top of page
Services
Assessments & Risk Analysis
Audits & Compliance
Cybersecurity Solutions
Govt Contracting
Preparedness
Project Management
Physical Security
PENTESTing
Small Business Solutions
Why Choose Us
Industries
Contact Us
More
About
Blog
Glossary
More
Use tab to navigate through the menu items.
Glossary List
Filters
Filter by Term
Select Term
Filter by Source
Select Source
Filter by Letter
Select Letter
Search
Access Control
Read Definition
Access Control Matrix
Read Definition
Access Control System (ACS)
Read Definition
Access Credential
Read Definition
Access Log
Read Definition
Access Point (AP)
Read Definition
Access Recertification
Read Definition
Active Defense
Read Definition
Active Directory (AD)
Read Definition
Active Reconnaissance
Read Definition
Adaptive Authentication
Read Definition
Address Resolution Protocol (ARP) Spoofing
Read Definition
Administrative Controls
Read Definition
Administrative Privilege
Read Definition
Advanced Persistent Threat (APT)
Read Definition
Aerial Surveillance
Read Definition
Aggregation Switch
Read Definition
Air Gap
Read Definition
Air Monitoring System
Read Definition
Alarm Monitoring
Read Definition
Alert Fatigue
Read Definition
Algorithmic Risk Scoring
Read Definition
Alternative Worksite
Read Definition
Anomaly Detection
Read Definition
Anti-Forensics
Read Definition
Anti-Malware Gateway
Read Definition
Anti-Tamper Protection
Read Definition
Application Security
Read Definition
Application Whitelisting
Read Definition
Architecture Review
Read Definition
Asset Inventory
Read Definition
Asset Protection
Read Definition
Asset Tagging
Read Definition
Attack Chain
Read Definition
Attack Path Analysis
Read Definition
Attack Simulation
Read Definition
Attack Surface
Read Definition
Attenuation
Read Definition
Audit Charter
Read Definition
Audit Finding
Read Definition
Audit Scope
Read Definition
Audit Trail
Read Definition
Audit Universe
Read Definition
Authentication
Read Definition
Authentication Token
Read Definition
Authorization
Read Definition
Authorization Boundary
Read Definition
Automated Patch Deployment
Read Definition
Autonomous Security System
Read Definition
Availability
Read Definition
BYOD (Bring Your Own Device)
Read Definition
Backhaul Network
Read Definition
Badge Anti-Passback
Read Definition
Badge System
Read Definition
Barricade Device
Read Definition
Baseline Configuration
Read Definition
Baseline Security Controls
Read Definition
Baton Relay Protocol
Read Definition
Behavior-Based Access
Read Definition
Behavioral Analytics
Read Definition
Behavioral Threat Assessment
Read Definition
Biometric Authentication
Read Definition
Blacklisting
Read Definition
Blast Mitigation
Read Definition
Blast Resistant Glazing
Read Definition
Blockchain Security
Read Definition
Blue Team
Read Definition
Botnet
Read Definition
Boundary Layer Security
Read Definition
Boundary Protection
Read Definition
Breach Containment
Read Definition
Breach Notification
Read Definition
Bridge Protocol Data Unit (BPDU) Guard
Read Definition
Brute-Force Attack
Read Definition
Buffer Overflow
Read Definition
Building Access Zones
Read Definition
Building Envelope Security
Read Definition
Building Hardening
Read Definition
Business Continuity
Read Definition
Business Email Compromise (BEC)
Read Definition
Business Impact Analysis (BIA)
Read Definition
Bypass Attack
Read Definition
CCTV
Read Definition
Cable Encryption
Read Definition
Cable Management Security
Read Definition
Camera Blind Spot
Read Definition
Capability Maturity Model
Read Definition
Capacity Planning
Read Definition
Capacity Security
Read Definition
Capture-The-Flag (CTF) Exercise
Read Definition
Cascading Failure
Read Definition
Certificate Authority (CA)
Read Definition
Certificate Pinning
Read Definition
Chain of Custody
Read Definition
Challenge-Response Authentication
Read Definition
Change Control
Read Definition
Change Management Plan
Read Definition
Chemical Hazard Control
Read Definition
Circuit Breaker Lockout
Read Definition
Circuit Protection
Read Definition
Clearance Level
Read Definition
Clickjacking
Read Definition
Closed Area (Secure Space)
Read Definition
Cloud Access Security Broker (CASB)
Read Definition
Cloud Security
Read Definition
Coercion Detection
Read Definition
Cold Site
Read Definition
Command Injection
Read Definition
Command and Control (C2)
Read Definition
Compensating Control
Read Definition
Compliance Audit
Read Definition
Compromise Assessment
Read Definition
ConOps (Concept of Operations)
Read Definition
Confidentiality Agreement
Read Definition
Configuration Drift
Read Definition
Construction Security Plan
Read Definition
Containment Strategy
Read Definition
Continuity of Government (COG)
Read Definition
Continuity of Operations (COOP)
Read Definition
Continuous Monitoring
Read Definition
Contractor Vetting
Read Definition
Convergence Security
Read Definition
Counterintelligence
Read Definition
Covert Channel
Read Definition
Covert Entry
Read Definition
Credential Harvesting
Read Definition
Credential Theft
Read Definition
Criminal Trespass
Read Definition
Crisis Communications Plan
Read Definition
Critical Infrastructure
Read Definition
Criticality Analysis
Read Definition
Cross-Connect Security
Read Definition
Cross-Site Scripting (XSS)
Read Definition
Cryptographic Module
Read Definition
Cyber Hygiene
Read Definition
Cyber Incident
Read Definition
Cyber Kill Chain
Read Definition
Cyber Maturity Assessment
Read Definition
Cyber Resilience
Read Definition
Cyber Threat Intelligence
Read Definition
Data Aggregation Risk
Read Definition
Data Breach
Read Definition
Data Broker Risk Evaluation
Read Definition
Data Classification
Read Definition
Data Custodian
Read Definition
Data Encryption
Read Definition
Data Exfiltration
Read Definition
Data Governance
Read Definition
Data Integrity
Read Definition
Data Lifecycle Management
Read Definition
Data Loss Prevention (DLP)
Read Definition
Data Masking
Read Definition
Data Minimization
Read Definition
Data Owner
Read Definition
Data Sanitization
Read Definition
Data Sovereignty
Read Definition
De-escalation Techniques
Read Definition
Debriefing Protocol
Read Definition
Decentralized Identity
Read Definition
Decoy System (Honeypot)
Read Definition
Deep Packet Inspection (DPI)
Read Definition
Defense Readiness Condition (DEFCON)
Read Definition
Defense in Depth
Read Definition
Defensive Architecture
Read Definition
Demobilization Plan
Read Definition
Denial-of-Service Attack (DoS)
Read Definition
Detection Engineering
Read Definition
Device Hardening
Read Definition
Differential Privacy
Read Definition
Digital Evidence Preservation
Read Definition
Digital Forensics Lab
Read Definition
Digital Rights Management (DRM)
Read Definition
Digital Signature
Read Definition
Disaster Declaration
Read Definition
Disaster Preparedness
Read Definition
Disaster Recovery
Read Definition
Disinformation Defense
Read Definition
Distributed Denial-of-Service (DDoS)
Read Definition
Distributed Ledger Security
Read Definition
Door Hardening
Read Definition
Door Position Switch (DPS)
Read Definition
Dual Authorization
Read Definition
Dual-Factor Encryption
Read Definition
Duty of Care
Read Definition
Economic Espionage
Read Definition
Egress Control
Read Definition
Electronic Key Management
Read Definition
Emergency Operations Center (EOC)
Read Definition
Emergency Operations Plan (EOP)
Read Definition
Emergency Power System
Read Definition
Endpoint Detection & Response (EDR)
Read Definition
Endpoint Encryption
Read Definition
Endpoint Isolation
Read Definition
Energy Security
Read Definition
Engineering Controls
Read Definition
Enterprise Architecture Security
Read Definition
Entrance Screening Procedures
Read Definition
Entry Control Point (ECP)
Read Definition
Environmental Design Security (CPTED)
Read Definition
Escalation Protocol
Read Definition
Escalation of Privilege
Read Definition
Event Correlation
Read Definition
Evidence Retention Policy
Read Definition
Exfiltration Prevention
Read Definition
Exploit
Read Definition
Exploit Kit
Read Definition
Exposure Index
Read Definition
Facility Buffer Zone
Read Definition
Facility Security Plan (FSP)
Read Definition
Fail-Safe Design
Read Definition
Fail-Secure Design
Read Definition
Failover System
Read Definition
False Alarm Rate
Read Definition
Federated Access Control
Read Definition
Federated Identity Management
Read Definition
File Encryption
Read Definition
File Integrity Monitoring (FIM)
Read Definition
Fire Load Assessment
Read Definition
Fire Watch
Read Definition
Firewall
Read Definition
Firewall Logging
Read Definition
Firewall Rule Set
Read Definition
Firmware Security
Read Definition
Flood Barrier System
Read Definition
Flood Mitigation
Read Definition
Force-on-Force Exercise
Read Definition
Forensic Chain Verification
Read Definition
Forensics
Read Definition
Form-Based Authentication
Read Definition
Forward Operating Base Security
Read Definition
Geofencing
Read Definition
Governance
Read Definition
Governance Risk & Compliance (GRC)
Read Definition
Guard Force Management
Read Definition
Guard Tour System
Read Definition
Hardened Network Segment
Read Definition
Hardening
Read Definition
Hazard Mitigation
Read Definition
High-Security Lock
Read Definition
Host-Based Firewall
Read Definition
IAM (Identity & Access Management)
Read Definition
ICS (Industrial Control System)
Read Definition
IP Surveillance
Read Definition
Identity Proofing
Read Definition
Impact Analysis
Read Definition
Incident Command System (ICS)
Read Definition
Incident Response
Read Definition
Indicator of Compromise (IOC)
Read Definition
Insider Threat
Read Definition
Intrusion Alarm System
Read Definition
Intrusion Detection System (IDS)
Read Definition
Intrusion Prevention System (IPS)
Read Definition
Inventory Control
Read Definition
Joint Information Center (JIC)
Read Definition
Key Control
Read Definition
Key Performance Indicator (KPI) – Security
Read Definition
Lateral Movement
Read Definition
Layered Physical Security
Read Definition
Least Privilege
Read Definition
Lockdown Procedure
Read Definition
Logical Access Control
Read Definition
Malicious Insider
Read Definition
Malware
Read Definition
Mantrap
Read Definition
Mass Notification System
Read Definition
Media Sanitization
Read Definition
Mitigation Strategy
Read Definition
Mobile Device Management (MDM)
Read Definition
Multi-Factor Authentication (MFA)
Read Definition
Mutual Aid Agreement
Read Definition
Network Security
Read Definition
Network Segmentation
Read Definition
Operational Resilience
Read Definition
Operational Risk
Read Definition
Oversight & Compliance
Read Definition
Passive Surveillance
Read Definition
Patch Management
Read Definition
Pentest (Penetration Testing)
Read Definition
Perimeter Security
Read Definition
Personnel Screening
Read Definition
Physical Access Audit
Read Definition
Physical Security Barrier
Read Definition
Policy Enforcement
Read Definition
Preparedness Training
Read Definition
Privileged Access Management (PAM)
Read Definition
Protective Intelligence
Read Definition
Quality Assurance (QA) Audit
Read Definition
Rapid Response Protocol
Read Definition
Red Team
Read Definition
Remote Access Security
Read Definition
Residual Risk
Read Definition
Risk Appetite
Read Definition
Risk Assessment
Read Definition
Risk Management Framework
Read Definition
Security Audit
Read Definition
Security Operations Center (SOC)
Read Definition
Security Posture
Read Definition
Situational Awareness
Read Definition
Social Engineering
Read Definition
Surveillance System
Read Definition
Tailgating
Read Definition
Threat Actor
Read Definition
Workplace Violence Prevention
Read Definition
Zero Trust Architecture
Read Definition
bottom of page