Cybersecurity Glossary

Topics

What are Cybersecurity Threats

In this article you will learn what are cybersecurity threats - any possible malicious attacks on data or an organiza... ...read more

What is physical security

In this article you learn what is physical security. It means preventing unauthorized access to buildings, rooms, fac... ...read more

What are Software Assets

In this article, you will learn what software assets are. They include software products and cloud services used by a... ...read more

What is ISMS

In this article, you will learn what the acronym means and the introduction of ISMS in the company: an established in... ...read more

What is Threat-Led Penetration Tests (TLPT)

In this article you learn what is Threat-Led Penetration Test (TLPT) ...read more

What are Primary Assets

In this article, you will learn what information assets are and how to use them. ...read more

What is Confidentiality

In this article, you will learn what confidentiality means in the field of information security. ...read more

What are Information Assets

Information assets are the data, information and knowledge that an organization needs to run its operations and makin... ...read more

What is Integrity

In this article, you will learn what data and information integrity is in information security field ...read more

What is Red Teaming

In this article you learn what is red-teaming. simulating real-world attacks. ...read more

What is the CIA Triad of Information Security

In this article, you will learn what the CIA information security triad is. ...read more

What is Availability

In this article, you will learn what availability is in information security. ...read more

What is ISO 27001

In this article you learn what is ISO 27001. It is an international standard that defines the requirements for an inf... ...read more

What is Information Security Pyramid

In this article, you will learn what the pyramid of information security - ...read more

What is Insider Threat

In this article, you will learn what an insider threat is. It is an individual, former or current employee, who may i... ...read more

What is NIST

What is NIST and what they do ...read more

What is Phishing

In this article, you will learn what phishing is and what kind of threat it poses ...read more

What is All-Hazard Approach in Cybersecurity

In this article you will learn what the all-hazard approach required by NIS2 in clause 21.2 is ...read more

What is Digital Identity

Digital identity is the equivalent of a person in the digital world, electronic representation of an individual. ...read more

What is User Account

User Account is a login credential that allows access to a system or platform. ...read more

What is Cyber Hygiene

In this article you learn what is cyber hygiene - set of work habits, activities and processes that reduce the likeli... ...read more