CyberBolt
64 Terms

Cybersecurity Glossary

Essential cybersecurity terminology explained in plain language. From fundamentals to advanced concepts.

A

Access Control

Security Fundamentals

Security mechanism that determines who or what can view or use resources in a computing environment. Includes authentication (verifying identity) and authorization (granting permissions).

Adversarial Machine Learning

AI Security

The study of attacks on machine learning models and defenses against them. Includes evasion attacks (fooling models at inference), poisoning attacks (corrupting training data), and model extraction.

API Security

Web Security

Practices and tools for protecting Application Programming Interfaces from attacks. Covers authentication, rate limiting, input validation, and preventing data exposure through API endpoints.

Attack Surface

Security Fundamentals

The total number of points (vectors) where an unauthorized user can try to enter or extract data from a system. Reducing attack surface is a core security principle.

Authentication

Security Fundamentals

The process of verifying the identity of a user, device, or system. Common methods include passwords, multi-factor authentication (MFA), biometrics, and cryptographic tokens like JWT.

Authorization

Security Fundamentals

The process of determining what permissions an authenticated user has. Defines what resources a user can access and what actions they can perform (read, write, delete).

B

Backdoor

Threats

A covert method of bypassing normal authentication or security controls in a system. Can be intentionally placed by developers or installed by attackers after compromising a system.

Blue Team

Security Operations

The defensive security team responsible for protecting an organization's systems. Blue teams monitor for threats, respond to incidents, maintain security controls, and improve defenses.

Brute Force Attack

Threats

An attack that tries every possible combination of passwords or keys until the correct one is found. Mitigated by rate limiting, account lockout policies, and strong password requirements.

Buffer Overflow

Vulnerabilities

A vulnerability where a program writes data beyond the boundary of allocated memory. Can allow attackers to overwrite adjacent memory, crash programs, or execute arbitrary code.

C

CIA Triad

Security Fundamentals

The three pillars of information security: Confidentiality (data is only accessible to authorized parties), Integrity (data is accurate and unaltered), and Availability (systems are accessible when needed).

CORS

Web Security

Cross-Origin Resource Sharing — a browser security mechanism that controls which domains can make requests to your API. Misconfigured CORS can allow unauthorized cross-origin data access.

Credential Stuffing

Threats

An attack where stolen username/password pairs from one breach are automatically tested against other services. Relies on password reuse across sites. Mitigated by MFA and breach monitoring.

Cross-Site Request Forgery (CSRF)

Web Security

An attack that tricks a user's browser into performing unwanted actions on a site where they're authenticated. Prevented by anti-CSRF tokens, SameSite cookies, and checking the Origin header.

Cross-Site Scripting (XSS)

Web Security

A vulnerability where an attacker injects malicious scripts into web pages viewed by other users. Types include Stored XSS, Reflected XSS, and DOM-based XSS. Prevented by input sanitization and Content Security Policy.

Cryptographic Hash

Cryptography

A one-way function that converts input data into a fixed-size string. Used for password storage (bcrypt, Argon2), file integrity verification (SHA-256), and digital signatures. Cannot be reversed.

CVE

Vulnerability Management

Common Vulnerabilities and Exposures — a standardized system for identifying and cataloging publicly known cybersecurity vulnerabilities. Each CVE has a unique ID (e.g., CVE-2024-1234) and is tracked in the NVD.

CVSS

Vulnerability Management

Common Vulnerability Scoring System — a framework for rating the severity of security vulnerabilities on a 0-10 scale. Considers attack vector, complexity, privileges required, and impact on confidentiality/integrity/availability.

D

Data Exfiltration

Threats

The unauthorized transfer of data from within an organization to an external destination. Methods include DNS tunneling, covert channels, and compromised email. A key objective in many cyberattacks.

DDoS

Threats

Distributed Denial of Service — an attack that overwhelms a target system with traffic from many sources, making it unavailable to legitimate users. Mitigated by CDNs, rate limiting, and traffic filtering.

Defense in Depth

Security Fundamentals

A security strategy that layers multiple defensive mechanisms so that if one layer fails, others still protect the system. Examples: firewall + WAF + input validation + output encoding + CSP.

DevSecOps

DevSecOps

The practice of integrating security into every phase of the software development lifecycle (SDLC), from design through deployment. Includes automated security testing in CI/CD pipelines, SAST, DAST, and dependency scanning.

E

Encryption

Cryptography

The process of converting plaintext data into ciphertext using an algorithm and key, making it unreadable without the decryption key. Types: symmetric (AES), asymmetric (RSA), and at-rest vs in-transit.

Endpoint Detection and Response (EDR)

Security Operations

Security tools that continuously monitor endpoints (laptops, servers, phones) for suspicious activity, provide real-time visibility, and enable rapid response to threats.

Exploit

Threats

A piece of code or technique that takes advantage of a vulnerability in software or hardware to cause unintended behavior, such as gaining unauthorized access or executing malicious code.

F

Firewall

Network Security

A network security device or software that monitors and filters incoming and outgoing traffic based on predefined rules. Types include network firewalls, host-based firewalls, and web application firewalls (WAF).

H

Hash Collision

Cryptography

When two different inputs produce the same hash output. Collision attacks can compromise hash-based systems. MD5 and SHA-1 are vulnerable; SHA-256 and SHA-3 are collision-resistant.

Honeypot

Security Operations

A decoy system designed to attract and trap attackers, allowing security teams to study attack methods and gather intelligence without risking production systems.

I

Incident Response

Security Operations

The organized approach to addressing and managing a security breach or cyberattack. Phases: Preparation → Identification → Containment → Eradication → Recovery → Lessons Learned.

Injection Attack

Web Security

A class of attacks where untrusted data is sent to an interpreter as part of a command or query. Includes SQL injection, OS command injection, LDAP injection, and NoSQL injection. OWASP Top 10 #3.

Intrusion Detection System (IDS)

Network Security

A system that monitors network traffic or host activity for signs of malicious behavior. Can be signature-based (matching known patterns) or anomaly-based (detecting deviations from normal behavior).

J

JSON Web Token (JWT)

Security Fundamentals

A compact, self-contained token format for securely transmitting information between parties as a JSON object. Consists of header.payload.signature. Used for stateless authentication in REST APIs.

K

Keylogger

Malware

Malware or hardware that records keystrokes on a compromised system, capturing passwords, credit card numbers, and other sensitive data entered by the user.

L

Lateral Movement

Threats

Techniques attackers use to move through a network after initial compromise, accessing additional systems and escalating privileges. Common in Advanced Persistent Threats (APTs).

Least Privilege

Security Fundamentals

A security principle that users and processes should only have the minimum permissions necessary to perform their tasks. Limits the blast radius of compromised accounts.

M

Malware

Malware

Malicious software designed to damage, disrupt, or gain unauthorized access to systems. Types include viruses, worms, trojans, ransomware, spyware, and rootkits.

Man-in-the-Middle (MITM)

Threats

An attack where the attacker secretly intercepts and relays communication between two parties who believe they are communicating directly. Prevented by TLS/HTTPS and certificate pinning.

Multi-Factor Authentication (MFA)

Security Fundamentals

An authentication method requiring two or more verification factors: something you know (password), something you have (phone/token), or something you are (biometrics). Dramatically reduces account compromise.

N

NIST Cybersecurity Framework

Compliance

A widely adopted framework for managing cybersecurity risk. Five core functions: Identify, Protect, Detect, Respond, Recover. Provides standards and best practices for organizations of all sizes.

O

OWASP

Security Fundamentals

Open Worldwide Application Security Project — a nonprofit foundation that produces free resources for web application security. Best known for the OWASP Top 10 list of critical security risks.

OWASP Top 10

Web Security

A regularly updated list of the 10 most critical web application security risks. The 2021 edition includes Broken Access Control (#1), Cryptographic Failures (#2), and Injection (#3). The standard awareness document for web security.

P

Patch Management

Vulnerability Management

The process of acquiring, testing, and installing software updates (patches) to fix vulnerabilities. Critical for preventing exploitation of known vulnerabilities like those listed in CISA KEV.

Penetration Testing

Security Operations

An authorized simulated cyberattack on a system to evaluate its security. Pen testers use the same tools and techniques as attackers to find vulnerabilities before malicious actors do.

Phishing

Threats

A social engineering attack that tricks victims into revealing sensitive information or installing malware through deceptive emails, websites, or messages. Variants include spear phishing (targeted) and whaling (executives).

Privilege Escalation

Threats

An attack where a user gains higher access rights than intended. Vertical escalation: regular user → admin. Horizontal escalation: accessing another user's resources. A key step in many attack chains.

Prompt Injection

AI Security

An attack against Large Language Models (LLMs) where carefully crafted input causes the model to ignore its instructions, leak system prompts, or perform unintended actions. Analogous to SQL injection for AI systems.

R

Ransomware

Malware

Malware that encrypts a victim's files and demands payment (usually cryptocurrency) for the decryption key. Modern variants also exfiltrate data for double extortion. Major threat to organizations worldwide.

Rate Limiting

Web Security

A technique to control the number of requests a user can make to an API within a time window. Prevents brute force attacks, DDoS, and resource exhaustion. Typically implemented per IP or per user.

Red Team

Security Operations

An offensive security team that simulates real-world attacks against an organization to test its defenses. Red teams think and act like adversaries to uncover weaknesses that automated tools miss.

Reverse Engineering

Security Operations

The process of analyzing software or hardware to understand its design, functionality, or vulnerabilities without access to source code. Used in malware analysis, vulnerability research, and security auditing.

S

SAST

DevSecOps

Static Application Security Testing — analyzing source code for security vulnerabilities without executing the program. Finds issues like SQL injection, XSS, and hardcoded secrets during development.

Security Headers

Web Security

HTTP response headers that enable browser security features. Key headers: Content-Security-Policy (CSP), Strict-Transport-Security (HSTS), X-Frame-Options, X-Content-Type-Options, and Permissions-Policy.

SIEM

Security Operations

Security Information and Event Management — platforms that aggregate log data from across an organization, correlate events, detect anomalies, and provide real-time security alerts and incident investigation tools.

Social Engineering

Threats

Manipulating people into divulging confidential information or performing actions that compromise security. Exploits human psychology rather than technical vulnerabilities. Includes phishing, pretexting, and baiting.

SQL Injection

Web Security

An attack where malicious SQL code is inserted into application queries through user input, allowing attackers to read, modify, or delete database data. Prevented by parameterized queries and input validation.

Supply Chain Attack

Threats

An attack that targets less-secure elements in a supply chain to compromise the final product. In software, this includes compromising open-source dependencies, build systems, or update mechanisms (e.g., SolarWinds).

T

Threat Intelligence

Security Operations

Evidence-based knowledge about cyber threats, including indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs), and contextual information used to make informed security decisions.

Threat Modeling

DevSecOps

A structured approach to identifying, quantifying, and addressing security threats to a system. Frameworks include STRIDE (Microsoft), PASTA, and LINDDUN. Done during the design phase of development.

TLS/SSL

Cryptography

Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL) are cryptographic protocols that provide secure communication over networks. HTTPS = HTTP + TLS. Uses certificates for server authentication.

Token

Security Fundamentals

A piece of data used to represent a user's identity or session. Types include JWT (JSON Web Tokens), OAuth access tokens, API keys, and session tokens. Stored in cookies, headers, or localStorage.

V

Vulnerability

Vulnerability Management

A weakness in software, hardware, or processes that can be exploited by attackers. Vulnerabilities are cataloged as CVEs and rated by CVSS severity. Regular patching and scanning are critical countermeasures.

W

Web Application Firewall (WAF)

Web Security

A security layer that monitors, filters, and blocks HTTP traffic to and from a web application. Protects against common attacks like SQL injection, XSS, and CSRF. Can be cloud-based or on-premises.

Z

Zero Trust

Security Fundamentals

A security model that assumes no user or system — inside or outside the network — should be trusted by default. Every request must be verified. Principles: never trust, always verify; least privilege; assume breach.

Zero-Day

Vulnerability Management

A vulnerability that is unknown to the software vendor and has no available patch. Zero-day exploits are highly valuable to attackers (and on the black market) because no defense exists yet.

Want to go deeper?

Read our in-depth articles that explain these concepts with real-world examples and code.

Browse Articles →
Cybersecurity Glossary — CyberBolt | CyberBolt