Skip to content

Information Security Glossary

25 essential terms — because precise language is the foundation of clear thinking in Information Security.

Showing 25 of 25 terms

The process of verifying the identity of a user, device, or system before granting access to resources.

Related:AuthorizationMulti-Factor AuthenticationIdentity Management

The process of determining what permissions and access rights an authenticated user or system has.

Related:AuthenticationAccess ControlPrinciple of Least Privilege

The assurance that information and systems are accessible and usable when needed by authorized users.

Related:CIA TriadDenial of ServiceBusiness Continuity

The encrypted, unreadable form of data produced by an encryption algorithm, which can only be converted back to plaintext with the correct decryption key.

Related:EncryptionPlaintextCryptography

The principle that information is accessible only to those authorized to access it.

Related:CIA TriadEncryptionAccess Control

The science of securing information by transforming it into an unreadable format using mathematical algorithms.

Related:EncryptionHashingPublic Key Infrastructure

An attack that aims to make a system, network, or service unavailable by overwhelming it with traffic or exploiting a vulnerability.

Related:DDoSAvailabilityIncident Response

An electronic document issued by a Certificate Authority that binds a public key to an identity, enabling verification of authenticity.

Related:Public Key InfrastructureCertificate AuthorityTLS

A piece of software, data, or sequence of commands that takes advantage of a vulnerability to cause unintended behavior in a system.

Related:VulnerabilityZero-DayPatch Management

A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

Related:Network SecurityIntrusion Detection SystemDefense in Depth

A one-way cryptographic function that converts input data into a fixed-length output (hash) that cannot be reversed to reveal the original data.

Related:CryptographyIntegrityDigital Signature

The organized methodology for handling security breaches or cyberattacks, including preparation, detection, containment, eradication, recovery, and lessons learned.

Related:SIEMForensicsBusiness Continuity

The assurance that information is accurate, complete, and has not been modified by unauthorized parties.

Related:CIA TriadHashingDigital Signature

A device or software that monitors network or system activities for malicious behavior or policy violations and generates alerts.

Related:Intrusion Prevention SystemSIEMNetwork Security

Malicious software designed to damage, disrupt, or gain unauthorized access to systems, including viruses, worms, trojans, ransomware, and spyware.

Related:RansomwareTrojanAntivirus

The assurance that someone cannot deny the validity of their actions, such as sending a message or making a transaction, typically achieved through digital signatures.

Related:Digital SignatureAuthenticationIntegrity

The process of identifying, acquiring, testing, and installing software updates (patches) to fix vulnerabilities and improve security.

Related:Vulnerability ManagementCVSSConfiguration Management

Authorized simulated attacks against systems to identify and exploit vulnerabilities, evaluating the effectiveness of security controls.

Related:Vulnerability AssessmentRed TeamEthical Hacking

A social engineering attack using fraudulent communications disguised as legitimate to trick victims into revealing sensitive information or installing malware.

Related:Social EngineeringSpear PhishingVishing

The process of identifying assets, threats, and vulnerabilities, and evaluating the likelihood and potential impact of security incidents.

Related:Risk ManagementThreat ModelingVulnerability Assessment

Security Information and Event Management: technology that provides real-time analysis of security alerts generated by network hardware and applications.

Related:Log ManagementIncident ResponseIntrusion Detection System

Any potential cause of an unwanted incident that may result in harm to a system or organization.

Related:VulnerabilityRiskThreat Actor

Transport Layer Security (and its predecessor Secure Sockets Layer) are cryptographic protocols that provide secure communication over a network, commonly used in HTTPS.

Related:EncryptionDigital CertificateHTTPS

A weakness in a system, application, or process that could be exploited by a threat actor to gain unauthorized access or cause harm.

Related:ExploitPatch ManagementCVSS

A previously unknown vulnerability that is exploited before the vendor has released a patch, giving defenders zero days to prepare.

Related:ExploitVulnerabilityPatch Management
Information Security Glossary - Key Terms & Definitions | PiqCue