Security
This cyber security glossary explains the meaning of terms about different types of computer security threats as well as words about application security, access control, network intrusion detection, security awareness training and computer forensics.
![](https://cdn.ttgtmedia.com/rms/whatIs/whatis-security.jpg)
Authentication and access control
Terms related to authentication, including security definitions about passwords and words and phrases about proving identity.
-
Consensus Algorithm
A consensus algorithm is a process in computer science used to achieve agreement on a single data value among distributed processes or systems.
-
OpenID (OpenID Connect)
OpenID Connect is an open specification for authentication and single sign-on (SSO).
-
cloud security
Cloud security, also known as 'cloud computing security,' is a set of policies, practices and controls deployed to protect cloud-based data, applications and infrastructure from cyberattacks and cyberthreats.
Compliance, risk and governance
This glossary contains definitions related to compliance. Some definitions explain the meaning of words used in compliance regulations. Other definitions are related to the strategies that compliance officers use to mitigate risk and create a manageable compliance infrastructure.
-
What is risk mitigation?
Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.
-
data structure
A data structure is a specialized format for organizing, processing, retrieving and storing data.
-
personally identifiable information (PII)
Personally identifiable information (PII) is any data that could potentially identify a specific individual.
Network security
Terms related to network security, including definitions about intrusion prevention and words and phrases about VPNs and firewalls.
-
digital signature
A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or software.
-
malware
Malware, or malicious software, is any program or file that's intentionally harmful to a computer, network or server.
-
secure access service edge (SASE)
Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native security technologies and delivers them as a single cloud service.
Security Admin
Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.
-
digital signature
A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or software.
-
What is security information and event management (SIEM)?
Security information and event management (SIEM) is an approach to security management that combines security information management (SIM) and security event management (SEM) functions into one security management system.
-
OpenID (OpenID Connect)
OpenID Connect is an open specification for authentication and single sign-on (SSO).
Threat management
Terms related to security threats, including definitions about anti-virus programs or firewalls and words and phrases about malware, viruses, Trojans and other security attacks.
-
cyber attack
A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage.
-
zero-day vulnerability
A zero-day vulnerability is a security loophole in software, hardware or firmware that threat actors exploit before the vendors can identify and patch it.
-
DNS attack
A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system.