Glossary
All important cybersecurity terms at a glance
Advanced persistent threat (apt)Antivirus softwareBrute force attackBuffer overflowCybersecurity frameworkDenial of service (dos)Denial-of-service (dos) attackDistributed denial of service (ddos)Distributed denial-of-service (ddos) attackEndpoint securityExploitFirewallIncident responseInformation security management systemIntrusion detection system (ids)Intrusion prevention system (ips)Intrusion response planKeyloggerMalwareMan-in-the-middle (mitm) attackMulti-factor authentication (mfa)Penetration testingPenetrationtestPharmingPhishingPrivileged access managementRansomwareRootkitSecure socket layer (ssl)Security auditSecurity information and event managementSecurity operations centreSession hijackingSpear phishingThreat intelligenceTokenisationTransport layer security (tls)Trojan horseTwo-factor authentication (2fa)Virtual private network (vpn)VirtualisationVulnerabilityVulnerability assessmentWeb application firewall (waf)Zero day exploitZero-day vulnerability
The colleagues at Laokoon were on hand to answer any questions we had and provided uncomplicated support.
Team Leader Development