Glossary
- Access Control
- Active Directory (AD)
- Advanced Persistent Threat (APT)
- Artificial Intelligence (AI) in Cybersecurity
- Backups
- BCDR – Business Continuity and Disaster Recovery
- Botnet
- Break/Fix Model
- Cloud Computing
- Cloud Security
- Compliance Audit and Reporting
- Compliance Requirements
- Conditional Access
- Content Filtering
- Cyber Liability Insurance
- Cybersecurity
- Cybersecurity Framework (CSF)
- Dark Web Scanning
- Dark Web Security Exposures
- Data Hygiene
- Data Loss Prevention (DLP)
- Denial-of-Service (DoS) Attack
- Distributed Denial of Service (DDoS) Attack
- EDR/MDR – Endpoint/Managed Detection & Response
- Email Protection
- Employee Security Training
- Encryption
- Endpoint Security
- Firewall
- Governance, Risk, and Compliance (GRC)
- Identity and Access Management (IAM)
- Immutable Backup
- Incident Response Plan (IRP)
- Incident Response Team (IRT)
- Intrusion Detection System (IDS)
- Log Retention (SIEM)
- Malware
- Managed Services
- Managed SOC (Security Operations Centers)
- Mobile Device Management (MDM)
- Multi-Factor Authentication (MFA)
- Password Hygiene
- Password Policy
- Phishing
- Privileged Access Management (PAM)
- Ransomware
- Remote Desktop Protocol (RDP) Security
- Risk Assessment
- Secure Access Service Edge (SASE)
- Shadow IT
- Single Sign-On (SSO)
- Software as a Service (SaaS) Monitoring
- Supply Chain Security
- Targeted Threat Protection (TTP)
- The Cloud
- Threat Intelligence
- Two-factor Authentication (2FA)
- USB Security
- User Awareness Training
- Virtual Private Network (VPN)
- Virus Protection
- Vulnerability Scanning
- Web Application Firewall (WAF)
- Wireless Security
- Zero Trust Architecture
- Zero-Day Vulnerability