Contact

Resources

Glossary

Below is our helpful glossary to demystify the world of cyber security.

Access Control Mechanism

Below is our helpful glossary to demystify the world of cyber security.

Advanced Persistant Threat (APT)

Below is our helpful glossary to demystify the world of cyber security.

Adversary

Below is our helpful glossary to demystify the world of cyber security.

Amazon Web Services (AWS)

Below is our helpful glossary to demystify the world of cyber security.

Antivirus

Below is our helpful glossary to demystify the world of cyber security.

Asset

Below is our helpful glossary to demystify the world of cyber security.

Attack

Below is our helpful glossary to demystify the world of cyber security.

Attack signature

Below is our helpful glossary to demystify the world of cyber security.

Authentication

Below is our helpful glossary to demystify the world of cyber security.

Backdoor

Below is our helpful glossary to demystify the world of cyber security.

Blue Team/Red Team/White Team

Below is our helpful glossary to demystify the world of cyber security.

Botnet

Below is our helpful glossary to demystify the world of cyber security.

Brute force attack

Below is our helpful glossary to demystify the world of cyber security.

Bugs

Below is our helpful glossary to demystify the world of cyber security.

Cipher Block Chaining (CBC)

Below is our helpful glossary to demystify the world of cyber security.

Computer Network Defense (CND)

Below is our helpful glossary to demystify the world of cyber security.

Cyber Essentials

Below is our helpful glossary to demystify the world of cyber security.

Data Encryption Standard (DES)

Below is our helpful glossary to demystify the world of cyber security.

Data Loss Prevention (DLP)

Below is our helpful glossary to demystify the world of cyber security.

Data Quality (DQ)

Below is our helpful glossary to demystify the world of cyber security.

Denial of Service (DOS)

Below is our helpful glossary to demystify the world of cyber security.

Distributed Denial of Service (DDOS)

Below is our helpful glossary to demystify the world of cyber security.

Domain Controller (DC)

Below is our helpful glossary to demystify the world of cyber security.

Domain Named Systems (DNS)

Below is our helpful glossary to demystify the world of cyber security.

Downloader

Below is our helpful glossary to demystify the world of cyber security.

Drive by Download

Below is our helpful glossary to demystify the world of cyber security.

Dynamic Host Configuration Protocol (DHCP)

Below is our helpful glossary to demystify the world of cyber security.

Endpoint

Below is our helpful glossary to demystify the world of cyber security.

Endpoint Detection & Response (EDR)

Below is our helpful glossary to demystify the world of cyber security.

Enhanced User Monitoring (EUM)

Below is our helpful glossary to demystify the world of cyber security.

Error Correction Code (ECC)

Below is our helpful glossary to demystify the world of cyber security.

Espionage

Below is our helpful glossary to demystify the world of cyber security.

Extended Detection & Response (XDR)

Below is our helpful glossary to demystify the world of cyber security.

File Transfer Protocol (FTP)

Below is our helpful glossary to demystify the world of cyber security.

General Data Protection Regulations (GDPR)

Below is our helpful glossary to demystify the world of cyber security.

Governance, Risk Management and Compliance (GRC)

Below is our helpful glossary to demystify the world of cyber security.

Hashing

Below is our helpful glossary to demystify the world of cyber security.

Honeypot (honeynet)

Below is our helpful glossary to demystify the world of cyber security.

Identity Access Management (IAM)

Below is our helpful glossary to demystify the world of cyber security.

Incident response plan

Below is our helpful glossary to demystify the world of cyber security.

Indicators of Compromise (IOC)

Below is our helpful glossary to demystify the world of cyber security.

Industrial Control System (ICS)

Below is our helpful glossary to demystify the world of cyber security.

Information Theft

Below is our helpful glossary to demystify the world of cyber security.

Information-stealer

Below is our helpful glossary to demystify the world of cyber security.

International Domain Names (IDN)

Below is our helpful glossary to demystify the world of cyber security.

International Organization for Standardization

Below is our helpful glossary to demystify the world of cyber security.

Intrusion Detection System (IDS)

Below is our helpful glossary to demystify the world of cyber security.

ISO 27001

Below is our helpful glossary to demystify the world of cyber security.

IT Service Management (ITSM)

Below is our helpful glossary to demystify the world of cyber security.

Keylogger

Below is our helpful glossary to demystify the world of cyber security.

Loader

Below is our helpful glossary to demystify the world of cyber security.

Maladvertising

Below is our helpful glossary to demystify the world of cyber security.

Malware

Below is our helpful glossary to demystify the world of cyber security.

Managed Detection & Response (MDR)

Below is our helpful glossary to demystify the world of cyber security.

Managed Security Service Provider (MSSP)

Below is our helpful glossary to demystify the world of cyber security.

Man-in-the-middle Attack (MitM)

Below is our helpful glossary to demystify the world of cyber security.

Mitigation

Below is our helpful glossary to demystify the world of cyber security.

National Cyber Security Centre (NCSC)

Below is our helpful glossary to demystify the world of cyber security.

Network Detection & Response (NDR)

Below is our helpful glossary to demystify the world of cyber security.

NIST Cyber Security Standard (NIST)

Below is our helpful glossary to demystify the world of cyber security.

Orchestration & Collaboration Platform (OCP)

Below is our helpful glossary to demystify the world of cyber security.

Password Attacks

Below is our helpful glossary to demystify the world of cyber security.

Payload

Below is our helpful glossary to demystify the world of cyber security.

Penetration Testing

Below is our helpful glossary to demystify the world of cyber security.

Phishing

Below is our helpful glossary to demystify the world of cyber security.

Pretty Good Privacy (PGP)

Below is our helpful glossary to demystify the world of cyber security.

Ransomeware

Below is our helpful glossary to demystify the world of cyber security.

Remote Access Trojan (RAT)

Below is our helpful glossary to demystify the world of cyber security.

Rogue Software

Below is our helpful glossary to demystify the world of cyber security.

Rootkit

Below is our helpful glossary to demystify the world of cyber security.

Sabotage

Below is our helpful glossary to demystify the world of cyber security.

Scareware

Below is our helpful glossary to demystify the world of cyber security.

Secure Shell (SSH)

Below is our helpful glossary to demystify the world of cyber security.

Security Information & Event Monitoring (SIEM)

Below is our helpful glossary to demystify the world of cyber security.

Security monitoring

Below is our helpful glossary to demystify the world of cyber security.

Security Operation Centre (SOC)

Below is our helpful glossary to demystify the world of cyber security.

Security policy

Below is our helpful glossary to demystify the world of cyber security.

Security Posture

Below is our helpful glossary to demystify the world of cyber security.

Service Orchestration, Automation & Response (SOAR)

Below is our helpful glossary to demystify the world of cyber security.

Social engineering

Below is our helpful glossary to demystify the world of cyber security.

Spam-bots

Below is our helpful glossary to demystify the world of cyber security.

Spear Phishing

Below is our helpful glossary to demystify the world of cyber security.

Tactics, Techniques and Procedures

Below is our helpful glossary to demystify the world of cyber security.

The Onion Router (TOR)

Below is our helpful glossary to demystify the world of cyber security.

Threat Actor

Below is our helpful glossary to demystify the world of cyber security.

Threat Coverage Model or Modelling (TCM)

Below is our helpful glossary to demystify the world of cyber security.

Threat Hunting

Below is our helpful glossary to demystify the world of cyber security.

Trojan horse

Below is our helpful glossary to demystify the world of cyber security.

Two-factor authentication (2FA)

Below is our helpful glossary to demystify the world of cyber security.

User and Entity Behaviour Analytics (UEBA)

Below is our helpful glossary to demystify the world of cyber security.

Virtual Private Network (VPN)

Below is our helpful glossary to demystify the world of cyber security.

Vulnerability

Below is our helpful glossary to demystify the world of cyber security.

Vulnerability Management Service (VMS)

Below is our helpful glossary to demystify the world of cyber security.

Water-holing (watering hole attack)

Below is our helpful glossary to demystify the world of cyber security.

Whaling

Below is our helpful glossary to demystify the world of cyber security.

Worm

Below is our helpful glossary to demystify the world of cyber security.

Zero-day

Below is our helpful glossary to demystify the world of cyber security.

Looking to maximise value and flexibility?
Learn how Talion and DEVO partner to achieve this.
Discuss your cyber security needs
Contact us below and one of our team will be in touch to answer your questions.

Call us on 0800 048 5775

Call us directly and we’ll put you in touch with the most relevant cyber expert.

Get In Touch With Us

Not currently free to call? Give us a brief description of what you’re looking for by filling out our form and we’ll email you as soon as we can.

CISO Cyber Dinner – Register Your Interest!

Thought-provoking cyber security discussion at Michelin-star restaurants across the UK.