethodDefinition
- Attack ModeDefinition
- attack pathDefinition
- Attack PatternDefinition
- Attack Sensing and WarningDefinition
- Attack SignatureDefinition
- Attack SurfaceDefinition
- Attack TreeDefinition
- AttackerDefinition
- AuditDefinition
- Audit AdministratorDefinition
- Audit and AccountabilityDefinition
- Audit LogDefinition
- Audit RecordDefinition
- Audit Record ReductionDefinition
- Audit Reduction ToolsDefinition
- Audit TrailDefinition
- AuditorDefinition
- AUFS(Another Union File System)
- Authenticable EntityDefinition
- AuthenticateDefinition
- Authenticated Ciphering OffsetDefinition
- Authenticated Code ModuleDefinition
- Authenticated Code Random Access MemoryDefinition
- Authenticated Configuration ScannerDefinition
- Authenticated DataDefinition
- Authenticated DecryptionDefinition
- Authenticated EncryptionDefinition
- Authenticated Encryption FunctionDefinition
- Authenticated Protected ChannelDefinition
- Authenticated RFIDDefinition
- Authenticated-Decryption FunctionDefinition
- AuthenticationDefinition
- Authentication and Authorization ServiceDefinition
- Authentication and Key AgreementDefinition
- Authentication and Key ManagementDefinition
- Authentication CenterDefinition
- Authentication CodeDefinition
- Authentication FactorDefinition
- Authentication Header (AH)(Authentication Header)
- Authentication InformationDefinition
- Authentication IntentDefinition
- Authentication KeyDefinition
- Authentication MechanismDefinition
- Authentication PeriodDefinition
- Authentication ProtocolDefinition
- Authentication Protocol RunDefinition
- Authentication SecretDefinition
- Authentication ServerDefinition
- Authentication TagDefinition
- Authentication TokenDefinition
- Authentication, Authorization, and Accounting(AAA)
- Authentication, Authorization, and Accounting KeyDefinition
- AuthenticatorDefinition
- Authenticator Assurance Level (AAL)(Authenticator Assurance Level)
- Authenticator OutputDefinition
- Authenticator SecretDefinition
- Authenticator TypeDefinition
- Authenticator-Specific ModuleDefinition
- AuthenticityDefinition
- AuthorDefinition
- Authoritative RRSetDefinition
- Authoritative SourceDefinition
- AuthorityDefinition
- Authority Information AccessDefinition
- Authority to OperateDefinition
- Authority TypeDefinition
- AuthorizationDefinition
- Authorization BoundaryDefinition
- Authorization ComponentDefinition
- authorization packageDefinition
- Authorization ServerDefinition
- Authorization to Operate(Authorization to Operate)
- AuthorizeDefinition
- Authorize ProcessingDefinition
- AuthorizedDefinition
- Authorized Data PublisherDefinition
- Authorized EntityDefinition
- Authorized IDDefinition
- Authorized individuals, services, and other IoT product componentsDefinition
- Authorized KeyDefinition
- Authorized Keys FileDefinition
- Authorized UserDefinition
- Authorized VendorDefinition
- Authorizing OfficialDefinition
- Authorizing Official Designated RepresentativeDefinition
- AUTN(Authentication Token)
- AUTO-ISAC(Automotive Information Sharing and Analysis Center)
- Automated AccessDefinition
- Automated Certificate Management Environment(Automated Certificate Management Environment)
- Automated ChecklistDefinition
- Automated Combinatorial TestingDefinition
- Automated Combinatorial Testing for SoftwareDefinition
- Automated Cryptographic Validation ProtocolDefinition
- Automated Cryptographic Validation Test SystemDefinition
- Automated Indicator SharingDefinition
- Automated Information System SecurityDefinition
- Automated Information System Security ProgramDefinition
- Automated Market MakerDefinition
- Automated ProcessDefinition
- Automated Security MonitoringDefinition
- Automatic Data ProcessingDefinition
- Automatic Identification and Data CaptureDefinition
- Automatic Identification TechnologyDefinition
- Automatic Remote RekeyingDefinition
- Automotive Information Sharing and Analysis CenterDefinition
- Autonomous System (AS)(Autonomous System)
- Autonomous System Number (ASN)(Autonomous System Number)
- Auxiliary Power UnitDefinition
- AV(Antivirus)
- AvailabilityDefinition
- Availability (PNT)(Positioning, Navigation, and Timing)
- Availability ImpactDefinition
- Average Record Matching ProbabilityDefinition
- Aviation Cyber InitiativeDefinition
- AVP(Attribute-Value Pair)
- AWARE(Automated Warning and Response)
- AwarenessDefinition
- Awareness and TrainingDefinition
- Awareness, Training, and Education ControlsDefinition
- AWS(Amazon Web Services)
- AWWA(American Water Works Association)
- AXFR(Authoritative Transfer)