IT Security Glossary

Unlock Your Cybersecurity Know-How with FastPass: Your IT Security Glossary Guide.

A

International Information System Security Certification Consortium

B

Business-to-Business

C

A challenge-response test designed to differentiate between human users and automated bots, commonly used during authentication to prevent automated attacks.

D

A part of the internet that is intentionally hidden and often used for illegal or malicious activities.

E

Unauthorized interception of communications

F

Software and cloud solution including SSPR and IVM.

G

Global Cyber Alliance

H

A specific type of message authentication code involving a cryptographic hash function and a secret cryptographic key for data integrity verification.

I

The process of verifying that a user is who they claim to be, often through the use of confirmation codes, links, or additional authentication methods.

J

Granting elevated privileges to users only for the time necessary to perform a specific task, reducing the overall attack surface.

K

A network authentication protocol used in AD for secure authentication between clients and servers.

L

Risk of data interception and exposure

M

Mandatory Access Control

N

National Cybersecurity Center of Excellence

O

Open Authorization

P

 A sequence of words or a sentence used as a secure password.

Q

Offering a service or benefit in exchange for sensitive information or access, exploiting the principle of reciprocity.

R

Malicious software that encrypts files and demands payment for their release.

S

Security Assertion Markup Language

T

Following an authorized individual into a secure area by closely trailing them, exploiting the lack of physical security awareness.

U

Risk of data breaches, data loss, or system compromise

V

A secure connection that allows users to access a private network over the internet.

W

Web Application Firewall

X

Cross-Site Scripting

Y

A hardware-based authentication device supporting various authentication protocols and providing a secure alternative to traditional passwords.

Z

Security model based on the principle of "never trust, always verify"

Protect your Passwords today with FastPass

Get in touch with us today by filling up the form and our team will get back to you as soon as possible.

Scroll to Top