Glossary

Last updated November 24, 2025

Sort Alphabetically

A

ACL (Access Control List)

A list of permissions used to control network traffic.

Active Directory (AD)

A Microsoft service that manages and organizes users, computers, and resources within a network.

Admin (Administrator) rights

The highest level of privileges a user has in the operating system (OS) of an organization; usually allowed to perform most or all functions.

Allowlisting

Historically referred to as whitelisting, Allowlisting is a ThreatLocker endpoint security module that blocks all applications from operating unless explicitly permitted.Learn more about Allowlisting

Application Delivery Controller (ADC)

A device or software that manages and optimizes the delivery of applications by improving performance, security, and reliability.

Application Programming Interface (API)

A set of rules that allows different software applications to communicate and share data with each other.

Attack Surface Management (ASM)

The continuous process of identifying, monitoring, and reducing all potential entry points an attacker could exploit.

B

Back Up

Short for “Data Back Up,” a Back Up is a method of saving your devices’ data in a different online or offsite location.

C

Cloud Access Security Broker (CASB)

A security tool that monitors and controls access between users and cloud services to enforce security policies.

Cloud Control Management (CCM)

A framework or set of tools used to manage and enforce security controls across cloud environments.

Cloud-Native Application Protection Platform (CNAPP)

A security platform that protects applications running in cloud environments throughout their entire lifecycle.

Cloud-Based

Systems, applications, and operations that are hosted and managed via the internet instead of on local servers.

Content Disarm and Reconstruction (CDR)

A security technique that removes malicious code from files while keeping the original content safe and usable.

Customer Identity and Access Management (CIAM)

A system that manages and secures customer identities, allowing safe and seamless access to online services.

Cyber Asset Attack Surface Management (CAASM)

A security approach that helps organizations identify, manage, and secure all digital assets to reduce potential attack surfaces.

D

Data Access Governance (DAG)

A system that monitors and controls who has access to sensitive data to prevent misuse or unauthorized exposure.

Data Access Protection

A set of policies and technologies used to prevent unauthorized access to sensitive data. It includes methods like encryption, access control, and authentication to ensure only authorized users can access or modify critical data.

Data-at-Rest Encryption

A technique used to protect stored data by encrypting it, ensuring that even if data is accessed by unauthorized users, it remains unreadable without the correct decryption key.

Data Center

A facility that houses servers, storage systems, and networking equipment used to manage and process large amounts of data.

Database Security

Protecting databases from cyber threats and unauthorized access. This includes securing data from breaches, maintaining database integrity, and implementing user authentication and encryption to prevent data theft or manipulation.

Data-in-Motion/Transit (Network) Encryption and VPN

Techniques used to secure data while it is being transmitted over networks. Data-in-motion encryption ensures data is unreadable to unauthorized parties during transit, while VPNs provide secure and private connections between users and networks.

Data Loss (Leakage) Prevention (DLP)

Techniques and tools used to prevent the unauthorized transfer or leakage of sensitive data outside an organization’s network. DLP solutions monitor and control data flows to reduce the risk of data breaches or accidental exposure.

Data Masking

The process of obfuscating sensitive data to protect it during testing or development without compromising its integrity. Data masking helps prevent exposure of sensitive information while maintaining data accuracy for legitimate purposes.

Data Protection

Measures and strategies implemented to safeguard data from loss, unauthorized access, or corruption. Data protection involves encryption, backups, and access controls to ensure the privacy and integrity of data across its lifecycle.

Data Protection Centre / Threat Monitoring

A dedicated facility or system that monitors data for potential security risks, ensuring that data is continuously protected. Threat monitoring involves the detection, analysis, and mitigation of cybersecurity threats to safeguard data integrity and availability.

Data Security

The practice of protecting data from unauthorized access, corruption, or theft. Data security involves encryption, user authentication, access control, and other safeguards to ensure data remains safe throughout its lifecycle.

Data Storage

Refers to the process of saving data in a secure and organized manner. Data storage systems include physical storage devices (e.g., hard drives) and cloud-based solutions, with security measures in place to protect against unauthorized access and loss.

Data Theft

The act of unauthorized, illegal transfer of confidential data, normally personal data like health records, financial data, and personally identifiable information.

DDoS Protection

Measures and tools designed to prevent or mitigate Distributed Denial of Service (DDoS) attacks, which attempt to overwhelm systems or networks by flooding them with excessive traffic. DDoS protection helps maintain service availability.

Dynamic Application Security Testing (DAST)

A testing method that examines a running application to detect security vulnerabilities from an external attacker’s perspective.

Development and Operations (DevOps)

A collaborative approach that combines software development and IT operations to improve efficiency, speed, and product quality.

Development, Security, and Operations (DevSecOps)

An approach that integrates security practices into every stage of the software development and operations process.

Digital Rights Management (DRM)

A technology used to protect digital content from unauthorized access, copying, or distribution.

Digital Risk Protection (DRP)

A security approach that monitors and mitigates online risks such as data leaks, phishing, or brand impersonation.

E

EDR (Endpoint Detection and Response)

EDRs monitor and record activities and workloads taking place on a device. Using various techniques, EDRs will work to detect any suspicious activity and respond accordingly. EDR enables IT administrators to view suspicious activity in near real-time across an organization's endpoints. Focusing on behavioral patterns and unusual activity, EDRs will work to block threats and protect devices.

Environmental, Social, and Governance (ESG)

A set of standards used to evaluate a company’s impact on the environment, its social responsibility, and the quality of its governance practices.

F

File Integrity Monitoring (FIM)

A tool or process that tracks changes to critical files to detect unauthorized modifications or tampering.

Firewall

A security program or device that filters network traffic and prevents unauthorized or malicious access to an organization’s systems.

Fraud Hunting (FH)

The process of proactively identifying and investigating suspicious activities to detect and prevent fraud.

G

Golden Ticket Attack

A golden ticket attack is an attack that targets Windows Active Directory access control. Threat actors bypass normal authentication by taking advantage of a Kerberos weakness. Attackers must have access to the system before a Golden Ticket Attack can be performed.

Governance, Risk, and Compliance (GRC)

A framework that helps organizations align IT and business goals while managing risks and ensuring compliance with regulations.

H

Hacker

Generally, someone who uses technical skills to overcome technical problems. In cybersecurity, a hacker is referred to as a threat actor with malicious intent to access an individual’s or organization’s data unauthorized.

Hardware Security Module (HSM)

A physical device that securely manages, stores, and protects digital encryption keys and cryptographic operations.

High-Performance Computing (HPC)

The use of powerful computers and parallel processing to solve complex problems and perform large-scale computations quickly.

I

Identity and Access Management (IAM)

A system that manages user identities and controls their access to resources within an organization.

Incident Response

A strategy developed for organizations to respond to cyber threats and attacks in their network.

Industrial Control Systems (ICS)

Systems used to monitor and control industrial processes such as manufacturing, power generation, and water treatment.

Infrastructure as Code (IaC)

A process of managing and provisioning IT infrastructure using code instead of manual configuration.

Internet of Medical Things (IoMT)

A network of connected medical devices and applications that collect and share health data through the internet.

Internet of Things (IoT)

A network of connected devices that communicate and share data with each other over the internet.

J

Just-in-time

Another way of saying on demand, something is enabled exactly when needed and disabled when no longer needed.

K

Kerberos

An authentication protocol used to verify the identity of a host or user.

Know Your Customer (KYC)

A process used by organizations to verify the identity of clients and prevent fraud or money laundering.

L

LAN (Local Area Network)

A LAN is a group of electronic devices that are in the same physical location and are connected via a network.

Load Balancer

A device or software that distributes network or application traffic across multiple servers to improve performance and reliability.

M

Macros

A single programming instruction that expands into a set of instructions to automate actions in your device, tools, or software in order to provide a certain output per user input. Macros are commonly found in office applications like Word and Excel.

Managed File Transfer (MFT)

A secure method of transferring files between systems with features like tracking, automation, and encryption.

Multi-Factor Authentication (MFA)

A security method that requires users to provide two or more verification factors to access a system.

N

Network Access Control (NAC)

A security solution that manages and restricts device access to a network based on predefined security policies.

Network Control

An endpoint firewall feature that allows centralized management and full control over all network traffic using dynamic access control lists (ACLs).

Network Detection and Response (NDR)

A security solution that monitors network traffic to detect, analyze, and respond to suspicious or malicious activity in real time.

Network Tapping

A method of monitoring network traffic by copying data as it passes through a network connection without interrupting the flow.

O

Observability

The ability to understand the inner workings of a system by observing only its external manifestations

Operational Technology (OT)

Hardware and software systems used to monitor and control physical processes, machines, and industrial equipment.

Operating System Security

The process of protecting an operating system (OS) from unauthorized access, malware, and system vulnerabilities. This includes techniques like patch management, access controls, system hardening, and encryption to ensure the integrity and confidentiality of OS data.

P

PAM (Privileged Access Management)

The ability to manage users’ admin rights within your organization on a timed basis to mitigate risk by giving users the minimum access needed.

Password Manager

A tool or software used to securely store and manage passwords for multiple accounts. Password managers help users generate strong, unique passwords and protect them from being easily accessed or stolen by unauthorized parties.

Patch Configuration and Management

The process of managing and applying updates (patches) to software, systems, and applications to fix vulnerabilities or improve functionality. Patch management ensures that systems are protected from known security threats and are kept up to date with the latest features.

Penetration Testing

A simulated cyberattack conducted to evaluate the security of an organization's systems, applications, and networks. Penetration testing identifies vulnerabilities that could be exploited by attackers and provides insights into improving security measures.

Pervasive Trust Services

A set of security measures that build and maintain trust across an organization’s entire digital ecosystem. Pervasive trust services involve ensuring secure communications, authentication, and data integrity across all systems and networks to foster confidence in digital operations.

Public Key Infrastructure (PKI)

A framework that uses digital certificates and encryption keys to secure communications and verify the identities of users and systems online.

Q

R

RaaS (Ransomware as a Service)

Business model in which a ransomware organization will develop and launch ransomware in exchange for payment by the party that wishes to target an organization.

Risk and Compliance Management

The process of identifying, assessing, and mitigating risks to an organization while ensuring compliance with regulatory requirements. This includes implementing controls, auditing systems, and developing policies to minimize legal, financial, and operational risks.

Risk and Vulnerability Assessment

A process of identifying, evaluating, and prioritizing potential risks and vulnerabilities within an organization’s IT systems and infrastructure. This assessment helps organizations understand their security posture and take necessary actions to mitigate threats.

Routers

Devices used to forward data packets between computer networks. Routers determine the best path for data transmission and play a critical role in managing network traffic, connecting different networks, and ensuring data is sent securely and efficiently.

S

Secure Access Service Edge (SASE)

A cloud-based architecture that combines networking and security services, such as SD-WAN and SSE, to securely connect users and devices to applications anywhere.

Static Application Security Testing (SAST)

A method of analyzing source code to find security vulnerabilities before running the application.

Software Composition Analysis (SCA)

A process that scans and identifies open-source components in software to detect security risks and license issues.

Software-Defined Wide Area Network (SD-WAN)

A virtual WAN technology that uses software to intelligently manage and route traffic across multiple connections for better performance and security.

Search Engine

A software system that searches and retrieves information from the internet based on user queries.

Secure File Transfer

Methods and technologies used to transfer files securely over a network using encryption and authentication to ensure that only authorized users can access transmitted data.

Secure Sockets Layer (SSL)

A security protocol that encrypts data transferred between a web server and a browser to ensure safe communication.

Secure Web Gateway (SWG)

A security solution that filters and blocks harmful internet traffic to protect users from web-based threats and data leaks.

Security Configuration Management

The process of establishing, implementing, and maintaining secure configurations for systems, applications, and networks to reduce vulnerabilities and attack surfaces.

Security Incident Management and Response

The practice of identifying, responding to, and recovering from security incidents or breaches to minimize damage and restore operations.

Security Information and Event Management (SIEM)

A system that provides real-time monitoring and analysis of security events and logs across an organization’s IT infrastructure to detect and investigate threats.

Security Operations Automation and Orchestration

The use of automated technologies to streamline security operations and incident response, improving detection and recovery speed.

Security Operations Center (SOC)

A centralized team and facility that monitors, detects, and responds to cybersecurity threats in real time.

Security Orchestration, Automation, and Response (SOAR)

A platform that integrates security tools and automates incident response to help teams detect and resolve threats faster.

Security Ratings

A system that evaluates and scores an organization’s cybersecurity posture based on risk management, compliance, and defense practices.

Security Service Edge (SSE)

A cloud-based framework that combines security services like CASB, SWG, and ZTNA to protect users, data, and applications.

Security Solutions for Digital Payments

Security measures designed to protect digital payment systems using encryption, tokenization, and fraud detection technologies.

Security Training Software

Tools and platforms that educate employees on cybersecurity best practices and threats to reduce human error and strengthen awareness.

Single Sign-On (SSO)

A system that allows users to log in once and gain access to multiple applications without re-entering their credentials.

Spear Phishing

A targeted phishing attack where cybercriminals research a specific individual to craft a personalized message aimed at stealing credentials or data.

Storage Area Network (SAN)

A high-speed network that provides access to consolidated, block-level data storage, improving data availability and scalability.

Storage Security

The protection of data stored on physical or virtual storage devices through encryption, access control, and redundancy.

System Integration

The process of connecting various IT systems, applications, and hardware so they work together seamlessly within an organization.

T

Theft Security

Security measures designed to prevent the theft of physical assets, such as hardware, equipment, or data. Theft security includes physical security measures like alarms, access control systems, and surveillance, as well as digital protection for sensitive data.

Threat Hunting (TH)

A proactive cybersecurity practice that searches for hidden threats or attackers within a network before they cause harm.

Threat Intelligence and Signature Feeds

Threat intelligence involves the collection and analysis of information about emerging or ongoing cyber threats to help organizations proactively defend against attacks. Signature feeds provide predefined patterns (signatures) of known threats to help security systems identify and block malicious activities.

Threat Intelligence Platform (TIP)

A system that collects, analyzes, and shares threat data to help organizations detect and respond to cyber threats more effectively.

Two-Factor Authentication (2FA)

Identity and access management method that requires 2 unique forms of identification to successfully authenticate. Common authentication factors include something you know (password or passcode), something you have (hardware token or cell phone for SMS or OTC), and something you are (fingerprint, face ID). Combine 2 unique factors to create a more secure login such as a password and OTC or face ID and a passcode.

U

Unified Audit

A unified audit combines multiple logs into a single location. The ThreatLocker® Unified Audit is the central location within the ThreatLocker® portal to view all logged application, storage, and network activity for your organization.

Unified Threat Management (UTM)

An integrated security solution that combines multiple security technologies, such as firewalls, intrusion prevention systems (IPS), and antivirus protection, into a single platform. Unified threat management simplifies security management and improves efficiency by providing a comprehensive defense against various threats.

User and Entity Behavior Analytics (UEBA)

A cybersecurity solution that uses machine learning to detect unusual or risky behavior by users or devices that may indicate a threat.

User Behavior Analytics (UBA)

A security process that analyzes user actions to detect abnormal or suspicious behavior that could indicate potential insider threats or compromised accounts.

User Rights Management

The process of managing user access to systems, applications, and data based on their role and responsibility within the organization. User rights management ensures that users have appropriate access to resources while minimizing the risk of unauthorized access or data breaches.

V

Virtual Chief Information Security Officer (vCISO)

A cybersecurity professional or service that provides organizations with expert security leadership and strategy on a part-time or remote basis without the cost of a full-time CISO.

Virtual Data Protection Guardian (vDPG)

A security system or software that monitors, protects, and manages sensitive data in virtualized or cloud environments.

Virtual Desktop Infrastructure (VDI)

A technology that provides centrally hosted virtual desktops, allowing users to securely access their work environments from any location without needing physical hardware.

Virtual Private Network (VPN)

A secure connection that allows users to access a private network over the internet while keeping their data encrypted and private.

Virtualization

A technology that creates virtual versions of computing resources—such as servers, storage, or networks—to improve efficiency, scalability, and flexibility.

Voice Encryption Devices

Devices that encrypt voice communications to prevent eavesdropping and ensure the privacy and security of sensitive conversations.

Vulnerability Assessment

The process of identifying and evaluating weaknesses in systems, applications, or networks to prioritize and address potential security risks.

W

Web Application Firewall (WAF)

A security tool that filters and monitors HTTP traffic to protect web applications from attacks such as SQL injection and cross-site scripting (XSS).

Weaponization

The act of turning a harmless object or file into a tool for malicious activity, such as embedding a macro in a Word document to execute harmful code or contact a command-and-control server.

Wide Area Network (WAN)

A telecommunications network that connects devices across large geographic areas, such as cities or countries.

Wireless/Mobile Security Systems

Security measures designed to protect wireless networks and mobile devices from cyber threats through encryption, access controls, VPNs, and threat detection tools.

X

XDR – Extended Detection and Response

An advanced security solution that integrates multiple security tools to detect, investigate, and respond to threats across an organization’s entire IT environment.

Y

Z

Zero-Day Vulnerabilities

A zero-day attack occurs when the developers are unaware of a vulnerability within a software, device, or network that becomes exploited by threat actors. The vulnerability, in this case, is known as a zero-day vulnerability. These "zero-day" vulnerabilities get their name from developers having zero days to implement responses and solutions for the exploited vulnerability.

Zero Trust

Zero Trust is a cybersecurity philosophy in which nothing (no users, no devices, etc.) is trusted by default, and everything is verified. Instead, all users, applications, network connections will be blocked by default until verified and expressly permitted. Once permitted, users, applications and network connections will only be allowed what is needed to carry out business, and nothing more.

Copyright © 2025 Virtuthinko W. L. L. All right reserved.