top of page

Glossary List

Filters

Search

Access Control

Access Control Matrix

Access Control System (ACS)

Access Credential

Access Log

Access Point (AP)

Access Recertification

Active Defense

Active Directory (AD)

Active Reconnaissance

Adaptive Authentication

Address Resolution Protocol (ARP) Spoofing

Administrative Controls

Administrative Privilege

Advanced Persistent Threat (APT)

Aerial Surveillance

Aggregation Switch

Air Monitoring System

Alarm Monitoring

Alert Fatigue

Algorithmic Risk Scoring

Alternative Worksite

Anomaly Detection

Anti-Forensics

Anti-Malware Gateway

Anti-Tamper Protection

Application Security

Application Whitelisting

Architecture Review

Asset Inventory

Asset Protection

Asset Tagging

Attack Chain

Attack Path Analysis

Attack Simulation

Attack Surface

Attenuation

Audit Charter

Audit Finding

Audit Scope

Audit Trail

Audit Universe

Authentication

Authentication Token

Authorization

Authorization Boundary

Automated Patch Deployment

Autonomous Security System

Availability

BYOD (Bring Your Own Device)

Backhaul Network

Badge Anti-Passback

Badge System

Barricade Device

Baseline Configuration

Baseline Security Controls

Baton Relay Protocol

Behavior-Based Access

Behavioral Analytics

Behavioral Threat Assessment

Biometric Authentication

Blacklisting

Blast Mitigation

Blast Resistant Glazing

Blockchain Security

Boundary Layer Security

Boundary Protection

Breach Containment

Breach Notification

Bridge Protocol Data Unit (BPDU) Guard

Brute-Force Attack

Buffer Overflow

Building Access Zones

Building Envelope Security

Building Hardening

Business Continuity

Business Email Compromise (BEC)

Business Impact Analysis (BIA)

Bypass Attack

Cable Encryption

Cable Management Security

Camera Blind Spot

Capability Maturity Model

Capacity Planning

Capacity Security

Capture-The-Flag (CTF) Exercise

Cascading Failure

Certificate Authority (CA)

Certificate Pinning

Chain of Custody

Challenge-Response Authentication

Change Control

Change Management Plan

Chemical Hazard Control

Circuit Breaker Lockout

Circuit Protection

Clearance Level

Clickjacking

Closed Area (Secure Space)

Cloud Access Security Broker (CASB)

Cloud Security

Coercion Detection

Command Injection

Command and Control (C2)

Compensating Control

Compliance Audit

Compromise Assessment

ConOps (Concept of Operations)

Confidentiality Agreement

Configuration Drift

Construction Security Plan

Containment Strategy

Continuity of Government (COG)

Continuity of Operations (COOP)

Continuous Monitoring

Contractor Vetting

Convergence Security

Counterintelligence

Covert Channel

Covert Entry

Credential Harvesting

Credential Theft

Criminal Trespass

Crisis Communications Plan

Critical Infrastructure

Criticality Analysis

Cross-Connect Security

Cross-Site Scripting (XSS)

Cryptographic Module

Cyber Hygiene

Cyber Incident

Cyber Kill Chain

Cyber Maturity Assessment

Cyber Resilience

Cyber Threat Intelligence

Data Aggregation Risk

Data Breach

Data Broker Risk Evaluation

Data Classification

Data Custodian

Data Encryption

Data Exfiltration

Data Governance

Data Integrity

Data Lifecycle Management

Data Loss Prevention (DLP)

Data Masking

Data Minimization

Data Owner

Data Sanitization

Data Sovereignty

De-escalation Techniques

Debriefing Protocol

Decentralized Identity

Decoy System (Honeypot)

Deep Packet Inspection (DPI)

Defense Readiness Condition (DEFCON)

Defense in Depth

Defensive Architecture

Demobilization Plan

Denial-of-Service Attack (DoS)

Detection Engineering

Device Hardening

Differential Privacy

Digital Evidence Preservation

Digital Forensics Lab

Digital Rights Management (DRM)

Digital Signature

Disaster Declaration

Disaster Preparedness

Disaster Recovery

Disinformation Defense

Distributed Denial-of-Service (DDoS)

Distributed Ledger Security

Door Hardening

Door Position Switch (DPS)

Dual Authorization

Dual-Factor Encryption

Duty of Care

Economic Espionage

Egress Control

Electronic Key Management

Emergency Operations Center (EOC)

Emergency Operations Plan (EOP)

Emergency Power System

Endpoint Detection & Response (EDR)

Endpoint Encryption

Endpoint Isolation

Energy Security

Engineering Controls

Enterprise Architecture Security

Entrance Screening Procedures

Entry Control Point (ECP)

Environmental Design Security (CPTED)

Escalation Protocol

Escalation of Privilege

Event Correlation

Evidence Retention Policy

Exfiltration Prevention

Exploit Kit

Exposure Index

Facility Buffer Zone

Facility Security Plan (FSP)

Fail-Safe Design

Fail-Secure Design

Failover System

False Alarm Rate

Federated Access Control

Federated Identity Management

File Encryption

File Integrity Monitoring (FIM)

Fire Load Assessment

Fire Watch

Firewall Logging

Firewall Rule Set

Firmware Security

Flood Barrier System

Flood Mitigation

Force-on-Force Exercise

Forensic Chain Verification

Form-Based Authentication

Forward Operating Base Security

Geofencing

Governance

Governance Risk & Compliance (GRC)

Guard Force Management

Guard Tour System

Hardened Network Segment

Hazard Mitigation

High-Security Lock

Host-Based Firewall

IAM (Identity & Access Management)

ICS (Industrial Control System)

IP Surveillance

Identity Proofing

Impact Analysis

Incident Command System (ICS)

Incident Response

Indicator of Compromise (IOC)

Insider Threat

Intrusion Alarm System

Intrusion Detection System (IDS)

Intrusion Prevention System (IPS)

Inventory Control

Joint Information Center (JIC)

Key Control

Key Performance Indicator (KPI) – Security

Lateral Movement

Layered Physical Security

Least Privilege

Lockdown Procedure

Logical Access Control

Malicious Insider

Mass Notification System

Media Sanitization

Mitigation Strategy

Mobile Device Management (MDM)

Multi-Factor Authentication (MFA)

Mutual Aid Agreement

Network Security

Network Segmentation

Operational Resilience

Operational Risk

Oversight & Compliance

Passive Surveillance

Patch Management

Pentest (Penetration Testing)

Perimeter Security

Personnel Screening

Physical Access Audit

Physical Security Barrier

Policy Enforcement

Preparedness Training

Privileged Access Management (PAM)

Protective Intelligence

Quality Assurance (QA) Audit

Rapid Response Protocol

Remote Access Security

Residual Risk

Risk Appetite

Risk Assessment

Risk Management Framework

Security Audit

Security Operations Center (SOC)

Security Posture

Situational Awareness

Social Engineering

Surveillance System

Tailgating

Threat Actor

Workplace Violence Prevention

Zero Trust Architecture

Contact Us

Copyright © 2035 by Mulier Bellator Security dBA Virga Security. Powered and secured by ENHQ

bottom of page