Glossary of Cybersecurity Terms

Jump to: A B C D E Z

A

Authentication
The process of verifying the identity of a user, device, or entity in a system.

B

Brute Force Attack
A trial-and-error method is used to decode encrypted data such as passwords by trying all possible combinations.

C

Cryptography
The practice and study of techniques for securing communication and data in the presence of adversaries.

P

Penetration Testing
A simulated cyberattack against your computer system to check for exploitable vulnerabilities.

Z

Zero-Day Vulnerability
A software vulnerability unknown to the parties responsible for patching or fixing the vulnerability.

Post a Comment

0Comments

Post a Comment (0)