A concise list of 200 foundational cybersecurity terms, grouped by category for clarity. These are essential for professionals, especially those targeting roles like Head of Platform Security or Fintech Security Architecture.
1. Core Concepts
- Confidentiality – Ensuring data is accessible only to authorized users.
- Integrity – Maintaining data accuracy and trustworthiness.
- Availability – Ensuring systems and data are accessible when needed.
- Authentication – Verifying user or system identity.
- Authorization – Granting permissions based on identity/role.
- Non-repudiation – Preventing denial of actions (e.g., via digital signatures).
- Threat – Potential danger that could exploit a vulnerability.
- Vulnerability – Weakness that can be exploited.
- Risk – Likelihood × impact of a threat exploiting a vulnerability.
- Attack Surface – All points where an attacker can interact with a system.
2. Identity & Access Management (IAM) / PAM
- IAM – Framework for managing digital identities and access.
- PAM (Privileged Access Management) – Controls access for privileged accounts.
- SSO (Single Sign-On) – One login for multiple systems.
- MFA (Multi-Factor Authentication) – Requires ≥2 verification factors.
- RBAC (Role-Based Access Control) – Permissions based on roles.
- ABAC (Attribute-Based Access Control) – Access based on attributes.
- Least Privilege – Grant minimal permissions needed.
- Zero Trust – “Never trust, always verify.”
- Privileged Account – High-access accounts (e.g., root, admin).
- Session Management – Controls user sessions (e.g., timeout, monitoring).
- Just-in-Time (JIT) Access – Temporary elevated access.
- Privileged Session Isolation – Executing privileged tasks in isolated environments.
- Credential Vaulting – Secure storage of secrets/passwords (e.g., CyberArk).
- PSM (Privileged Session Manager) – Monitors/records privileged sessions.
- CPM (Central Policy Manager) – Automates credential rotation & management.
3. Threats & Attacks
- Malware – Malicious software (viruses, worms, ransomware).
- Phishing – Fraudulent attempts to obtain sensitive info.
- Spear Phishing – Targeted phishing.
- Ransomware – Encrypts data until ransom is paid.
- DDoS (Distributed Denial-of-Service) – Overwhelms systems with traffic.
- Man-in-the-Middle (MitM) – Intercepting communications.
- SQL Injection – Injecting malicious SQL queries.
- XSS (Cross-Site Scripting) – Injecting scripts into web pages.
- Zero-Day Exploit – Attack targeting an unknown vulnerability.
- APT (Advanced Persistent Threat) – Long-term targeted attack.
- Insider Threat – Risk from within the organization.
- Brute Force Attack – Trying all possible password combos.
- Credential Stuffing – Using leaked credentials on other sites.
- Social Engineering – Manipulating people into revealing info.
- Watering Hole Attack – Compromising sites frequented by targets.
4. Network Security
- Firewall – Filters network traffic.
- IDS (Intrusion Detection System) – Monitors for malicious activity.
- IPS (Intrusion Prevention System) – Blocks detected threats.
- WAF (Web Application Firewall) – Protects web apps.
- VPN (Virtual Private Network) – Secure remote access.
- Proxy Server – An intermediary between the user and internet.
- DMZ (Demilitarized Zone) – Isolated network segment.
- NAT (Network Address Translation) – Maps private to public IPs.
- SIEM (Security Information & Event Management) – Aggregates/logs security events.
- Network Segmentation – Dividing the network into zones.
5. Cloud & DevSecOps
- CSPM (Cloud Security Posture Management) – Monitors cloud misconfigurations.
- CASB (Cloud Access Security Broker) – Enforces security between users and cloud.
- IaaS/PaaS/SaaS – Cloud service models.
- Shared Responsibility Model – Security is split between the cloud provider/user.
- Infrastructure as Code (IaC) – Managing infra via code (e.g., Terraform).
- DevSecOps – Integrating security into DevOps.
- SAST (Static Application Security Testing) – Code analysis without execution.
- DAST (Dynamic Application Security Testing) – Testing running apps.
- SCA (Software Composition Analysis) – Scans third-party code/libraries.
- Container Security – Securing Docker/Kubernetes environments.
6. Cryptography
- Encryption – Encoding data (symmetric/asymmetric).
- Symmetric Encryption – Same key for encrypt/decrypt (e.g., AES).
- Asymmetric Encryption – Public/private key pair (e.g., RSA).
- Hash Function – One-way data fingerprint (e.g., SHA-256).
- Digital Certificate – Binds public key to identity (PKI).
- PKI (Public Key Infrastructure) – Manages digital certs/keys.
- TLS/SSL – Secures web communications.
- Key Management – Handling cryptographic keys securely.
- HSM (Hardware Security Module) – Secure key storage device.
- Nonce – Number used once to prevent replay attacks.
7. Security Architecture & Frameworks
- Defense in Depth – Layered security controls.
- NIST CSF – Cybersecurity Framework (Identify, Protect, Detect, Respond, Recover).
- ISO/IEC 27001 – ISMS standard.
- CIS Controls – Best practices for cyber defense.
- SOC 2 – Trust services criteria for service orgs.
- GDPR/CCPA – Data privacy regulations.
- PCI DSS – Payment card security standard.
- Secure by Design – Build security into systems from the start.
- Threat Modeling – Identifying/assessing threats proactively.
- Attack Tree – Visualizing attack paths.
8. Endpoint & System Security
- EDR (Endpoint Detection & Response) – Monitors/responds to endpoint threats.
- Antivirus/Antimalware – Detects/removes malicious software.
- Patch Management – Updating software to fix vulnerabilities.
- Disk Encryption – Encrypts entire storage (e.g., BitLocker).
- TPM (Trusted Platform Module) – Hardware chip for secure crypto ops.
- UEFI Secure Boot – Ensures only trusted OS loads.
- Sandboxing – Isolating apps to limit damage.
- Honeypot – Decoy system to attract attackers.
- Rootkit – Malware hiding deep in OS.
- File Integrity Monitoring (FIM) – Alerts on unauthorized file changes.
9. Data Security
- Data Loss Prevention (DLP) – Prevents unauthorized data exfiltration.
- Data Masking – Hides sensitive data in non-prod environments.
- Tokenization – Replaces sensitive data with tokens.
- PII (Personally Identifiable Information) – Data identifying individuals.
- Data Classification – Categorizing data by sensitivity.
- Data Residency – Where data is physically stored.
- Data Sovereignty – Legal jurisdiction over data.
- Anonymization – Removing identifiers from data.
- Pseudonymization – Replacing identifiers with fake ones (reversible).
- Data Lifecycle Management – Governing data from creation to deletion.
10. Governance, Risk & Compliance (GRC)
- Risk Assessment – Identifying/analyzing risks.
- Risk Mitigation – Reducing risk impact/likelihood.
- Audit Trail – Record of system activities.
- Compliance – Adhering to laws/standards.
- Policy – Formal security rules/guidelines.
- Standard – Mandatory security requirements.
- Procedure – Step-by-step security instructions.
- Baseline – Minimum security configuration.
- KRI (Key Risk Indicator) – Metric signaling rising risk.
- KPI (Key Performance Indicator) – Security performance metric.
11. Incident Response & Forensics
- IR (Incident Response) – Handling security breaches.
- CSIRT (Computer Security Incident Response Team) – Responds to incidents.
- Playbook – Predefined IR procedures.
- Triage – Initial incident assessment.
- Containment – Limiting incident impact.
- Eradication – Removing threat root cause.
- Recovery – Restoring systems post-incident.
- Post-Incident Review – Lessons learned analysis.
- Chain of Custody – Evidence handling documentation.
- Memory Dump – Capturing RAM contents for analysis.
12. Application Security
- OWASP Top 10 – List of critical web app risks.
- API Security – Protecting application interfaces.
- Input Validation – Sanitizing user inputs.
- Output Encoding – Preventing XSS.
- Secure SDLC – Integrating security into the software dev lifecycle.
- Threat Intelligence – Data on current/emerging threats.
- Bug Bounty – Rewarding external vulnerability finders.
- Fuzz Testing – Sending random inputs to find bugs.
- Code Signing – Verifying software publisher authenticity.
- Supply Chain Attack – Compromising via third-party vendors.
13. Physical & Operational Security
- Tailgating – Unauthorized physical access following a legit user.
- Mantrap – Physical security checkpoint.
- Bollards – Barriers against vehicle attacks.
- Environmental Controls – Fire suppression, HVAC for data centers.
- Clean Desk Policy – Securing physical documents.
- Media Sanitization – Securely erasing storage media.
- Disaster Recovery (DR) – Restoring operations post-disaster.
- BCP (Business Continuity Plan) – Maintaining ops during disruption.
- RTO (Recovery Time Objective) – Max tolerable downtime.
- RPO (Recovery Point Objective) – Max tolerable data loss.
14. Emerging Tech & Concepts
- AI/ML in Security – Automated threat detection/response.
- IoT Security – Securing internet-connected devices.
- OT/ICS Security – Securing industrial control systems (e.g., SCADA, PLC).
- Blockchain Security – Protecting decentralized ledgers.
- Quantum Cryptography – Future-proof encryption.
- Deception Technology – Misleading attackers with fake assets.
- XDR (Extended Detection & Response) – Cross-layer threat correlation.
- SASE (Secure Access Service Edge) – Cloud-delivered security.
- Zero-Knowledge Proof – Verifying without revealing data.
- Homomorphic Encryption – Computing on encrypted data.
15. Authentication & Secrets
- OAuth – Delegated authorization protocol.
- OpenID Connect – Identity layer on OAuth.
- Kerberos – Network auth protocol.
- SAML – XML-based SSO standard.
- TOTP (Time-Based One-Time Password) – MFA method (e.g., Google Authenticator).
- FIDO2/WebAuthn – Passwordless auth standard.
- Password Spraying – Trying a few passwords across many accounts.
- Secrets Management – Handling API keys, tokens, and passwords securely.
- Hardware Token – Physical MFA device (e.g., YubiKey).
- Biometric Authentication – Fingerprint/facial recognition.
16. Vulnerability & Patch Mgmt
- CVE (Common Vulnerabilities & Exposures) – Public vulnerability IDs.
- CVSS (Common Vulnerability Scoring System) – Severity rating (0–10).
- Vulnerability Scanner – Tool to find system weaknesses (e.g., Nessus).
- Penetration Testing – Ethical hacking to find flaws.
- Red Team/Blue Team – Attackers vs. defenders in exercises.
- Purple Team – Collaboration between red/blue teams.
- Patch Tuesday – Microsoft’s monthly patch release day.
- Hotfix – Emergency patch for critical issues.
- Unpatched System – High-risk due to known vulnerabilities.
- Exploit – Code/tool leveraging a vulnerability.
17. Email & Web Security
- SPF (Sender Policy Framework) – Prevents email spoofing.
- DKIM (DomainKeys Identified Mail) – Email message signing.
- DMARC (Domain-based Message Auth Reporting) – Combines SPF/DKIM.
- Email Sandboxing – Analyzing attachments in isolation.
- URL Filtering – Blocking malicious websites.
- Browser Isolation – Running web sessions remotely.
- Clickjacking – Tricking users into clicking hidden elements.
- Malvertising – Malware via online ads.
- Typosquatting – Registering similar domains to trick users.
- HTTPS – HTTP + TLS encryption.
18. Mobile Security
- MDM (Mobile Device Management) – Manages corporate mobile devices.
- MAM (Mobile Application Management) – Secures apps on devices.
- BYOD (Bring Your Own Device) – Personal devices for work.
- App Wrapping – Adding security policies to mobile apps.
- Geofencing – Restricting app/device usage by location.
- Remote Wipe – Erasing lost/stolen device data.
- Jailbreaking/Rooting – Bypassing OS security (high risk).
- Mobile Threat Defense (MTD) – Real-time mobile threat protection.
- SIM Swapping – Hijacking phone number for 2FA bypass.
- Containerization (Mobile) – Isolating work/personal data.
19. Metrics & Reporting
- MTTD (Mean Time to Detect) – Avg. time to identify threats.
- MTTR (Mean Time to Respond/Recover) – Avg. time to contain/fix.
- False Positive/Negative – Incorrect threat alerts/missed threats.
- Security Dashboard – Visualizing security posture.
- Executive Summary – High-level IR/compliance reports for the board.
- Risk Register – Log of identified risks & mitigations.
- Compliance Gap Analysis – Identifying standard deviations.
- Security Maturity Model – Assessing program evolution (e.g., CMMI).
- ROI (Return on Security Investment) – Justifying security spend.
- Cyber Risk Quantification – Financially modeling cyber risk (e.g., FAIR).
