Logo
Security Performance Management
Continuous Monitoring
Cyber Insurance
National Cybersecurity
Submit a request
Sign in
  1. Bitsight Knowledge Base
  2. Common Questions & Best Practices
  3. Glossaries

Glossaries

Follow New articles New articles and comments

Understand the terminology behind cyber security.

  • What is a Rolled Up ID?
  • Glossary of Terms
  • Glossary of Terms - File Sharing
  • Glossary of Terms: Grading & Finding Behavior
  • Glossary of Terms: Infrastructure
  • Glossary of Terms - Public Disclosures
  • Glossary of Terms - Server Software
  • Fourth Parties
  • Forms of Attacks
  • What is a Botnet?
  • What is Content-Security-Policy (CSP)?
  • What is Endpoint Data?
  • What is File Sharing (BitTorrent)?
  • What is a Finding Lifetime?
  • What is a Finding Refresh?
  • What’s the Difference Between a Domain and Host?
  • What is the difference between supported and unsupported software?
  • What is Malware?
  • What are Open Ports?
  • What is a Rating Bundle?
  • What is Sender Policy Framework (SPF)?
  • What is a shell?
  • What is a subsidiary?
  • What is TLS/SSL?
  • What is a Vulnerability?
  • What is a web shell attack?
Contents © 2023 Bitsight Technologies
  • Privacy Policy |
  • Disclaimer |
  • Terms and Conditions |
  • Contact Bitsight |
  • Bitsight Academy |
  • Bitsight Support