Skip to main content
Bitsight Knowledge Base Help Center home page
Security Performance Management
Continuous Monitoring
Vendor Risk Management
Trust Management Hub
Cyber Insurance
National Cybersecurity
  • Sign in
  • Submit a request
  1. Bitsight Knowledge Base
  2. Bitsight Data
  3. Glossaries

Glossaries

Understand the terminology behind cyber security.

  • Diffie-Hellman Primes and Keys
  • Forms of Attacks
  • Glossary of Terms
  • Glossary of Terms - File Sharing
  • Glossary of Terms - Public Disclosures
  • Glossary of Terms - Server Software
  • Glossary of Terms: Bitsight VRM
  • Glossary of Terms: Grading & Finding Behavior
  • Glossary of Terms: Infrastructure
  • Glossary of Terms: Web Applications
  • Goals of Content-Security-Policy (CSP)
  • What are Open Ports?
  • What is a Botnet?
  • What is a Rating Bundle?
  • What is a Rolled Up ID?
  • What is a Subsidiary?
  • What is a Vulnerability?
  • What is a Web Application Header?
  • What is a web shell attack?
  • What is Content-Security-Policy (CSP)?
  • What is DMARC?
  • What is Endpoint Data?
  • What is File Sharing (BitTorrent)?
  • What is Malware?
  • What is Sender Policy Framework (SPF)?
  • What is Shadow IT?
  • What is the difference between supported and unsupported software?
  • What is TLS/SSL?
  • What’s the Difference Between a Domain and Host?

Contents © 2025 BitSight Technologies, Inc. ("Bitsight")

Privacy Policy | Disclaimer | Terms and Conditions | Contact Bitsight | Bitsight Academy | Bitsight Support