GLOSSARY

ABCDEFGHIJKLMNOPQRSTUVWXYZ

A

ADVANCED PERSISTENT THREAT (APT)

ADWARE

ALGORITHM

B

BACKDOOR

BAD ACTOR

BOTNET ATTACKS

BOTNET

BRUTE FORCE ATTACK

C

CEO FRAUD

CLICKBAIT

CLOUD COMPUTING

CLOUD-BASED

COMPLIANCE

CONTAINER

COOKIE

CRIMEWARE

CYBERCRIME

D

DATA BREACH

DISASTER RECOVERY PLAN

DISTRIBUTED DENIAL-OF-SERVICE (DDoS)

DOMAIN NAME SYSTEM (DNS)

E

ENCRYPTION

F

FIREWALL

G

GLBA

H

HACKER

HELPDESK

HIPAA

HITECH ACT

HUMAN FIREWALL

I

INFORMATION SECURITY

INTERNET OF THINGS (IoT)

INTELLECTUAL PROPERTY (IP)

INTERNET SERVICE PROVIDER (ISP)

J

K

KEYLOGGER

L

LOCAL AREA NETWORK (LAN)

M

MALWARE

MANAGED SERVICE PROVIDER (MSP)

MANAGED SECURITY SERVICE PROVIDER (MSSP)

METROPOLITAN AREA NETWORK (MAN)

MULTI-FACTOR AUTHENTHICATION

N

O

OPEN AUTHENTICATION (OAUTH)

OPTICAL FIBER

P

PATCH

PCI

PERSONALLY IDENTIFIABLE INFORMATION (PII)

PHISHING

PHYSCIAL PLANT

PRETEXTING

PROCESSING

PROTECTED HEALTH INFORMATION (PHI)

Q

R

RANSOMWARE

RECOVERY POINT OBJECTIVE (RPO)

RECOVERY TIME OBJECTIVE (RTO)

REMOTE MONITORING AND MANAGEMENT (RMM)

ROOT

ROOTKIT

ROUTER

S

SECURITY AWARENESS TRAINING (SAT)

SERVER

SMISHING

SNIFFERS

SOCIAL ENGINEERING

SPAM

SPEAR PHISHING

SPYWARE

SSID

STRUCTURED CABLING

T

TAILGATING

TROJAN HORSE

TROJAN LISTENER

 

U

USB

V

VIRUS

VISHING

VOICE OVER IP (VoIP)

W

WHALING

WIDE AREA NETWORK (WAN)

WI-FI PINEAPPLE

WI-FI

WORM

X

Y

Z

ZOMBIE