Skip to main content
Bitsight Knowledge Base Help Center home page
Security Posture Management
Continuous Monitoring
Vendor Risk Management
Trust Management Hub
Cyber Insurance
National Cybersecurity
    Bitsight API docs Bitsight Academy
    • Sign in
    • Submit a request
  1. Bitsight Knowledge Base
  2. Bitsight Data
  3. Glossaries

Glossaries

Understand the terminology behind cyber security.

  • Diffie-Hellman Primes and Keys
  • Forms of Attacks
  • Glossary of Terms
  • Glossary of Terms - File Sharing
  • Glossary of Terms - Public Disclosures
  • Glossary of Terms - Server Software
  • Glossary of Terms: Bitsight VRM
  • Glossary of Terms: Grading & Finding Behavior
  • Glossary of Terms: Infrastructure
  • Glossary of Terms: Web Applications
  • Goals of Content-Security-Policy (CSP)
  • What are Open Ports?
  • What is a Botnet?
  • What is a Rating Bundle?
  • What is a Rolled Up ID?
  • What is a Subsidiary?
  • What is a Web Application Header?
  • What is a web shell attack?
  • What is Content-Security-Policy (CSP)?
  • What is Endpoint Data?
  • What is File Sharing (BitTorrent)?
  • What is Malware?
  • What is Shadow IT?
  • What is the difference between supported and unsupported software?
  • What is TLS/SSL?
  • What’s the Difference Between a Domain and Host?

Contents © 2025 BitSight Technologies, Inc. ("Bitsight")

Privacy Policy | Disclaimer | Terms and Conditions | Contact Bitsight | Bitsight Academy | Bitsight Support