Glossary
All important cybersecurity terms at a glance
Advanced persistent threat (apt)Antivirus softwareBrute force attackBuffer overflowCybersecurity frameworkDenial of Service (DoS)Denial-of-service (dos) attackDistributed Denial of Service (DDoS)Distributed denial-of-service (ddos) attackEndpoint securityExploitFirewallIncident responseInformation security management systemIntrusion detection system (ids)Intrusion prevention system (ips)Intrusion response planKeyloggerMalwareMan-in-the-middle (mitm) attackMulti-factor authentication (MFA)Penetration testingPenetrationtestPharmingPhishingPrivileged Access Management (PAM)RansomwareRootkitSecure Socket Layer (SSL)Security auditSecurity Information and Event Management (SIEM)Security operations centreSession hijackingSpear phishingThreat intelligenceTokenisationTransport Layer Security (TLS)Trojan horseTwo-factor authentication (2fa)Virtual Private Network (VPN)VirtualisationVulnerabilityVulnerability assessmentWeb application firewall (waf)Zero day exploitZero-day vulnerability
The colleagues at Laokoon were on hand to answer any questions we had and provided uncomplicated support.
Team Leader Development