<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" generatedBy="WIX">
<url>
<loc>https://www.virgasecurity.com/glossary/access-control</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/access-control-matrix</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/access-control-system-(acs)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/access-credential</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/access-log</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/access-point-(ap)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/access-recertification</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/active-defense</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/active-directory-(ad)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/active-reconnaissance</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/adaptive-authentication</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/address-resolution-protocol-(arp)-spoofing</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/administrative-controls</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/administrative-privilege</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/advanced-persistent-threat-(apt)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/aerial-surveillance</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/aggregation-switch</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/air-gap</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/air-monitoring-system</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/alarm-monitoring</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/alert-fatigue</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/algorithmic-risk-scoring</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/alternative-worksite</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/anomaly-detection</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/anti-forensics</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/anti-malware-gateway</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/anti-tamper-protection</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/application-security</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/application-whitelisting</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/architecture-review</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/asset-inventory</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/asset-protection</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/asset-tagging</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/attack-chain</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/attack-path-analysis</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/attack-simulation</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/attack-surface</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/attenuation</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/audit-charter</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/audit-finding</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/audit-scope</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/audit-trail</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/audit-universe</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/authentication</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/authentication-token</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/authorization</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/authorization-boundary</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/automated-patch-deployment</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/autonomous-security-system</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/availability</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/backhaul-network</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/badge-anti-passback</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/badge-system</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/barricade-device</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/baseline-configuration</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/baseline-security-controls</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/baton-relay-protocol</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/behavior-based-access</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/behavioral-analytics</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/behavioral-threat-assessment</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/biometric-authentication</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/blacklisting</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/blast-mitigation</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/blast-resistant-glazing</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/blockchain-security</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/blue-team</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/botnet</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/boundary-layer-security</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/boundary-protection</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/breach-containment</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/breach-notification</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/bridge-protocol-data-unit-(bpdu)-guard</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/brute-force-attack</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/buffer-overflow</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/building-access-zones</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/building-envelope-security</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/building-hardening</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/business-continuity</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/business-email-compromise-(bec)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/business-impact-analysis-(bia)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/byod-(bring-your-own-device)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/bypass-attack</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/cable-encryption</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/cable-management-security</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/camera-blind-spot</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/capability-maturity-model</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/capacity-planning</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/capacity-security</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/capture-the-flag-(ctf)-exercise</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/cascading-failure</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/cctv</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/certificate-authority-(ca)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/certificate-pinning</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/chain-of-custody</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/challenge-response-authentication</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/change-control</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/change-management-plan</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/chemical-hazard-control</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/circuit-breaker-lockout</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/circuit-protection</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/clearance-level</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/clickjacking</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/closed-area-(secure-space)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/cloud-access-security-broker-(casb)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/cloud-security</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/coercion-detection</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/cold-site</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/command-and-control-(c2)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/command-injection</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/compensating-control</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/compliance-audit</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/compromise-assessment</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/confidentiality-agreement</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/configuration-drift</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/conops-(concept-of-operations)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/construction-security-plan</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/containment-strategy</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/continuity-of-government-(cog)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/continuity-of-operations-(coop)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/continuous-monitoring</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/contractor-vetting</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/convergence-security</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/counterintelligence</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/covert-channel</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/covert-entry</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/credential-harvesting</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/credential-theft</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/criminal-trespass</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/crisis-communications-plan</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/critical-infrastructure</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/criticality-analysis</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/cross-connect-security</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/cross-site-scripting-(xss)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/cryptographic-module</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/cyber-hygiene</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/cyber-incident</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/cyber-kill-chain</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/cyber-maturity-assessment</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/cyber-resilience</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/cyber-threat-intelligence</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/data-aggregation-risk</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/data-breach</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/data-broker-risk-evaluation</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/data-classification</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/data-custodian</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/data-encryption</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/data-exfiltration</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/data-governance</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/data-integrity</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/data-lifecycle-management</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/data-loss-prevention-(dlp)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/data-masking</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/data-minimization</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/data-owner</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/data-sanitization</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/data-sovereignty</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/de-escalation-techniques</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/debriefing-protocol</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/decentralized-identity</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/decoy-system-(honeypot)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/deep-packet-inspection-(dpi)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/defense-in-depth</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/defense-readiness-condition-(defcon)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/defensive-architecture</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/demobilization-plan</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/denial-of-service-attack-(dos)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/detection-engineering</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/device-hardening</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/differential-privacy</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/digital-evidence-preservation</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/digital-forensics-lab</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/digital-rights-management-(drm)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/digital-signature</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/disaster-declaration</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/disaster-preparedness</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/disaster-recovery</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/disinformation-defense</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/distributed-denial-of-service-(ddos)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/distributed-ledger-security</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/door-hardening</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/door-position-switch-(dps)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/dual-authorization</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/dual-factor-encryption</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/duty-of-care</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/economic-espionage</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/egress-control</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/electronic-key-management</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/emergency-operations-center-(eoc)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/emergency-operations-plan-(eop)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/emergency-power-system</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/endpoint-detection-%26-response-(edr)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/endpoint-encryption</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/endpoint-isolation</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/energy-security</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/engineering-controls</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/enterprise-architecture-security</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/entrance-screening-procedures</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/entry-control-point-(ecp)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/environmental-design-security-(cpted)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/escalation-of-privilege</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/escalation-protocol</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/event-correlation</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/evidence-retention-policy</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/exfiltration-prevention</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/exploit</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/exploit-kit</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/exposure-index</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/facility-buffer-zone</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/facility-security-plan-(fsp)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/fail-safe-design</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/fail-secure-design</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/failover-system</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/false-alarm-rate</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/federated-access-control</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/federated-identity-management</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/file-encryption</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/file-integrity-monitoring-(fim)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/fire-load-assessment</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/fire-watch</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/firewall</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/firewall-logging</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/firewall-rule-set</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/firmware-security</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/flood-barrier-system</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/flood-mitigation</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/force-on-force-exercise</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/forensic-chain-verification</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/forensics</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/form-based-authentication</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/forward-operating-base-security</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/geofencing</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/governance</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/governance-risk-%26-compliance-(grc)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/guard-force-management</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/guard-tour-system</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/hardened-network-segment</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/hardening</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/hazard-mitigation</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/high-security-lock</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/host-based-firewall</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/iam-(identity-%26-access-management)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/ics-(industrial-control-system)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/identity-proofing</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/impact-analysis</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/incident-command-system-(ics)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/incident-response</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/indicator-of-compromise-(ioc)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/insider-threat</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/intrusion-alarm-system</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/intrusion-detection-system-(ids)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/intrusion-prevention-system-(ips)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/inventory-control</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/ip-surveillance</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/joint-information-center-(jic)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/key-control</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/key-performance-indicator-(kpi)-%E2%80%93-security</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/lateral-movement</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/layered-physical-security</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/least-privilege</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/lockdown-procedure</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/logical-access-control</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/malicious-insider</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/malware</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/mantrap</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/mass-notification-system</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/media-sanitization</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/mitigation-strategy</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/mobile-device-management-(mdm)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/multi-factor-authentication-(mfa)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/mutual-aid-agreement</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/network-security</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/network-segmentation</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/operational-resilience</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/operational-risk</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/oversight-%26-compliance</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/passive-surveillance</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/patch-management</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/pentest-(penetration-testing)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/perimeter-security</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/personnel-screening</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/physical-access-audit</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/physical-security-barrier</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/policy-enforcement</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/preparedness-training</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/privileged-access-management-(pam)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/protective-intelligence</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/quality-assurance-(qa)-audit</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/rapid-response-protocol</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/red-team</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/remote-access-security</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/residual-risk</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/risk-appetite</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/risk-assessment</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/risk-management-framework</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/security-audit</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/security-operations-center-(soc)</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/security-posture</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/situational-awareness</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/social-engineering</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/surveillance-system</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/tailgating</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/threat-actor</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/workplace-violence-prevention</loc>
<lastmod>2025-12-05</lastmod>
</url>
<url>
<loc>https://www.virgasecurity.com/glossary/zero-trust-architecture</loc>
<lastmod>2025-12-05</lastmod>
</url>
</urlset>