What are you looking for?
Glossary
Advanced Persistent Threat (APT)
A sophisticated long-term cyberattack in which an unauthorized user gains network access and remains undetected for an extended period.
Read full description
A
a
Asset Inventory
A comprehensive catalog of all hardware, software, and data assets within an organization's environment, essential for effective cybersecurity management.
Read full description
A
a
ATO (Authorization to Operate)
Official government approval allowing an information system to operate within a defined environment, based on accepted risk.
Read full description
A
a
ATT&CK (MITRE ATT&CK)
A globally-accessible knowledge base of adversary tactics and techniques based on real-world observations, used for threat modeling and detection engineering.
Read full description
A
a
Behavioral Analytics
Security technology that establishes baselines of normal user and entity behavior, then detects anomalies that may indicate compromised accounts or insider threats.
Read full description
B
b
Blue Team
The internal security team responsible for defending an organization's systems, networks, and data against cyber threats and attack simulations.
Read full description
B
b
Business Continuity Planning (BCP)
The process of creating systems and procedures to ensure critical business functions continue during and after a disaster or major disruption.
Read full description
B
b
Cloud Security Posture Management (CSPM)
Automated tools and practices that continuously monitor cloud infrastructure configurations to identify and remediate security risks and compliance violations.
Read full description
C
c
CMMC (Cybersecurity Maturity Model Certification)
A DoD framework requiring defense contractors to meet specific cybersecurity standards before being awarded federal contracts.
Read full description
C
c
COTS (Commercial Off-The-Shelf)
Commercially available hardware or software that can be purchased and deployed without custom development, enabling faster deployment and easier maintenance.
Read full description
C
c
CPT (Cyber Protection Team)
U.S. military teams trained to defend DoD networks, conduct vulnerability assessments, and respond to cyber incidents on priority systems.
Read full description
C
c
Credential Stuffing
An automated attack that uses stolen username and password combinations to gain unauthorized access to user accounts across multiple services.
Read full description
C
c
Cyber Kill Chain
A framework developed by Lockheed Martin that describes the stages of a cyberattack from reconnaissance through actions on objectives, used to identify and disrupt attacks.
Read full description
C
c
D3FEND
A MITRE framework that maps defensive cybersecurity techniques to known attack patterns, complementing ATT&CK for blue team operations.
Read full description
D
d
Database
A database is an organized collection of data that can be easily accessed, managed, and updated. It is used to store information in a structured way, allowing for efficient retrieval and manipulation of data.
Read full description
D
d
Data Loss Prevention (DLP)
Security technology and policies that detect and prevent unauthorized access, use, or transmission of sensitive data outside an organization's network.
Read full description
D
d
DevSecOps
The integration of security practices into every phase of the software development lifecycle, ensuring code is secure, compliant, and production-ready by default.
Read full description
D
d
Digital Forensics
The process of collecting, preserving, analyzing, and presenting digital evidence from computers, networks, and storage devices in support of investigations.
Read full description
D
d
EDR (Endpoint Detection and Response)
Security technology that continuously monitors endpoints to detect, investigate, and respond to advanced threats in real time.
Read full description
E
e
Endpoint Protection Platform (EPP)
Comprehensive security software deployed on endpoints to prevent, detect, and respond to malware, exploits, and other cyber threats.
Read full description
E
e
Exploit
A piece of software or technique that takes advantage of a vulnerability in a system to cause unintended behavior or gain unauthorized access.
Read full description
E
e
FedRAMP
A U.S. government program providing a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.
Read full description
F
f
Firewall
A network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Read full description
F
f
FISMA (Federal Information Security Management Act)
U.S. federal legislation that defines a comprehensive framework for protecting government information, operations, and assets against natural and man-made threats.
Read full description
F
f
Front-End Development
Client-side development focused on what users see and interact with.
Read full description
F
f
Fulfillment
The process of receiving, packaging, and shipping orders for goods.
Read full description
F
f
Full-Stack Developer
A developer proficient in both front-end and back-end development.
Read full description
F
f
Functional Skills
The essential literacy and numeracy skills that apprentices need to succeed in their chosen field (reading, writing, comprehension, computer skills, among others).
Read full description
F
f
Gateway
A network node that connects two different networks and allows data to flow between them.
Read full description
G
g
Honeypot
A decoy system or network designed to attract and detect unauthorized access attempts, providing intelligence on attacker techniques and behavior.
Read full description
H
h
ICS (Industrial Control Systems)
Specialized systems used to monitor and control physical infrastructure and industrial processes, increasingly targeted by sophisticated cyber threats.
Read full description
I
i
Identity and Access Management (IAM)
The framework of policies and technologies that ensures the right individuals access the right resources at the right times and for the right reasons.
Read full description
I
i
Incident Response (IR)
A structured methodology for detecting, containing, and recovering from security breaches to minimize damage and restore normal operations quickly.
Read full description
I
i
Lateral Movement
The techniques attackers use to progressively move through a network after initial compromise, seeking higher-value targets and expanding their access.
Read full description
L
l
Malware
Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems, including viruses, ransomware, trojans, and spyware.
Read full description
M
m
MTTR (Mean Time to Respond)
The average time required to detect and contain a security incident — a key KPI for measuring SOC efficiency and operational maturity.
Read full description
M
m
Multi-Factor Authentication (MFA)
A security mechanism requiring users to verify their identity using two or more independent factors before gaining access to a system or application.
Read full description
M
m
Network Segmentation
The practice of dividing a computer network into smaller subnetworks to improve security and limit the spread of breaches within an organization's environment.
Read full description
N
n
NIST 800-53
A catalog of security and privacy controls published by NIST for federal information systems, widely used as a compliance baseline for government and enterprise environments.
Read full description
N
n
OSINT (Open Source Intelligence)
The collection and analysis of information from publicly available sources to support threat intelligence, investigations, and security assessments.
Read full description
O
o
OT (Operational Technology)
Hardware and software that monitors and controls physical devices, processes, and events in industrial and critical infrastructure environments.
Read full description
O
o
Patch Management
The systematic process of identifying, acquiring, testing, and applying software updates to fix vulnerabilities and improve system security and stability.
Read full description
P
p
Penetration Testing
A simulated cyberattack conducted by authorized professionals to identify vulnerabilities in systems, networks, and applications before real attackers do.
Read full description
P
p
Phishing
A social engineering attack that uses deceptive emails, messages, or websites to trick users into revealing credentials, downloading malware, or transferring funds.
Read full description
P
p
Privileged Access Management (PAM)
Security solutions that manage, monitor, and control elevated access rights for users, accounts, and systems across an IT environment.
Read full description
P
p
Ransomware
Malicious software that encrypts a victim's data or locks systems and demands payment for restoration, representing one of the most damaging cyber threats today.
Read full description
R
r
Red Team
An independent group that simulates real-world adversary tactics to test and improve an organization's detection and response capabilities.
Read full description
R
r
RMF (Risk Management Framework)
A structured NIST process for integrating security, privacy, and cyber supply chain risk management into the system development lifecycle.
Read full description
R
r
Security Awareness Training
Educational programs designed to help employees recognize, avoid, and report cybersecurity threats including phishing, social engineering, and policy violations.
Read full description
S
s
Security Operations Center (SOC)
A centralized team and facility that continuously monitors, detects, analyzes, and responds to cybersecurity incidents across an organization's environment.
Read full description
S
s
SIEM (Security Information and Event Management)
A platform that aggregates and analyzes security data from across an organization's environment to detect threats and generate alerts in real time.
Read full description
S
s
SOAR (Security Orchestration Automation and Response)
Technology that automates security workflows, orchestrates tools, and accelerates incident response — transforming manual SOC tasks into intelligent, repeatable processes.
Read full description
S
s
SOAR (Security Orchestration, Automation and Response)
Technology that automates security workflows, orchestrates tools, and accelerates incident response — transforming manual SOC tasks into intelligent, repeatable processes.
Read full description
S
s
Supply Chain Security
The practice of identifying and mitigating cybersecurity risks introduced through an organization's vendors, suppliers, software dependencies, and third-party services.
Read full description
S
s
Threat Hunting
A proactive security practice where analysts actively search for hidden threats and adversaries within an organization's environment before alerts are triggered.
Read full description
T
t
Threat Intelligence
Actionable information about cyber threats, threat actors, and their tactics, techniques, and procedures, used to inform and improve defensive security decisions.
Read full description
T
t
TTPs (Tactics Techniques and Procedures)
The behavior patterns and methods used by threat actors to plan and execute cyberattacks, used to build threat-informed defenses.
Read full description
T
t
Vulnerability Management
The continuous practice of identifying, classifying, prioritizing, remediating, and mitigating vulnerabilities across an organization's technology environment.
Read full description
V
v
Vulnerability Scanning
Automated identification and analysis of security weaknesses in systems, networks, and applications to prioritize remediation efforts.
Read full description
V
v
Web Application Firewall (WAF)
A security solution that monitors, filters, and blocks HTTP traffic to and from web applications, protecting against application-layer attacks.
Read full description
W
w
Zero Trust
A security model based on the principle of never trust always verify — requiring continuous authentication and authorization for every user device and connection regardless of location.
Read full description
Z
z
