0% found this document useful (0 votes)
47 views

Computer Security Essential Terms

This document contains a list of cybersecurity terms and whether they are considered essential or optional knowledge. There are over 100 terms listed related to topics like access control, authentication, encryption, malware, hacking, and more. The majority are marked as essential knowledge areas, with some like availability, cloud security, and communications security listed as optional. Cybersecurity best practices involve understanding essential concepts across technical, operational, and organizational domains to effectively secure systems and protect sensitive data.

Uploaded by

ahmadgafarov1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views

Computer Security Essential Terms

This document contains a list of cybersecurity terms and whether they are considered essential or optional knowledge. There are over 100 terms listed related to topics like access control, authentication, encryption, malware, hacking, and more. The majority are marked as essential knowledge areas, with some like availability, cloud security, and communications security listed as optional. Cybersecurity best practices involve understanding essential concepts across technical, operational, and organizational domains to effectively secure systems and protect sensitive data.

Uploaded by

ahmadgafarov1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Access Control Essential

Advanced Persistent Threat (APT) Essential


Adware Essential
Anomaly-Based Detection Essential
Application Layer Firewall Essential
Asset Management Essential
Asymmetric Encryption Essential
Audit Trail Essential
Authentication Essential
Authorization Essential
Automated Threat Intelligence Essential
Availability Optional
Backdoor Essential
Behavioral Analytics Essential
Biometric Authentication Essential
Black Hat Hacker Essential
Blockchain Security Essential
Blue Team Essential
Boot Sector Virus Essential
Bot Essential
Botnet Essential
Brute Force Attack Essential
Buffer Overflow Essential
Bug Bounty Program Essential
Business Impact Analysis Essential
CAPTCHA Essential
Certificate Authority Essential
Ciphertext Essential
Clickjacking Essential
Client-Side Scripting Essential
Cloud Security Optional
Code Injection Essential
Communications Security Optional
Compliance Optional
Compliance Auditing Essential
Confidentiality Optional
Content Filtering Essential
Continual Improvement Optional
Corrective Action Optional
Credential Harvesting Essential
Cross-Site Request Forgery (CSRF) Essential
Cross-Site Scripting (XSS) Essential
Cryptographic Controls Optional
Cryptography Essential
Cryptography Algorithm Optional
Cyber Forensics Essential
Cyber Resilience Essential
Data Breach Essential
Data Encryption Standard (DES) Essential
Data Loss Prevention (DLP) Essential
Data Masking Essential
Data Sovereignty Essential
Deep Packet Inspection (DPI) Essential
Denial of Service (DoS) Attack Essential
Digital Certificate Essential
Digital Signature Essential
Disk Encryption Essential
Distributed Denial of Service (DDoS) Attack Essential
DNS Cache Poisoning Essential
DNS Tunneling Essential
Domain Name System (DNS) Security Essential
Drive-By Download Essential
Email Spoofing Essential
Encapsulation Essential
Encryption Optional
Endpoint Detection and Response (EDR) Essential
Endpoint Security Optional
Environmental Security Optional
Ethical Hacking Essential
Exploit Essential
External Threat Essential
File Integrity Monitoring Essential
Firewall Essential
Footprinting Optional
Forensics Essential
Gateway Optional
Geo-Location Filtering Essential
Gray Hat Hacker Essential
Green Team Essential
Hash Function Essential
Heterogeneous Network Essential
Hijack Attack Essential
Honeypot Essential
HTTP Header Injection Optional
HTTP Secure (HTTPS) Essential
Human Resources Security Optional
Identity and Access Management (IAM) Essential
Identity Theft Essential
Incident Management Optional
Incident Response Essential
Information Security Management System (ISMS) Optional
Information Security Policy Essential
Information Security Policy Essential
Insider Threat Essential
Integrity Optional
Integrity Check Essential
IoT Security Essential
IP Spoofing Essential
Keylogger Essential
Keystroke Logging Optional
LDAP Injection Essential
Machine Learning in Security Optional
Malware Essential
Man-in-the-Middle Attack Essential
Multifactor Authentication Essential
Network Behavioral Analysis Essential
Open Source Intelligence (OSINT) Optional
Operations Security Optional
Penetration Testing Essential
Performance Evaluation Optional
Perimeter Security Optional
Phishing Essential
Physical Security Optional
Port Scanning Essential
Preventive Action Optional
Proxy Server Optional
Public Key Essential
Ransomware Essential
Red Team Essential
Risk Assessment Optional
Root Certificate Optional
Rootkit Essential
Sandboxing Essential
Secure Shell (SSH) Essential
Security Incident Management Optional
Security Information and Event Management (SIEM) Essential
Security Operations Center (SOC) Essential
Session Hijacking Essential
Session Token Optional
SIEM Integration Optional
Single Sign-On (SSO) Essential
Social Engineering Essential
Spam Essential
Spoofing Attack Optional
Spyware Essential
SQL Injection Essential
SSL Certificate Essential
SSL/TLS Essential
Steganography Optional
Threat Intelligence Optional
Token-Based Authentication Essential
Traffic Analysis Optional
Trojan Horse Essential
Trojanized Software Optional
Two-Factor Authentication Essential
User Behavior Analytics (UBA) Essential
Virtual Private Network (VPN) Essential
Virtualization Security Optional
Vulnerability Assessment Optional
Web Application Firewall (WAF) Optional
White Hat Hacker Essential
Whitelisting Essential
Wi-Fi Protected Access (WPA) Essential
Worm Essential
Zero Trust Architecture Essential
Zero-Day Exploit Essential
Zombie Computer Essential

You might also like