Flashcards · 91 cards
Glossary
Jargon-buster: 80+ terms. Click any card to flip it. Click again to flip back.
Glossary · Identity & access
MFA · Multi-Factor Authentication.
Click to flip →
Glossary · Identity & access
SSO · Single Sign-On.
Click to flip →
Glossary · Identity & access
IAM · Identity and Access Management.
Click to flip →
Glossary · Identity & access
RBAC · Role-Based Access Control.
Click to flip →
Glossary · Identity & access
Privileged access · Admin / superuser rights.
Click to flip →
Glossary · Identity & access
Conditional access · Login rules that depend on context.
Click to flip →
Glossary · Identity & access
OAuth · “Sign in with…” under the bonnet.
Click to flip →
Glossary · Identity & access
Federated identity · Your identity, used in someone else's system.
Click to flip →
Glossary · Identity & access
SCIM · Auto-sync of user accounts across SaaS tools.
Click to flip →
Glossary · Identity & access
Account takeover (ATO) · When an attacker controls a real user account.
Click to flip →
Glossary · Identity & access
Token / session theft · Stealing the “logged-in” cookie, not the password.
Click to flip →
Glossary · Threats & attacks
Ransomware · Malware that encrypts your files and demands a payment.
Click to flip →
Glossary · Threats & attacks
Phishing · Fraudulent emails or messages that trick people.
Click to flip →
Glossary · Threats & attacks
Spear phishing · Phishing targeted at a specific person.
Click to flip →
Glossary · Threats & attacks
Whaling · Spear phishing aimed at executives.
Click to flip →
Glossary · Threats & attacks
Smishing · Phishing via SMS / text message.
Click to flip →
Glossary · Threats & attacks
Vishing · Phishing via phone call.
Click to flip →
Glossary · Threats & attacks
Social engineering · Manipulating a person rather than a system.
Click to flip →
Glossary · Threats & attacks
BEC · Business Email Compromise.
Click to flip →
Glossary · Threats & attacks
Payroll diversion · Fraudster impersonates an employee asking to change bank details.
Click to flip →
Glossary · Threats & attacks
Zero-day · A flaw being exploited before there is a fix.
Click to flip →
Glossary · Threats & attacks
Supply-chain attack · Attacking you via one of your suppliers.
Click to flip →
Glossary · Threats & attacks
DDoS · Distributed Denial of Service.
Click to flip →
Glossary · Threats & attacks
Drive-by download · Malware that infects you by visiting a website.
Click to flip →
Glossary · Threats & attacks
Juice jacking · Compromised public USB charging points.
Click to flip →
Glossary · Threats & attacks
USB drop · An attacker leaves an infected USB stick somewhere staff will find it.
Click to flip →
Glossary · Threats & attacks
Malware · Malicious software — the umbrella term.
Click to flip →
Glossary · Threats & attacks
Info-stealer · Malware whose job is to harvest passwords, cookies, and tokens.
Click to flip →
Glossary · Backup & recovery
RTO · Recovery Time Objective.
Click to flip →
Glossary · Backup & recovery
RPO · Recovery Point Objective.
Click to flip →
Glossary · Backup & recovery
3-2-1 backup · Three copies, two media, one off-site.
Click to flip →
Glossary · Backup & recovery
Immutable backup · A backup that cannot be changed or deleted after writing.
Click to flip →
Glossary · Backup & recovery
Bare-metal restore · Rebuilding a server from scratch using backup.
Click to flip →
Glossary · Backup & recovery
DR / BCP · Disaster Recovery & Business Continuity Planning.
Click to flip →
Glossary · Operations
SLA · Service Level Agreement.
Click to flip →
Glossary · Operations
MSP · Managed Service Provider.
Click to flip →
Glossary · Operations
Endpoint · A laptop, desktop, phone, or server.
Click to flip →
Glossary · Operations
Patching · Applying security updates.
Click to flip →
Glossary · Operations
SIEM · Security Information and Event Management.
Click to flip →
Glossary · Operations
EDR · Endpoint Detection and Response.
Click to flip →
Glossary · Operations
API · Application Programming Interface.
Click to flip →
Glossary · Operations
Webhook · An automated notification one system sends another.
Click to flip →
Glossary · Operations
MDM · Mobile Device Management.
Click to flip →
Glossary · Operations
SSRF · Server-Side Request Forgery.
Click to flip →
Glossary · Operations
SBOM · Software Bill of Materials.
Click to flip →
Glossary · Operations
WAF · Web Application Firewall.
Click to flip →
Glossary · Email security
SPF · Sender Policy Framework.
Click to flip →
Glossary · Email security
DKIM · DomainKeys Identified Mail.
Click to flip →
Glossary · Email security
DMARC · Email authentication policy.
Click to flip →
Glossary · Email security
Email spoofing · Forging the “From” field of an email.
Click to flip →
Glossary · Email security
BIMI · Brand Indicators for Message Identification.
Click to flip →
Glossary · Data & compliance
GDPR · UK / EU data protection law.
Click to flip →
Glossary · Data & compliance
DPA 2018 · Data Protection Act 2018.
Click to flip →
Glossary · Data & compliance
Personal data · Information about an identifiable person.
Click to flip →
Glossary · Data & compliance
ICO · Information Commissioner's Office.
Click to flip →
Glossary · Data & compliance
DPIA · Data Protection Impact Assessment.
Click to flip →
Glossary · Data & compliance
DSAR / Subject Access Request · When someone asks for the data you hold on them.
Click to flip →
Glossary · Data & compliance
PECR · Privacy and Electronic Communications Regulations.
Click to flip →
Glossary · Data & compliance
NIS / NIS 2 · Network and Information Systems Regulations.
Click to flip →
Glossary · Data & compliance
Cyber Essentials · UK government-backed minimum cyber standard.
Click to flip →
Glossary · Data & compliance
ISO 27001 · International information-security management standard.
Click to flip →
Glossary · Data & compliance
IASME · Cyber-security certification body.
Click to flip →
Glossary · Data & compliance
CIS Controls · A prioritised list of cyber controls.
Click to flip →
Glossary · Data & compliance
OWASP · Open Web Application Security Project.
Click to flip →
Glossary · Data & compliance
ROPA · Record of Processing Activities.
Click to flip →
Glossary · Insurance
Cyber insurance · Insurance against cyber incidents.
Click to flip →
Glossary · Insurance
Deductible / Excess · What you pay before the policy pays.
Click to flip →
Glossary · Insurance
Sub-limit · A cap inside a cap.
Click to flip →
Glossary · Insurance
Retroactive date · How far back a policy will look.
Click to flip →
Glossary · Insurance
IR retainer · A pre-paid incident response engagement.
Click to flip →
Glossary · AI
LLM · Large Language Model.
Click to flip →
Glossary · AI
Hallucination · When an AI confidently invents an incorrect answer.
Click to flip →
Glossary · AI
Prompt injection · Hostile instructions hidden in data the AI reads.
Click to flip →
Glossary · AI
Training data · What the AI learned from.
Click to flip →
Glossary · AI
RAG · Retrieval-Augmented Generation.
Click to flip →
Glossary · AI
AI agent · An AI that can take actions, not just answer.
Click to flip →
Glossary · Cloud
SaaS · Software as a Service.
Click to flip →
Glossary · Cloud
IaaS · Infrastructure as a Service.
Click to flip →
Glossary · Cloud
PaaS · Platform as a Service.
Click to flip →
Glossary · Cloud
Shared responsibility model · What the cloud provider does vs what you do.
Click to flip →
Glossary · Cloud
Tenant · Your isolated slice of a shared cloud service.
Click to flip →
Glossary · Cloud
Data residency · Where your data physically lives.
Click to flip →
Glossary · Network & web
VPN · Virtual Private Network.
Click to flip →
Glossary · Network & web
Firewall · Network filter that allows or blocks traffic.
Click to flip →
Glossary · Network & web
DNS · The internet's address book.
Click to flip →
Glossary · Network & web
TLS / SSL certificate · The padlock in your browser.
Click to flip →
Glossary · Network & web
Network segmentation · Splitting one network into several.
Click to flip →
Glossary · Network & web
Zero trust · Don't trust anything by default.
Click to flip →
Glossary · Network & web
Rate limiting · Capping how often something can be tried.
Click to flip →
Glossary · Network & web
XSS · Cross-site scripting.
Click to flip →
Glossary · Network & web
CSRF · Cross-site request forgery.
Click to flip →