Glossaries
Understand the terminology behind cyber security.
- Diffie-Hellman Primes and Keys
- Forms of Attacks
- Fourth Parties
- Glossary of Terms
- Glossary of Terms - File Sharing
- Glossary of Terms - Public Disclosures
- Glossary of Terms - Server Software
- Glossary of Terms: Bitsight VRM
- Glossary of Terms: Grading & Finding Behavior
- Glossary of Terms: Infrastructure
- Goals of Content-Security-Policy (CSP)
- What are Open Ports?
- What is a Botnet?
- What is a Rating Bundle?
- What is a Rolled Up ID?
- What is a shell?
- What is a Subsidiary?
- What is a Vulnerability?
- What is a Web Application Header?
- What is a web shell attack?
- What is Content-Security-Policy (CSP)?
- What is DMARC?
- What is Endpoint Data?
- What is File Sharing (BitTorrent)?
- What is Malware?
- What is Sender Policy Framework (SPF)?
- What is Shadow IT?
- What is the difference between supported and unsupported software?
- What is TLS/SSL?
- What’s the Difference Between a Domain and Host?