Skip to main content
Applications
Security Posture Management
Continuous Monitoring
Vendor Risk Management
Trust Management Hub
Cyber Insurance
National Cybersecurity
Bitsight API docs
Bitsight Academy
Viewing as guest:
Log In
Sign in
Submit a request
Bitsight Knowledge Base
Bitsight Data
Glossaries
Glossaries
Understand the terminology behind cyber security.
Diffie-Hellman Primes and Keys
Forms of Attacks
Glossary of Terms
Glossary of Terms - File Sharing
Glossary of Terms - Public Disclosures
Glossary of Terms - Server Software
Glossary of Terms: Bitsight VRM
Glossary of Terms: Grading & Finding Behavior
Glossary of Terms: Infrastructure
Glossary of Terms: Web Applications
Goals of Content-Security-Policy (CSP)
What are Open Ports?
What is a Botnet?
What is a Rating Bundle?
What is a Rolled Up ID?
What is a Subsidiary?
What is a Web Application Header?
What is a web shell attack?
What is Content-Security-Policy (CSP)?
What is Endpoint Data?
What is File Sharing (BitTorrent)?
What is Malware?
What is Shadow IT?
What is the difference between supported and unsupported software?
What is TLS/SSL?
What’s the Difference Between a Domain and Host?