top of page

Cyber Terminologies and Fundamentals

Definitions 

Access Control

A security technique that regulates who or what can view or use resources in a computing environment.

Advanced Persistent Threat (APT)

A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.

Authentication

The process of verifying the identity of a user, device, or system before granting access.

Adversary Simulation

A cybersecurity testing method where ethical hackers mimic real-world attacks to assess security defenses.

Attack Vector

A method or pathway used by attackers to exploit vulnerabilities and gain unauthorized access to systems.

Asset Management

The process of tracking and managing hardware, software, and data assets in an organization.

Authorization

The process of determining whether a user has permission to access specific resources or perform certain actions.

Anti-Virus

A software program designed to detect, prevent, and remove malware from computer systems.

Asymmetric Encryption

A cryptographic method that uses a pair of keys (public and private) for secure communication.

Application Security

Practices and measures implemented to protect software applications from security threats and vulnerabilities.

Arbitrary Code Execution

A security vulnerability that allows attackers to execute malicious code on a targeted system.

Address Resolution Protocol (ARP)

A network protocol used to map an IP address to a MAC address within a local network.

Anonymization

The process of removing personally identifiable information from data sets to enhance privacy.

Audit Trail

A record that documents system activities, transactions, and access attempts for security monitoring.

Automated Threat Intelligence

The use of machine learning and AI to collect and analyze threat data in real-time.

Active Directory Security

Security practices aimed at protecting Microsoft's Active Directory from attacks and misconfigurations.

Air-Gapped Network

A security measure that isolates a network from unsecured external connections to prevent cyber threats.

Attack Surface

The total number of vulnerabilities or entry points available for potential cyberattacks.

Anomaly Detection

The identification of deviations from normal behavior in data, systems, or networks to detect potential threats.

Antivirus Evasion

Techniques used by malware to bypass detection by traditional antivirus solutions.

DC_stationary_R2-08.png

© 2025 DeepCytes. All Rights Reserved.

Locate Us

​Express Towers, Marine Drive,Nariman Point, Mumbai - 400021

Legal

Follow Us

bottom of page