Adware
Software that automatically displays or downloads unwanted advertising material when a user is online, potentially posing a security risk.
Anomaly Detection
The practice of identifying unusual patterns or behaviors in network traffic or system activities that may indicate a security threat.
Anti-Malware
Software designed to detect, protect against, and remove malicious software such as viruses, worms, and trojans.
APT (Advanced Persistent Threat):
A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period to steal data continuously.
Asset
Any data, device, or other component valuable to an organization that must be protected, including hardware, software, and information.
Attack
A deliberate attempt to compromise the security of a network, system, or data, often to gain unauthorized access or cause harm.
Attack Surface
The total number of points or ways an unauthorized user can try to enter or extract data from an environment.
Audit Trail
A record that shows who has accessed a computer system and what operations the user has performed during a given period.
Authentication
The process of verifying the legitimacy of a user’s or system’s identity, typically through passwords, tokens, or biometric data.
Authorization
The process that determines the access levels and permissions granted to a user or system, ensuring they can perform only permitted actions.