Cybersecurity glossary
Every security term you'll encounter, explained in plain English.
A
API Key
GeneralA secret token used to authenticate with an API. Leaked API keys can give attackers full access to the connected service.
Attack Path
NetworkA step-by-step route an attacker could take through your systems to reach a valuable target like a database or secrets vault.
Attack Surface
ScanningEverything about your systems that is exposed to the internet and could potentially be targeted by an attacker.
B
Blast Radius
NetworkHow much damage an attacker could do from a single entry point — how many systems they could reach.
C
Centrality
NetworkHow critical an asset is in your network — assets with high centrality appear on many attack paths.
CIDR
NetworkA notation for IP address ranges. For example, 10.0.0.0/24 represents 256 addresses from 10.0.0.0 to 10.0.0.255.
Cipher Suite
SSL/TLSThe combination of encryption algorithms used for a secure connection. Weak cipher suites can be broken by attackers.
Click Rate
PhishingThe percentage of people who clicked a link in a phishing test email. Lower is better.
Compliance Control
ComplianceA specific security requirement from a framework. For example, SOC 2 CC6 requires logical and physical access controls.
CVE
VulnerabilityA publicly known cybersecurity vulnerability with a unique ID (Common Vulnerabilities and Exposures). Example: CVE-2024-21762.
CVSS
VulnerabilityA number from 0 to 10 rating how dangerous a vulnerability is. 9-10 is critical, 7-8.9 is high, 4-6.9 is medium, below 4 is low.
CVSS Score
VulnerabilityA number from 0 to 10 rating how dangerous a vulnerability is. 9-10 is critical, 7-8.9 is high, 4-6.9 is medium, below 4 is low.
D
DKIM
NetworkDomainKeys Identified Mail — email authentication using digital signatures to verify emails haven't been altered.
DMARC
NetworkDomain-based Message Authentication — a policy telling email providers what to do with messages failing SPF or DKIM.
DNS
NetworkDomain Name System — translates domain names (example.com) into IP addresses.
E
Entry Point
NetworkAn internet-facing system where an attacker would begin their attack, such as a web server or API endpoint.
I
ISO 27001
ComplianceAn international standard for information security management systems. Certification demonstrates global security standards.
L
Lateral Movement
NetworkWhen an attacker moves from one compromised system to another within your network, expanding their access.
M
MFA
GeneralMulti-Factor Authentication — requiring a second verification step (like a phone code) in addition to a password.
O
OAuth
IdentityAn authorization protocol that lets users grant third-party apps limited access to their accounts without sharing passwords.
P
Phishing
PhishingA social engineering attack using fake emails or websites to trick people into revealing passwords or sensitive data.
PKCE
IdentityProof Key for Code Exchange — a security extension for OAuth that prevents authorization code interception attacks.
Port
ScanningA numbered endpoint on a server where a specific service listens. For example, port 443 is HTTPS, port 22 is SSH, port 3306 is MySQL.
Privilege Escalation
IdentityWhen an attacker with limited access finds a way to gain higher-level permissions, like going from user to admin.
R
RBAC
GeneralRole-Based Access Control — assigning permissions based on a user's role (Admin, Analyst, Viewer) rather than per individual.
RCE
VulnerabilityRemote Code Execution — an attacker can run commands on your server from anywhere on the internet. One of the most dangerous types.
Report Rate
PhishingThe percentage of people who correctly reported a phishing test email as suspicious. Higher is better.
S
SAML
IdentitySecurity Assertion Markup Language — an XML protocol for exchanging authentication data between identity providers and services.
Scan Preset
ScanningA pre-configured set of scan options. Quick is fast but basic, Standard covers most issues, Deep is the most thorough.
Score Breakdown
GeneralThe five factors of your security score: vulnerabilities, configuration, attack exposure, patch currency, and monitoring.
Security Score
GeneralA 0-100 rating of how secure an asset or organization is, based on vulnerabilities, configuration, and monitoring.
Self-Signed Certificate
SSL/TLSA certificate you created yourself rather than getting from a trusted authority. Browsers don't trust these.
Service Detection
ScanningIdentifying what software is running on each open port, including its version. Outdated versions often have known vulnerabilities.
SOC 2
ComplianceService Organization Control 2 — a compliance framework for service providers covering security, availability, and privacy.
SPF
NetworkSender Policy Framework — a DNS record specifying which mail servers can send email for your domain. Prevents spoofing.
SQL Injection
VulnerabilityAn attack where malicious database commands are inserted through your application's input fields, potentially exposing all your data.
SSL Certificate
SSL/TLSA digital certificate that enables encrypted (HTTPS) connections to your domain. Expired certificates cause browser warnings.
SSO
IdentitySingle Sign-On — log in once and access multiple applications. Misconfigured SSO can allow unauthorized access.
SSRF
VulnerabilityServer-Side Request Forgery — an attack that tricks your server into making requests to internal systems it shouldn't access.
Subdomain
ScanningA prefix to your main domain (like blog.example.com). Each subdomain can have its own server and vulnerabilities.
T
TLS
SSL/TLSTransport Layer Security — the protocol that encrypts data between a user's browser and your server. The successor to SSL.
Token Replay
IdentityAn attack where a stolen authentication token is reused by an attacker to impersonate the legitimate user.
W
Webhook
GeneralAn automated notification sent from one system to another when a specific event occurs.
X
XSS
VulnerabilityCross-Site Scripting — an attack that injects malicious code into web pages viewed by other users, potentially stealing their session data.
Z
Zero-day
VulnerabilityA vulnerability that has no available fix yet. Especially dangerous because attackers can exploit them before a patch is released.
