Cybersecurity Glossary

My goal is to build the largest Cybersecurity Glossary on the internet.

 

Our cybersecurity glossary and cybersecurity dictionary is designed to demystify the terminology surrounding cybersecurity, providing you with a synopsis of key terms and empowering you to make informed decisions.

Access Control

Access control refers to the process of regulating and managing access to resources or systems within a network or computer environment. It involves determining who is allowed to access certain resources or perform specific actions, and under what conditions. Access control mechanisms typically involve authentication, authorisation, and sometimes accounting measures to ensure that only authorised users or devices can access protected resources.

Access Control List

An Access Control List is a set of rules or configurations that defines what actions are permitted or denied for a given user, group, or network entity within a network or system. ACLs are commonly used in network devices, such as routers and firewalls, to control traffic flow based on criteria such as source or destination IP address, port numbers, and protocols. By configuring ACLs, administrators can enforce security policies and restrict access to network resources based on specific conditions.

Access Points

Access points are devices that allow wireless communication devices to connect to a wired network. They serve as a bridge between wireless devices (like laptops, smartphones, or tablets) and the network infrastructure. Access points enable these devices to access resources, such as files, applications, and the internet, within a specific network range.

Account Management

Account management in cybersecurity refers to the processes and practices involved in creating, configuring, monitoring, and maintaining user accounts within a system or network. It encompasses tasks such as user authentication, password management, user permissions, and account auditing. Effective account management helps organisations control access to their resources, prevent unauthorised access, and mitigate security risks associated with compromised or misconfigured accounts.

Accounting

Accounting in cybersecurity refers to the process of tracking and recording security-related events and activities within a system or network. It involves logging information such as user login attempts, access to resources, file modifications, network connections, and security policy violations. By maintaining detailed audit logs, organisations can monitor for suspicious behaviour, investigate security incidents, and ensure compliance with regulatory requirements.

Accreditation

Accreditation in cybersecurity refers to the formal evaluation and approval of information systems, networks, or organisations to ensure they meet specific security standards and requirements. Accreditation typically involves assessing the security posture of the system or organisation, identifying vulnerabilities and risks, implementing security controls, and obtaining official certification or accreditation from a recognised authority or regulatory body. Accreditation demonstrates that the entity has implemented adequate security measures to protect sensitive information and mitigate cybersecurity risks.

Ad Hoc Network

An ad hoc network is a decentralised type of wireless network in which devices communicate directly with each other without the need for a central access point or infrastructure. Ad hoc networks are often formed spontaneously and temporarily, allowing devices to establish direct peer-to-peer connections and share resources such as files, printers, or internet access. While ad hoc networks offer flexibility and convenience, they can also pose security challenges due to the lack of centralised control and the potential for unauthorised access or interception of communication.

Administrative Account

An administrative account is a user account with elevated privileges and permissions within a system or network. These accounts typically have access to sensitive resources, configurations, and administrative functions necessary for managing the system or network infrastructure. Due to their elevated privileges, administrative accounts are prime targets for attackers, and thus, they require strong security measures such as multi-factor authentication, regular auditing, and strict access controls to prevent unauthorised access and mitigate potential security risks.

Advanced Encryption Standard (AES)

AES is a widely used symmetric encryption algorithm that is employed to secure sensitive data in various applications, including data storage, communication, and digital signatures. AES uses a block cipher to encrypt and decrypt data in fixed-size blocks (128, 192, or 256 bits) and is considered one of the most secure encryption algorithms available today. It is used by governments, organisations, and individuals worldwide to protect confidential information and ensure data confidentiality, integrity, and authenticity.

Advanced Persistent Threat (APT)

An Advanced Persistent Threat (APT) is a sophisticated and prolonged cyberattack in which an unauthorised user gains access to a network and remains undetected for an extended period. APTs are typically orchestrated by well-funded and highly skilled adversaries, such as nation-states or organised cybercriminal groups. Unlike more common and opportunistic cyberattacks, APTs are characterised by their advanced tactics, techniques, and procedures (TTPs), as well as their persistence in maintaining covert access to targeted systems.

Fifteen Steps to maximising firefox privacy 🔒✅

Download the complete FireFox checklist that I give to my counter-surveillance clients – completely free of charge! I will take you step-by-step through advanced Firefox Configurations that will help you maximise your privacy, security and anonymity. 

Enter your details below and I will email it to you straight away. And don’t worry, your data is safe with me 😇

Access free subscriber only content 😘

I would love to share my latest ethical hacking, defensive security, OSINT, and anonymity guides with you. But I’ll need you to trust me with something… your email address. Your data will be encrypted and I will never sell it to third parties 😇

UK Cybersecurity Company

About Aitken Security

Aitken Security is a UK Cybersecurity Company specialising in offensive and defensive security.