Skip to main content
Zondex
login
Browse Stats Pricing Blog Dorks How-To Docs
menu_book

Cybersecurity Glossary

Key terms and concepts in cybersecurity, networking, and internet scanning. Each term includes a detailed explanation and relevant Zondex search examples.

138
Terms
23
Letters
search
A B C D E F H I J K L M N O P R S T U V W X Z
A
9 terms
description

AES

The Advanced Encryption Standard, a symmetric-key algorithm adopted by the U.S. government, widely used globally for fast and secure data encryption with varying key lengths.

arrow_forward
description

API Security

API security focuses on protecting application programming interfaces from attacks, unauthorized access, and data breaches throughout their lifecycle.

arrow_forward
description

ARP

Address Resolution Protocol (ARP) is a communication protocol used to discover the MAC address associated with a given IP address on a local area network (LAN).

arrow_forward
lan

ASN

Autonomous System Number — a unique identifier assigned to a network or group of IP prefixes managed by one or more network operators.

arrow_forward
description

Active Reconnaissance

Directly interacting with a target system or network to gather information, involving techniques like port scanning, ping sweeps, and service enumeration, which may trigger alerts.

arrow_forward
description

Advanced Persistent Threat

An Advanced Persistent Threat (APT) is a sophisticated, long-term cyberattack campaign, often state-sponsored, that gains unauthorized access to a network and remains undetected for an extended period

arrow_forward
description

Attack Surface

The attack surface is the sum of all possible points where an unauthorized user can try to enter or extract data from a system, network, or organization.

arrow_forward
description

Attack Vector

An attack vector is the method or path that an attacker uses to gain unauthorized access to a system, network, or application to deliver a malicious payload or exploit a vulnerability.

arrow_forward
description

Authentication Bypass

A security vulnerability that allows an attacker to gain unauthorized access to a system or application by circumventing authentication mechanisms.

arrow_forward
B
9 terms
description

BGP

Border Gateway Protocol (BGP) is a path vector routing protocol that facilitates routing decisions on the Internet by exchanging routing and reachability information between autonomous systems (AS).

arrow_forward
description

Backdoor

A backdoor is a method, often secret, that bypasses normal security authentication to gain unauthorized remote access to a computer system or network.

arrow_forward
description

Banner

Textual information returned by a network service upon connection, often revealing the service type, software name, version, and operating system, useful for reconnaissance but a potential security ri

arrow_forward
terminal

Banner Grabbing

A technique to gather information about a network service by reading the banner or welcome message it sends upon connection.

arrow_forward
description

Blue Team

The Blue Team is a cybersecurity defense unit responsible for protecting an organization's assets by monitoring, detecting, and responding to cyber threats and vulnerabilities.

arrow_forward
description

Botnet

A botnet is a network of compromised computers (bots) controlled by a single attacker (bot-herder) to perform coordinated malicious tasks, often without the owners' knowledge.

arrow_forward
description

Brute Force

A brute force attack systematically tries every possible combination of characters until the correct password or encryption key is found, often targeting authentication systems.

arrow_forward
description

Buffer Overflow

A buffer overflow occurs when a program tries to write more data into a fixed-size memory buffer than it can hold, overwriting adjacent memory and potentially leading to crashes or code execution.

arrow_forward
description

Bug Bounty

A bug bounty program incentivizes ethical hackers to find and report vulnerabilities in an organization's systems or applications in exchange for recognition or monetary rewards.

arrow_forward
C
15 terms
description

C2 Server

A C2 (Command and Control) server is a central hub attackers use to remotely manage compromised systems, send commands, and exfiltrate data from victims.

arrow_forward
description

CDN

A Content Delivery Network (CDN) is a geographically distributed group of servers that work together to provide fast delivery of internet content.

arrow_forward
hub

CIDR

Classless Inter-Domain Routing — a method for allocating IP addresses and IP routing using variable-length subnet masking.

arrow_forward
description

CPE

Common Platform Enumeration is a standardized naming scheme for IT systems, software, and hardware, providing a uniform way to identify and classify technology assets.

arrow_forward
description

CSRF

Cross-Site Request Forgery (CSRF) is a vulnerability allowing an attacker to trick authenticated users into executing unwanted actions on a web application where they are currently logged in.

arrow_forward
bug_report

CVE

Common Vulnerabilities and Exposures — a standardized identifier for known security vulnerabilities in software and hardware.

arrow_forward
speed

CVSS

Common Vulnerability Scoring System — an open framework for communicating the severity of software vulnerabilities on a 0-10 scale.

arrow_forward
description

CWE

Common Weakness Enumeration is a community-developed list of software and hardware weakness types that can lead to security vulnerabilities, serving as a common language for discussing security flaws.

arrow_forward
description

Certificate Authority

A trusted entity that issues digital certificates, verifying the identity of websites and other entities to secure online communications.

arrow_forward
description

Certificate Transparency

An open framework designed to publicly log all SSL/TLS certificates issued by Certificate Authorities (CAs) to enhance security by making mis-issuances detectable.

arrow_forward
description

Cloud Security

Cloud security encompasses policies, technologies, and controls designed to protect data, applications, and infrastructure within cloud computing environments.

arrow_forward
description

CoAP

CoAP is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks in the Internet of Things, akin to a lightweight HTTP.

arrow_forward
description

Command Injection

Command injection is a vulnerability allowing an attacker to execute arbitrary commands on the host operating system via an insecure application input, often leading to full system compromise.

arrow_forward
description

Container Security

Container security involves protecting containerized applications throughout their lifecycle, from image creation and deployment to runtime execution.

arrow_forward
description

Credential Stuffing

Credential stuffing is an automated cyberattack where large sets of stolen username/password pairs from data breaches are used to attempt unauthorized logins on other unrelated services.

arrow_forward
D
9 terms
description

DDoS

A Distributed Denial of Service (DDoS) attack overwhelms a target system with a flood of internet traffic from multiple sources, making it unavailable to legitimate users.

arrow_forward
description

DHCP

Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on UDP/IP networks for automatically assigning IP addresses and other communication parameters to devices.

arrow_forward
description

DMZ

A DMZ is a subnetwork that exposes an organization's external-facing services to an untrusted network, typically the internet, while isolating them from the internal LAN.

arrow_forward
description

DNS

The Domain Name System translates human-readable domain names into numerical IP addresses, enabling browsers to locate and connect to websites and services.

arrow_forward
description

Digital Certificate

An electronic document used to cryptographically bind a public key to an entity, verifying identity and enabling secure communication over networks.

arrow_forward
description

Digital Forensics

Digital forensics is the process of acquiring, preserving, analyzing, and reporting on electronic data to reconstruct events and gather evidence for legal or security purposes.

arrow_forward
description

Directory Traversal

Directory Traversal, also known as path traversal, is a web vulnerability allowing attackers to read arbitrary files on a server by manipulating file paths, often using `../` sequences.

arrow_forward
description

Docker

A leading containerization platform that packages applications and their dependencies into lightweight, portable, and self-sufficient units called containers.

arrow_forward
description

Domain Name

A unique, human-readable name that identifies a website or service on the internet, mapping to one or more IP addresses via DNS.

arrow_forward
I
11 terms
description

ICMP

Internet Control Message Protocol (ICMP) is a network layer protocol used by network devices to send error messages and operational information, typically for diagnostic purposes like "ping" and "trac

arrow_forward
description

ICS

Industrial Control Systems (ICS) are categories of control systems used to manage industrial processes, often including SCADA and DCS.

arrow_forward
description

IDS

An IDS monitors network traffic and system activity for malicious activity or policy violations, alerting administrators without blocking the suspicious traffic.

arrow_forward
description

IP Address

A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

arrow_forward
description

IPS

An IPS actively monitors network traffic for malicious activity and automatically takes action to prevent or block detected threats in real-time.

arrow_forward
description

IPv4

The fourth version of the Internet Protocol, using 32-bit addresses in a dotted-decimal format to identify devices on a network.

arrow_forward
description

IPv6

The latest version of the Internet Protocol, utilizing 128-bit hexadecimal addresses to provide a vast number of unique addresses, solving IPv4's exhaustion problem.

arrow_forward
description

ISO 27001

ISO 27001 is an international standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS) within an organization.

arrow_forward
description

Incident Response

Incident response is a structured approach to managing the aftermath of a cybersecurity breach or attack, aiming to minimize damage and restore normal operations quickly.

arrow_forward
description

Indicators of Compromise

Measurable artifacts observed on a network or operating system that indicate a high probability of a computer intrusion or successful attack.

arrow_forward
description

Internet-Wide Scanning

The systematic process of probing a significant portion of the global internet's IP address space to discover active hosts, open ports, and running services, often for research or inventory.

arrow_forward
P
9 terms
description

Passive Reconnaissance

Gathering information about a target without directly interacting with it, often using publicly available sources to avoid detection and maintain stealth.

arrow_forward
description

Payload

In cybersecurity, a payload is the part of an exploit or malware that performs the malicious action, such as stealing data, installing backdoors, or executing commands.

arrow_forward
description

Penetration Testing

Penetration testing is an authorized simulated cyberattack against a computer system, network, or web application to identify exploitable vulnerabilities and security weaknesses.

arrow_forward
description

Phishing

Phishing is a cyberattack where malicious actors deceive individuals, often via email or fake websites, into revealing sensitive information or deploying malware.

arrow_forward
radar

Port Scanning

The process of sending requests to a range of port numbers on a host to identify open ports and available services.

arrow_forward
description

Privilege Escalation

Privilege escalation is the act of gaining higher-level access than initially authorized on a computer system, often transitioning from a standard user to an administrator or root user.

arrow_forward
description

Proxy

A proxy server acts as an intermediary for requests from clients seeking resources from other servers, offering privacy, security, and content filtering.

arrow_forward
description

Public Key Infrastructure

A set of roles, policies, and procedures required to create, manage, distribute, use, store, and revoke digital certificates, ensuring secure communication and identity verification.

arrow_forward
description

Purple Team

The Purple Team integrates Red Team (offense) and Blue Team (defense) methodologies to enhance an organization's overall cybersecurity posture through continuous collaboration and feedback.

arrow_forward
R
10 terms
description

RCE

Remote Code Execution (RCE) is a critical vulnerability allowing an attacker to execute arbitrary code on a target machine remotely, leading to full system compromise.

arrow_forward
description

RDP

RDP is a proprietary protocol developed by Microsoft, allowing users to connect to and control a remote computer or virtual desktop over a network connection, providing a graphical interface.

arrow_forward
description

RSA

A widely used public-key cryptosystem for secure data transmission, based on the difficulty of factoring large numbers, enabling both encryption and digital signatures.

arrow_forward
description

Ransomware

Ransomware is a type of malicious software that encrypts a victim's files, demanding a payment, typically in cryptocurrency, to restore access to the data, often with a time limit.

arrow_forward
description

Reconnaissance

Reconnaissance is the initial phase of cybersecurity assessment or attack, involving the systematic gathering of information about a target system, network, or organization.

arrow_forward
description

Red Team

A Red Team simulates sophisticated adversaries to test an organization's security defenses, personnel, and processes in a realistic, unannounced attack scenario.

arrow_forward
description

Redis

An open-source, in-memory data structure store primarily used as a database, cache, and message broker, known for its high performance.

arrow_forward
description

Responsible Disclosure

Responsible disclosure is a cybersecurity practice where a security researcher privately reports a vulnerability to the affected organization before public disclosure, allowing time for a fix.

arrow_forward
description

Reverse Proxy

A reverse proxy server sits in front of web servers and forwards client requests to them, providing load balancing, security, and caching benefits.

arrow_forward
description

Rootkit

A rootkit is a stealthy collection of software tools designed to conceal the presence of other malware or malicious activity on a computer system.

arrow_forward
S
15 terms
description

SCADA

Supervisory Control and Data Acquisition (SCADA) systems monitor and control industrial processes across vast geographical areas from a central location.

arrow_forward
description

SIEM

Security Information and Event Management (SIEM) is a security solution that centralizes and analyzes log and event data from various sources to detect, analyze, and respond to security threats.

arrow_forward
description

SMB

SMB is a network file sharing protocol primarily used by Microsoft Windows, enabling applications to read/write files and request services from server programs on a network.

arrow_forward
description

SMTP

SMTP (Simple Mail Transfer Protocol) is the standard protocol for sending and receiving email messages between servers, playing a crucial role in the internet's email delivery system.

arrow_forward
description

SNMP

SNMP (Simple Network Management Protocol) is an application-layer protocol for managing and monitoring network devices, allowing administrators to collect data, identify issues, and configure hardware

arrow_forward
description

SOAR

SOAR platforms integrate security tools and automate incident response workflows, enabling organizations to efficiently manage and respond to security threats and vulnerabilities.

arrow_forward
description

SOC

A Security Operations Center (SOC) is a centralized function within an organization responsible for continuously monitoring and improving an organization's security posture, preventing, detecting, and

arrow_forward
description

SQL Injection

A SQL Injection (SQLi) is a web security vulnerability allowing attackers to interfere with an application's database queries, potentially leading to unauthorized data access or manipulation.

arrow_forward
description

SSH

SSH (Secure Shell) is a cryptographic network protocol for operating network services securely over an unsecured network, most commonly used for remote command-line login and secure file transfer.

arrow_forward
description

SSL

SSL (Secure Sockets Layer) is a deprecated cryptographic protocol that provided secure communication over a computer network; it has been largely superseded by TLS for enhanced security.

arrow_forward
description

SSRF

Server-Side Request Forgery (SSRF) is a vulnerability where an attacker can induce a server-side application to make HTTP requests to an arbitrary domain of the attacker's choosing, often targeting in

arrow_forward
description

SYN Scan

A port scanning technique that sends a SYN packet to a target port and analyzes the response (SYN-ACK for open, RST for closed) without completing the TCP handshake, making it stealthier than a full c

arrow_forward
description

Service Enumeration

Service enumeration is the process of identifying and mapping all active services, their associated open ports, and often their versions on a target system or network.

arrow_forward
description

Shellcode

Shellcode is a small piece of low-level code, typically written in assembly, used as a payload to initiate a command shell on a compromised system.

arrow_forward
description

Subnet

A subnet (subnetwork) is a logical subdivision of an IP network, allowing an organization to segment a single large network into smaller, more manageable parts.

arrow_forward
T
8 terms
description

TCP

Transmission Control Protocol (TCP) is a core protocol of the internet protocol suite, providing reliable, ordered, and error-checked delivery of a stream of octets between applications.

arrow_forward
lock

TLS

Transport Layer Security — a cryptographic protocol that provides secure communication over a computer network.

arrow_forward
description

TLS Handshake

The TLS handshake is the foundational process establishing a secure, encrypted communication channel between a client (like a web browser) and a server, verifying identities and agreeing on encryption

arrow_forward
description

Telnet

Telnet is an application layer protocol used on the internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.

arrow_forward
description

Threat Hunting

Threat hunting is a proactive cybersecurity activity focused on iteratively searching through networks and systems to detect and isolate advanced threats that have evaded existing security solutions.

arrow_forward
description

Threat Intelligence

Threat Intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications, and actionable advice about an existing or emerging threat to assets.

arrow_forward
description

Threat Modeling

Threat modeling is a structured process used to identify, evaluate, and mitigate potential security threats and vulnerabilities in a system, application, or process.

arrow_forward
description

Trojan

A Trojan horse, or Trojan, is a type of malicious software disguised as legitimate software, designed to gain unauthorized access to a computer system.

arrow_forward
school

Learn by Doing

See these concepts in action. Search the internet's attack surface with Zondex's powerful dork syntax.

support_agent
Zondex Support
Usually replies within minutes
Hi there!
Send us a message and we'll reply as soon as possible.