Glossary
All important cybersecurity terms at a glance
Advanced persistent threat (apt)Antivirus softwareBrute force attackBuffer overflowCybersecurity FrameworkDenial of Service (DoS)Denial-of-service (dos) attackDistributed Denial of Service (DDoS)Distributed denial-of-service (ddos) attackEndpoint SecurityExploitFirewallIncident responseInformation Security Management SystemIntrusion Detection System (ids)Intrusion prevention system (ips)Intrusion response planKeyloggerMalwareMan-in-the-middle (mitm) attackMulti-factor authentication (MFA)Penetration testingPenetrationtestPharmingPhishingPrivileged Access Management (PAM)RansomwareRootkitSecure Socket Layer (SSL)Security AuditSecurity Information and Event Management (SIEM)Security operations centreSession hijackingSpear phishingThreat IntelligenceTokenisationTransport Layer Security (TLS)Trojan horseTwo-factor authentication (2fa)Virtual Private Network (VPN)VirtualisationVulnerabilityVulnerability AssessmentWeb application firewall (waf)Zero day exploitZero-day vulnerability
The colleagues at Laokoon were on hand to answer any questions we had and provided uncomplicated support.
Team Leader Development