Dictionary of Technical Terms

This is a dictionary of terms I put together for IBM while serving as a Technical Product Marketing Manager. It uses industry-standard terminology, and there are no company secrets or proprietary terms. Feel free to use it in any way you need. I also included links to the reference pages on everything I could.

A

  
accessThe ability to read, update, or otherwise use a resource. Access to protected resources is usually controlled by system software.IBM
Access ControlThe process of granting or denying specific requests: 1) for obtaining and using information and related information processing services; and 2) to enter specific physical facilities (e.g., federal buildings, military establishments, and border crossing entrances).NIST
Access Control List (ACL)A list of permissions associated with an object (e.g., computer hardware or software or a gate that provides ingress and egress to a physical facility). The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object.CNSS
Account ManagementManages the current account and any associated accounts. Displays account informtion such as Name, Description of the Account, Type, Acct. ID, Identity Providers and whether or not Data Source Analytics are enabled. The page also allows you to edit account settings, manage users and see details on creation and modification of the information. 
administratorA person responsible for administrative tasks such as access authorization and content management. Administrators can also grant levels of authority to users.IBM
Advanced Persistent Threat (APT)An adversary that possesses sophisticated levels of expertise and significant resources used to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception). These objectives typically include establishing and extending footholds within the information technology infrastructure of the targeted organizations for purposes of exfiltrating information, undermining or impeding critical aspects of a mission, program, or organization; or positioning itself to carry out these objectives in the future. The advanced persistent threat: (1) pursues its objectives repeatedly over an extended period of time; (2) adapts to defenders’ efforts to resist it; and (3) is determined to maintain the level of interaction needed to execute its objectives.NIST
After-Action Report (AAR)Summary of key post-exercise evaluation information, including the exercise overview and analysis of objectives and core capabilities. It is developed in conjunction with an improvement plan, which identifies specific corrective actions, assigns them to responsible parties, and establishes target dates for their completion. The lead evaluator and exercise planning team draft the AAR.FEMA
agentAny hardware component that is managed by the relative management system. Hardware components include appliances, scanners, network sensors, server sensors, and desktop sensors.IBM
alertA message or other indication that signals an event or an impending event that meets a set of specified criteria. See also rule.IBM
All-HazardsA threat or an incident, natural or manmade, that warrants action to protect life, property, the environment, and public health or safety, and to minimize disruptions of government, social, or economic activities. It includes natural disasters, cyber incidents, industrial accidents, pandemics, acts of terrorism, sabotage, and destructive criminal activity targeting critical infrastructure.Presidential Policy Directive / PPD-21
Antimalware (AM)Antimalware is a type of software program created to protect information technology (IT) systems and individual computers from malicious software, or malware. Antimalware programs scan a computer system to prevent, detect and remove malware. The key to antimalware are the known malware definitrions  which the antimalware software uses to detect known malicious software. 
AntiVirus (AV)An antivirus product is a program designed to detect and remove viruses and other kinds of malicious software from your computer or laptop. Malicious software – known as malware – is code that can harm your computers and laptops, and the data on them. The key feature to antivirus are the known virus definitions which the software uses to identify known viruses and malware. 
API KeysYou can use API keys to authenticate programmatic requests to IBM Cloud Pak for Security services. To keep your key secure, delete it and create a new API key every 90 days. Learn how to authenticate requests using your API keys. The API key is a two part string, consisting of a unique identifier and a secret token, which is used for authentication to the API endpoint. The Unique Identifier is comparable to a user ID and has a set of access rights specific to an identity associated with it. The secret token, comparable to a password, is a code that is used together with the Unique Identifier to verify the identity of the calling process to the API. 
applianceA hardware device with integrated software that is dedicated to a specific task or set of business requirements.IBM
attackAny attempt by an unauthorized person to compromise the operation of a software program or networked system.IBM
AttestationThe validation of all aspects of a computer or system that relate to its safe, secure, and correct operation.NRECA / Cooperative Research Network
AuthenticationVerifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources.NIST
AuthorizationVerifying a user’s permissions (after a user has been authenticated) for accessing certain resources or functionality.NRECA / Cooperative Research Network
AvailabilityEnsuring timely and reliable access to and use of information. Resiliency objectives extend the concept to refer to point-in-time availability (i.e., the system, component, or device is usable when needed) and the continuity of availability (i.e., the system, component, or device remains usable for the duration of the time it is needed).NIST
AvailabilityWith confidentiality and integrity, availability is considered part of the CIA Triad, which represents the three most crucial components of information security. 

B

  
BandwidthThe amount of information that can be passed through a communication channel in a given amount of time, usually expressed in bits per second.ATIS
BitcoinAn electronic payment system based on cryptographic proof instead of trust, allowing any two willing parties to transact directly with each other without the need for a trusted third party.Bitcoin.org
Black Sky Hazard/EventA catastrophic event that severely disrupts the normal functioning of critical infrastructures in multiple regions for long durations.EIS Council
Black StartThe restoration of a power station without reliance on the external power transmission system. Black start capabilities are often provided by small co-located diesel generators used to start larger generators, which in turn start the main power station generators.Idaho National Laboratory
BlacklistA list of entities that are blocked or denied privileges or access.US-CERT
BlockchainTamper-resistant digital ledgers implemented in a distributed fashion (i.e., without a central repository) and usually without a central authority (i.e., a bank, company, or government). At their basic level, they enable a community of users to record transactions in a shared ledger within that community, such that under normal operation, no transaction can be changed once published.NIST
BotnetA collection of computers compromised by malicious code and controlled across a network. (See Command and Control.)US-CERT
BotnetThe word botnet is a combination of the words robot and network. 
Boundary ProtectionMonitoring and control of digital communications at the external perimeter of an information system to prevent and detect malicious and other unauthorized communications, using devices such as proxies, gateways, routers, firewalls, guards, and encrypted tunnels. Also referred to as perimeter protection.NRECA / Cooperative Research Network
Bulk Electric System (BES) Cyber AssetA Cyber Asset that, if rendered unavailable, degraded, or misused, would, within 15 minutes of its required operation, misoperation, or non-operation, adversely impact one or more facilities, systems, or equipment, which, if destroyed, degraded, or otherwise rendered unavailable when needed, would affect the reliable operation of the Bulk Electric System. Redundancy of affected facilities, systems, and equipment shall not be considered when determining adverse impact. Each BES Cyber Asset is included in one or more BES Cyber Systems.NERC

C

  
Case ManagementThis is the page that contains all of the cases that are open for forensic investigations into alerts occuring within the given environment. 
Case ManagementCase Management is the collection of cases in a single app for collaboration and management.QRadar
CasesQradar employs an app within the platform named cases. This app operates under the Case Management tab.QRadar
certificateIn computer security, a digital document that binds a public key to the identity of the certificate owner, thereby enabling the certificate owner to be authenticated. A certificate is issued by a certificate authority and is digitally signed by that authority.IBM
Cloud SecurityCloud security is a collection of procedures and technology designed to address external and internal threats to business security. Organizations need cloud security as they move toward their digital transformation strategy and incorporate cloud-based tools and services as part of their infrastructure. 
Cloud Security Posture Management (CPSM)Cloud security posture management (CSPM) automates the identification and remediation of risks across cloud infrastructures, including Infrastructure as a Service (IaaS), Software as a Service (Saas), and Platform as a Service (PaaS). 
Cloud-Native Application Protection Platform (CNAPP)Cloud-Native Application Protection Platform (CNAPP) is a cloud-native security model that encompasses Cloud Security Posture Management (CSPM), Cloud Service Network Security (CSNS), and Cloud Workload Protection Platform (CWPP) in a single holistic platform. 
Command and ControlA network of computers infected with malware that allows them to issue directives to other digital devices. C&C servers can create powerful networks of infected devices capable of carrying out distributed denial-of-service (DDoS) attacks, stealing data, deleting data or encrypting data in order to carry out an extortion scheme.TechTarget
communityIn SNMP, the relationship between an agent and one or more managers. The community describes which SNMP manager requests the SNMP agent should honor.IBM
Compensating ControlA cybersecurity control employed in lieu of a recommended control that provides equivalent or comparable control.DOE
Compensating ControlSee Cybersecurity Controls. 
ConfidentialityPreserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.NIST
ConfidentialityWith integrity and availability, confidentiality is considered part of the CIA Triad, which represents the three most crucial components of information security. 
ConnectionsAre all the ports and protocols that enable QRadar ingest logs, interface with data collectors, data sources, edge gateways, threat intelligence sources and Qradar Proxy. Connections be uni-directional or bi-directional depending on the purpose and capabilities of the hardware/software terminating the connection. 
ConnectivityThe minimum number of nodes or links whose removal results in losing all paths that can be used to transfer information from a source to a sink.ATIS
Container SegmentationContainer segmentation involves isolating containers from each other and the host system to improve security and reduce the attack surface. Containerization is a widely used technology that allows multiple applications or services to run in separate containers on a single host system. Without proper segmentation, though, containers can potentially access each other’s data and configuration files, which can result in security vulnerabilities.PANW
Container Segmentation Best PracticesContainer isolation: Each container should be isolated from other containers running on the same host system to prevent unauthorized access. This can be achieved using container technologies like Docker and Kubernetes, which provide built-in isolation mechanisms.PANW
Container Segmentation Best PracticesNetwork segmentation: Containers can be segmented from each other using network segmentation techniques. This involves creating separate networks for each container and configuring firewall rules to allow or deny traffic between containers.PANW
Container Segmentation Best PracticesRole-based access control: Role-based access control (RBAC) can be used to define access policies for different containers based on user roles and permissions. This can help to ensure that containers are accessed only by authorized users and processes.PANW
Container Segmentation Best PracticesImage signing: Container images can be digitally signed to ensure that only trusted images are deployed in production. This can help to prevent container images from being tampered with or altered, reducing the risk of security vulnerabilities.PANW
Container Segmentation Best PracticesRuntime protection: Runtime protection tools can be used to monitor container activity and detect anomalies that may indicate a security breach. These tools can help to detect and prevent attacks in real-time, improving the security posture of containerized environments.PANW
Container Segmentation Best PracticesContainer segmentation helps to ensure the security of containerized applications and services. By isolating containers and applying access control policies, organizations can reduce the attack surface and prevent unauthorized access to sensitive data and resources. Container segmentation should be implemented as part of an overall security strategy that includes network security, access control, and runtime protection.PANW
containerizationContainerization is a software deployment process that bundles an application’s code with all the files and libraries it needs to run on any infrastructure. Traditionally, to run any application on your computer, you had to install the version that matched your machine’s operating system. For example, you needed to install the Windows version of a software package on a Windows machine. However, with containerization, you can create a single software package, or container, that runs on all types of devices and operating systems. 
ContingencyThe unexpected failure or outage of a system component, such as a generator, transmission line, circuit breaker, switch, or other electrical element.NRECA / Cooperative Research Network
Correlation RulesA correlation rule helps a SIEM solution in identifying which sequences of events would be an indication of anomalies to detect a security incident. 
CredentialInformation passed from one entity to another to establish the sender’s access rights or to establish the claimed identity of a security subjective relative to a given security domain.ATIS
Critical AssetsFacilities, systems, and equipment which, if destroyed, degraded, or otherwise rendered unavailable, would affect the reliability or operability of the bulk electric system.NRECA / Cooperative Research Network
Critical Electric Infrastructure Information (CEII)Information related to or proposed to critical electric infrastructure.FERC
Critical Electric Infrastructure Information (CEII)Generated by or provided to the Federal Energy Regulatory Commission or other Federal agency other than classified national security information, 
Critical Electric Infrastructure Information (CEII)That is designated as critical electric infrastructure information by the Federal Energy Regulatory Commission or the Secretary of the Department of Energy pursuant to section 215A(d) of the Federal Power Act. 
Critical InfrastructureThe assets, systems, and networks, whether physical or virtual, so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, public health or safety, or any combination thereof.DHS
CryptocurrencyA digital currency used as a medium of exchange, similar to other currencies. However, unlike other currencies, cryptocurrency operates independently of a central bank and uses encryption techniques and blockchain technology to secure and verify transactions.US-CERT
CryptocurrencyExamples include Bitcoin, Litecoin, Monero, Ethereum, and Ripple. 
Cyber AssetProgrammable electronic devices, including the hardware, software, and data in those devices.NRECA / Cooperative Research Network
Cyber AttackAn attempt to infiltrate information technology systems, computer networks, or individual computers with a malicious intent to steal information, cause damage, or destroy specific targets within the system.Idaho National Laboratory
Cyber Information Sharing and Collaboration Program (CISCP)A program of the U.S Department of Homeland Security that enables actionable, relevant, and timely unclassified information exchange through trusted public-private partnerships across all critical infrastructure sectors.DHS
Cyber Kill ChainA theory developed by Lockheed Martin that identifies the various stages of a cyber attack: Reconnaissance, Weaponization, Delivery, Exploitation, Installation, C&C, and Actions on Objectives. Applying the theory helps cybersecurity professionals recognize and counteract attacks to protect their organization’s assets.SANS Institute
Cyber Mutual Assistance ProgramA framework to provide emergency cyber assistance within the electric power and natural gas industries. The program is composed of industry cyber experts who can provide voluntary assistance to other participating entities in advance of, or in the event of, a disruption of electric or natural gas service, systems, and/or IT infrastructure due to a cyber emergency.Electricity Sector Coordinating Council
Cyber Security Incident Response Teams (CSIRTs)A group of experts that assesses, documents, and responds to a cyber incident so that a network can not only recover quickly, but also avoid future incidents.DHS
CybersecurityThe ability to protect or defend the use of cyberspace from cyber attacks.DOE
CybersecurityCybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems. 
CybersecurityThe 3 major types of cyber security are network security, cloud security, and physical security. Your operating systems and network architecture make up your network security. It can include network protocols, firewalls, wireless access points, hosts, and servers. 
Cybersecurity Capability Maturity Model (C2M2)A model that helps organizations—regardless of size, type, or industry—evaluate, prioritize, and improve their own cybersecurity capabilities.DOE
Cybersecurity ControlsThe management, operational, and technical methods, policies, and procedures—manual or automated—(i.e., safeguards or countermeasures) prescribed to protect the confidentiality, integrity, and availability of a system and its information.DOE
Cybersecurity IncidentAn event occurring on or conducted through a computer network that actually or imminently jeopardizes the integrity, confidentiality, or availability of computers, information or communications systems or networks, physical or virtual infrastructure controlled by computers or information systems, or information resident thereon. A cyber incident may include a vulnerability in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source.Presidential Policy Directive / PPD-41
Cybersecurity Risk Information Sharing Program (CRISP)A public-private data sharing and analysis platform that facilitates the timely bi-directional sharing of unclassified and classified threat information among energy sector stakeholders.DOE
CybersecurityThreat Intelligence (CTI)Threat intelligence is data that is collected, processed, and analyzed to understand a threat actor’s motives, targets, and attack behaviors. Threat intelligence enables us to make faster, more informed, data-backed security decisions and change their behavior from reactive to proactive in the fight against threat actors. Threat intelligence is evidence-based knowledge (e.g., context, mechanisms, indicators, implications and action-oriented advice) about existing or emerging menaces or hazards to assets. – Gartner 
CyberspaceA global domain within the information environment consisting of the interdependent network of IT and ICS infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.DOE

D

  
DarknetsPrivate, distributed file sharing networks where connections are made only between trusted peers. Darknets are distinct from other distributed networks as sharing is anonymous (i.e., IP addresses are hidden).Cyber Risk Insurance Forum
dashboardAn interface that integrates data from a variety of sources and provides a unified display of relevant and in-context information.IBM
DashboardsDashboards in QRadar are a part of the platform that provides near real-time visibility into the collected and correlated data. It allows security teams to monitor and analyze key data metrics and KPIs, providing the information necessary for data-driven decision-making regarding mitigation and remediation of incidents. 
   
   
Data Source AnalyticsTracking anonymous analytics helps improve the product and user experience. IBM is committed to protecting your personal information in compliance with applicable data protection laws.QRadar
decryptTo decipher data.IBM
Defense-in-DepthCybersecurity strategy that integrates people, technology, and operations capabilities to establish variable barriers across multiple layers and missions of the organization.DOE
Denial of Service (DoS)A cyber attack that occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor. A denial-of-service floods the targeted host or network with traffic until the target cannot respond or simply crashes, preventing access for legitimate users. DoS attacks can cost an organization both time and money while their resources and services are inaccessible.DHS
destinationAny point or location, such as a program, node, station, printer, or a particular terminal, to which information is to be sent.IBM
   
Distributed control system (DCS)Control achieved by intelligence that is distributed about the process to be controlled, rather than by a centrally located single unit.NIST
domain name server (DNS)An Internet service that translates domain names into IP addresses.IBM

E

  
Edge GatewaysEdge gateways are devices that reside on a networks perimeter and translate information from the internet into a private network and viceversa. The devices can be any number of device types such as firewalls, routers, switches, SDWan devices and more. 
Electronic Security Perimeter (ESP)The logical border surrounding a network to which systems are connected.NERC
EncryptionCryptographic transformation of data (called “plaintext”) into a form (called “ciphertext”) that conceals the data’s original meaning to prevent it from being known or used. If the transformation is reversible, the corresponding reversal process is called “decryption,” which is a transformation that restores encrypted data to its original state.Idaho National Laboratory
End Point Detection and Response (EDR) is an endpoint security solution that continuously monitors end-user devices to detect and respond to cyber threats like ransomware and malware. EDR incorporates AV and other endpoint security functionality providing more fully-featured protection against a wide range of potential threats. 
Endpoint Protection/SecurityA security approach that focuses on locking down endpoints—individual computers, phones, tablets, and other network-enabled devices—in order to keep networks safe.CSO Online
Energy AssuranceAn array of activities that support a robust, secure, reliable, and resilient energy infrastructure. These include energy emergency planning, preparedness, mitigation, and responseNASEO
eventAn occurrence of significance to a task or system. Events can include completion or failure of an operation, a user action, or the change in state of a process. See also alert.IBM
ExploitA piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic.Idaho National Laboratory
Extended Detection and Response (XDR)Is a consolidation of tools and data that provides extended visibility, analysis, and response across endpoints, workloads, users, and networks. XDR unifies endpoint and workload security capabilities with critical visibility into the network and cloud—reducing blind spots, detecting threats faster, and automating remediation via authoritative context across these domains. 

F

  
Federated Searchwith Qradar’s Federated Search feature contained within the Log 
filterA device or program that separates data, signals, or material in accordance with specified criteria.IBM
FirewallA network security device that monitors incoming and outgoing network traffic and helps screen out hackers, viruses, and worms that try to reach a computer over the Internet. A firewall can be hardware, software, or both.Cisco
firewallA network configuration, typically both hardware and software, that prevents unauthorized traffic into and out of a secure network.IBM
firewall ruleA chain of statements matching specific criteria that define the types of traffic to block on a network.IBM
FirmwareA software program or set of instructions programmed on a hardware device. It provides the necessary instructions for how the device communicates with the other computer hardware.TechTerms
firmwareProprietary code that is usually delivered as microcode as part of an operating system.IBM
fix packA cumulative collection of fixes that is released between scheduled refresh packs, manufacturing refreshes, or releases. A fix pack updates the system to a specific maintenance level.IBM
Fusion CentersPrimary focal points within the state and local environment for the receipt, analysis, gathering, and sharing of threat-related information among Federal, State, Local, Tribal, and Territorial (SLTT) partners. They provide interdisciplinary expertise and situational awareness to inform decision-making at all levels of government.DHS
Fusion CentersFusion centers are owned and operated by State and Local entities with support from federal partners. 

G

  
GatewayAn intermediate system (interface, relay) that attaches to two (or more) computer networks that have similar functions but dissimilar implementations and that enables either one-way or two-way communication between the networks.CNSS
gatewayA device or program used to connect networks or systems with different network architectures.IBM
Granular securityGranular security means network administrators can strengthen and pinpoint security by creating specific policies for critical applications. The goal is to prevent lateral movement of threats with policies that precisely control traffic in and out of specific workloads, such as weekly payroll runs or updates to human resource databases. 

H

  
Homeland Security Information Network (HSIN)A trusted network for homeland security mission operations to share sensitive but unclassified information. Federal, state, local, territorial, tribal, international and private sector homeland security partners use HSIN to manage operations, analyze data, send alerts and notices, and share the information they need to do their jobs and help keep their communities safe.DHS
HoneypotA trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers.Cyber Risk Insurance Forum
Human-Machine Interface (HMI)The hardware or software through which an operator interacts with a controller. An HMI can range from a physical control panel with buttons and indicator lights to an industrial PC with a color graphics display running dedicated HMI software.NIST

I

  
IBM Cloud Pak for SecurityIBM Cloud Pak® for Security is an open security platform that connects to your existing data sources to generate deeper insights and enable you to act faster with automation. 
ICMPSee Internet Control Message Protocol.IBM
Identity-Based Access ControlAccess control based on the identity of the user (typically relayed as a characteristic of the process acting on behalf of that user), where access authorizations to specific objects are assigned based on user identity.NRECA / Cooperative Research Network
ImpactDamage to an organization’s mission and goals due to the loss of confidentiality, integrity, or availability of system information or operations.NRECA / Cooperative Research Network
Indicators of Compromise (IOC)Forensic artifacts of an intrusion.SANS Institute
Industrial Control Cyber Emergency Response Team (ICS-CERT)Operates within the Department of Homeland Security’s (DHS) National Cybersecurity and Communications Integration Center (NCCIC) to reduce risks to industrial control systems used within and across all critical infrastructure sectors. ISC-CERT collaborates law enforcement agencies and the intelligence community and coordinates efforts among Federal, State, local, and tribal governments and control systems owners, operators, and vendors. Additionally, ICS-CERT collaborates with international and private sector Computer Emergency Response Teams (CERTs) to share control systems-related security incidents and mitigation measures.DHS
Industrial Control System (ICS)A general term that includes several types of control systems, including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), Programmable Logic Controllers (PLC) and others often found in industrial and critical infrastructure sectors. An ICS consists of combinations of control components that act together to achieve an industrial objective.Idaho National Laboratory
Information SecurityThe protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction to provide confidentiality, integrity, and availability.NRECA / Cooperative Research Network
Information Sharing and Analysis Center (ISAC)Sector-specific, member-driven organizations formed by critical infrastructure owners and operators to share information between government and industry.DHS
Information System (IS)A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. (Note: information systems also include specialized systems such as industrial/process controls systems, telephone switching and private branch exchange (PBX) systems, and environmental control systems.)NRECA / Cooperative Research Network
Information Technology (IT)The technology involving the development, maintenance, and use of computer systems, software, and networks for the processing and distribution of data.Merriam Webster Dictionary
InfraGardA partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical Infrastructure.Infragard
   
IntegrityGuarding against improper information modification or destruction; includes ensuring the non-repudiation and authenticity of information.NRECA / Cooperative Research Network
IntegrityWith confidentiality and availability, integrity is considered part of the CIA Triad, which represents the three most crucial components of information security. 
Intelligent electronic device (IED)Any device incorporating one or more processors with the capability to receive or send data/control from or to an external source (e.g., electronic multifunction meters, digital relays, controllers).NIST
interfaceA shared boundary between independent systems. An interface can be a hardware component used to link two devices, a convention that supports communication between software systems, or a method for a user to communicate with the operating system, such as a keyboard.IBM
International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) StandardsStandards that represent global consensus on a solution to a particular issue. They provide requirements, specifications, guidelines or characteristics to ensure that materials, products, processes and services are safe to use and fit for their purpose. Whenever possible, requirements are expressed in terms of performance rather than design or descriptive characteristics.ISO
Internet Control Message Protocol (ICMP)An Internet protocol that is used by a gateway to communicate with a source host, for example, to report an error in a datagram.IBM
Internet Protocol (IP)Standard method for transmission of data from source to destinations in packet-switched communications networks and interconnected systems of such networks.NIST
InteroperabilityThe ability of systems, units, or forces to provide services to and accept services from other systems, units, or forces, and to use the services so exchanged to enable them to operate effectively together.Rand Corporation
intrusion preventionA set of policies and rules for detecting suspicious behavior in network traffic and for alerting system or network administrators.IBM
intrusion prevention system (IPS)A system that attempts to deny potentially malicious activity. The denial mechanisms could involve filtering, tracking, or setting rate limits.IBM
IP Address Management (IPAM)IPAM (IP Address Management) is the administration of DNS and DHCP, which are the network services that assign and resolve IP addresses to machines in a TCP/IP network. Simply put, IPAM is a means of planning, tracking, and managing the Internet Protocol address space used in a network. 
IPSSee intrusion prevention system.IBM

J

  
Joint Information Center (JIC)A central location to facilitate operation of the Joint Information System (JIS) during and after an incident. The JIC enhances information coordination, reduces misinformation, and maximizes resources by co-locating Public Information Officers (PIOs) as much as possible.FEMA
Joint Information System (JIS)An incident response structure that can be leveraged for developing and delivering coordinated interagency messages, executing public information plans and strategies, advising an Incident Commander concerning public affairs issues, and controlling rumors and inaccurate information.FEMA

K

  
Key LoggerA program designed to record the sequence of keys pressed on a computer keyboard. Such programs can be used to obtain passwords or encryption keys and thus bypass other security measures.NIST
KubernetesKubernetes is a portable, extensible, open source platform for managing containerized workloads and services, that facilitates both declarative configuration and automation. It has a large, rapidly growing ecosystem. Kubernetes services, support, and tools are widely available. 

L

  
Least PrivilegeThe principle that users and programs should only have the necessary privileges to complete their tasks.NIST
local management interfaceA graphical user interface that is used to manage a single, local appliance.IBM

M

  
MalwareSoftware or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. Examples include viruses, worms, and Trojan horses, spyware and some forms of adware.NIST
Man-In-The-Middle (MitM)A type of cyber attack where an interloper inserts him- or herself between two communicating devices, without either side knowing.US-CERT
Managed Detection and Response (MDR)MDR is a comprehensive solution that offers 24/7 monitoring and response services from experienced security analysts. 
Management ControlsThe security controls for IT and ICS that focus on the management of risk and security.DOE
MicrosegmentationMicrosegmentation refers to an approach to security that involves dividing a network into segments and applying security controls to each segment based on the segment’s requirements. Microsegmentation software with network virtualization technology is used to create zones in cloud deployments. These granular secure zones isolate workloads, securing them individually with custom, workload-specific policies. Similarly, each virtual machine (VM) in a network can be protected, down to the application level, with exact security controls. The granular security controls microsegmentation brings to workloads or applications is invaluable for the modern cloud environment with several applications running on the same server or virtual machine. Organizations can apply security controls to individual workloads and applications, rather than having a one security policy for the server. 
MicrosegmentationMicrosegmentation offers protection for dynamic environments. For instance, cloud-native architectures like containers and Kubernetes can spin up and down in a matter of seconds. The IP addresses assigned to cloud workloads are ephemeral, rendering IP-based rule management impossible. With microsegmentation, security policies are expressed in terms of identities or attributes (env=prod, app=hrm, etc.) rather than network constructs (e.g., 10.100.0.10 tcp/80). Changes to the application or infrastructure trigger automatic revisions to security policies in real time, requiring no human intervention. 
Microsegmentation: BenefitsOrganizations that adopt microsegmentation realize tangible benefits. More specifically: 
Microsegmentation: BenefitsReduced attack surface: Microsegmentation provides visibility into the complete network environment without slowing development or innovation. Application developers can integrate security policy definition early in the development cycle and ensure that neither application deployments nor updates create new attack vectors. This is particularly important in the fast-moving world of DevOps. 
Microsegmentation: BenefitsImproved breach containment: Microsegmentation gives security teams the ability to monitor network traffic against predefined policies as well as shorten the time to respond to and remediate data breaches. 
Microsegmentation: BenefitsStronger regulatory compliance: Using microsegmentation, regulatory officers can create policies that isolate systems subject to regulations from the rest of the infrastructure. Granular control of communications with regulated systems reduces the risk of noncompliant usage. 
Microsegmentation: BenefitsSimplified policy management: Moving to a microsegmented network or Zero Trust security model provides an opportunity to simplify policy management. Some microsegmentation solutions offer automated application discovery and policy suggestions based on learned application behavior. 
MicroservicesIn software engineering, a microservice architecture is a variant of the service-oriented architecture structural style. It is an architectural pattern that arranges an application as a collection of loosely coupled, fine-grained services, communicating through lightweight protocols. 
MITRE ATT&CK

MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.

With the creation of ATT&CK, MITRE is fulfilling its mission to solve problems for a safer world — by bringing communities together to develop more effective cybersecurity. ATT&CK is open and available to any person or organization for use at no charge.

MITRE ATT&CK
multicastTransmission of the same data to a selected group of destinations.IBM

N

  
National Cybersecurity and Communications Integration Center (NCCIC)The cyber defense, incident response, and operational integration center of the U.S. Department of Homeland Security. The NCCIC’s mission is to reduce the risk of systemic cybersecurity and communications challenges by serving as a national hub for cyber and communications information, technical expertise, and operational integration, and by operating a 24/7 situational awareness, analysis, and incident response center.DHS
National Institutes of Standards and Technology (NIST)A federal agency within the U.S. Department of Commerce. NIST’s mission is to develop and promote measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life. NIST is also responsible for establishing computer- and information technology-related standards and guidelines for federal agencies to use.NIST
Need to KnowDecision made by an authorized holder of official information that a prospective recipient requires access to specific official information to carry out official duties.NIST
NERC Critical Infrastructure Protection (NERC CIP)A set of requirements designed to secure cyber assets required for operating North America’s bulk electric system.TechTarget
Network (computer network)A network of data processing nodes interconnected for the purpose of data communication.ATIS
Network Detection and Response (NDR)Network Detection and response (NDR) is a security tool that monitors an enterprise’s network traffic to gain visibility into potential cyberthreats. NDR relies on advanced capabilities, such as behavioral analytics, machine learning, and artificial intelligence to uncover threats and suspect activities. 
network mask (netmask)A number that is the same as an Internet Protocol (IP) address. A network mask identifies which part of an address is to be used for an operation, such as making a TCP/IP connection.IBM
Network MicrosegmentationFor most organizations, east-west communications make up the majority of data center and cloud traffic patterns, and perimeter-focused defenses do not have visibility into east-west traffic. Given these factors, malicious actors use this as an opportunity to move laterally across workloads. The network creates reliable pathways between workloads and determines whether or not two endpoints can access each other. Microsegmentation creates isolation and determines if two endpoints should access each other. Enforcing segmentation with least-privileged access reduces the scope of lateral movement and contains data breaches. 
network objectA group of predefined settings that can be shared among multiple network access policy rules to control traffic flow, communication, and access between hosts, segments, or subnets on a network.IBM
NIST Cybersecurity Framework (NIST CSF)A voluntary framework consisting of standards, guidelines, and best practices to manage cybersecurity risk.NIST
North American Electric Reliability CorporationA not-for-profit international regulatory authority whose mission is to assure the effective and efficient reduction of risks to the reliability and security of the bulk electric grid in North America.NERC

O

  
Operational ControlsThe security controls for IT and ICS, implemented and executed primarily by people (as opposed to systems).DOE
Operational Technology (OT)Programmable systems or devices that interact with the physical environment (or manage devices that interact with the physical environment). Examples include industrial control systems, building management systems, fire control systems, and physical access control mechanisms.DOE
Organization ProfileIBM Cloud Pak for Security helps you uncover hidden threats, make more informed risk-based decisions and prioritize your team’s time. By selecting your profile preferences such as industry and location, Cloud Pak for Security tailors your experience according to your selection. Organization Profile defines the Industries the that the instance is serving and the geographic location of the deployment. 

P

  
PacketThe sequence of binary digits transmitted and switched as a composite whole.ATIS
packetA unit of data transmitted over a network. Large chunks of information are broken up into packets before they are sent across the Internet.IBM
PAMSee Protocol Analysis Module.IBM
parameter (parm)A value or reference passed to a function, command, or program that serves as input or controls actions. The value is supplied by a user or by another program or process.IBM
parmSee parameter.IBM
passive authenticationA configuration option that automatically logs users into a system when they log on to a network using a directory service, such as Active Directory.IBM
passphraseA sequence of words or other text used to control access to a computer system, program or data. A passphrase is similar to a password in usage, but is generally longer for added security.IBM
passwordIn computer and network security, a specific string of characters used by a program, computer operator, or user to access the system and the information stored within it.IBM
Perimeter SecurityPerimeter security makes up a significant part of most organizations’ network security controls. Network security devices, such as network firewalls, inspect “north-south” (client to server) traffic that crosses the security perimeter and stop bad traffic. Assets within the perimeter are implicitly trusted, which means that “east-west” (workload to workload) traffic may go without inspection. 
Personal Health Information (PHI)PHI stands for Protected Health Information. The HIPAA Privacy Rule provides federal protections for personal health information held by covered entities and gives patients an array of rights with respect to that information. At the same time, the Privacy Rule is balanced so that it permits the disclosure of personal health information needed for patient care and other important purposes.HHS
Personally Identifiable Information (PII)Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means. Further, PII is defined as information: (i) that directly identifies an individual (e.g., name, address, social security number or other identifying number or code, telephone number, email address, etc.) or (ii) by which an agency intends to identify specific individuals in conjunction with other data elements, i.e., indirect identification. (These data elements may include a combination of gender, race, birth date, geographic indicator, and other descriptors). Additionally, information permitting the physical or online contacting of a specific individual is the same as personally identifiable information. This information can be maintained in either paper, electronic or other media.DOL
PhishingAn attempt to trick people into divulging sensitive information such as usernames, passwords, or credit card numbers. Phishing is carried out by email, over the phone, or using a website. The motives are generally to steal money or a user’s identity.Symantec
Physical Security Perimeter (PSP)The physical border surrounding locations in which BES cyber assets, BES cyber systems, or electronic access control or monitoring systems reside, and for which access is controlled.NERC
pingThe command that sends an Internet Control Message Protocol (ICMP) echo-request packet to a gateway, router, or host with the expectation of receiving a reply.IBM
policyA set of considerations that influence the behavior of a managed resource or a user.IBM
portalA single, secure point of access to diverse information, applications, and people that can be customized and personalized.IBM
Potential ImpactThe loss of confidentiality, integrity or availability that might have: 1) a limited adverse effect; 2) a serious adverse effect; or 3) a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.NRECA / Cooperative Research Network
Privileged UserA user that is authorized (and therefore trusted) to perform security-relevant functions that ordinary users are not authorized to perform.NRECA / Cooperative Research Network
Programmable Logic Controller (PLC)A solid-state control system that has a user-programmable memory for storing instructions for the purpose of implementing specific functions such as input/output control, logic, timing, counting, communication, and data and file processing.Idaho National Laboratory
Protected Critical Infrastructure Information Program (PCII)A DHS-specific information protection program that enhances voluntary information sharing between infrastructure owners and operators and the government. PCII protections mean that homeland security partners can be confident that sharing their information with the government will not expose sensitive or proprietary data.DHS
protection interfaceAn access point on a network appliance that is used to monitor, inspect, and block network traffic as it passes through the appliance.IBM
protocolA set of rules controlling the communication and transfer of data between two or more devices or systems in a communication network.IBM
Protocol Analysis Module (PAM)A deep-pack inspection engine that stores handling specifications for a comprehensive list of vulnerability checks. PAM interprets the vulnerability checks, processes the results as security events, and then sends the security events to the appliance in X-Press Updates.IBM
proxy serverA server that receives requests intended for another server and that acts on behalf of the client (as the client’s proxy) to obtain the requested service. A proxy server is often used when the client and the server are incompatible for direct connection. For example, the client is unable to meet the security authentication requirements of the server but should be permitted some services.IBM

Q

  
QRadar on Cloud (QRoC)

In an environment where security requirements are dynamic, IBM® QRadar® on Cloud provides both the security monitoring that you need, and the flexibility to modify your monitoring activities as your requirements change.

With QRadar on Cloud, you can protect your network and meet compliance monitoring and reporting requirements, with reduced total cost of ownership. Other than a data gateway appliance, which is used to connect to QRadar, you do not need to install any extra hardware on your premises.

You get the benefit of all of the QRadar capabilities without investing in the hardware and software of an on-premises QRadar deployment. IBM security professionals manage the infrastructure, while your security analysts perform the threat detection and management tasks.

 
   

R

  
RansomwareA malicious form of software that locks a computer or files and requires money be paid to get the decryption code to unlock the device or the file.Microsoft
Red Team/Blue TeamA group of people authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s security posture (i.e., the Red Team). The objective is to improve enterprise Information Assurance by demonstrating the impacts of successful attacks and by demonstrating what works for the defenders (i.e., the Blue Team) in an operational environmentNIST
Remote AccessAccess to an organizational system by a user (or a process acting on behalf of a user) communicating through an external network (e.g., the Internet)NIST
Remote Access Trojan (RAT)A malicious program that runs invisibly on host computers and permits an intruder to gain access and control from afar. Many RATs mimic legitimate functionality but are designed specifically for stealth installation and operation.Microsoft
ResilienceThe ability to prepare for and adapt to changing conditions and withstand and recover rapidly from disruptions. Resilience includes the ability to withstand and recover from deliberate attacks, accidents, or naturally occurring threats or incidents.Presidential Policy Directive / PPD-21
responseThe reaction of an appliance to an event. Responses include sending an email message to a responsible party, triggering an SNMP trap, creating a log of the activity, quarantining the activity, or using a custom (user-specified) action, such as running an application or running a command.IBM
RiskThe potential for an unwanted outcome resulting from an incident, event, or occurrence, as determined by its likelihood and the associated consequences.US-CERT
Risk ManagementThe process of controlling risks to organizational operations (including mission, functions, image, reputation), organizational assets, individuals, other organizations, and the Nation, resulting from the operation of an information system, and includes: (i) the conduct of a risk assessment; (ii) the implementation of a risk mitigation strategy; and (iii) employment of techniques and procedures for the continuous monitoring of the security and privacy state of the information system.NIST
Risk severityA combination of the likelihood of a damaging event actually occurring and the assessed potential impact on the organization’s mission and goals if it does occur.NRECA / Cooperative Research Network
Role-based access controlAccess permission based on users’ roles and typically reflect the need to perform defined functions within an organization. A given role may apply to a single individual or to several individuals.NRECA / Cooperative Research Network
rootThe user name for the system user with the most authority.IBM
ruleA set of conditional statements that enable computer systems to identify relationships and run automated responses accordingly.IBM

S

  
SandboxA system that allows an untrusted software application to run in a highly controlled environment where the application’s permissions are restricted. In particular, an application in a sandbox is usually restricted from accessing the file system or the network.NIST
Secure Sockets Layer (SSL)A security protocol that provides communication privacy. With SSL, client/server applications can communicate in a way that is designed to prevent eavesdropping, tampering, and message forgery.IBM
Secure Web Gateway (SWG)A secure web gateway protects an organization from online security threats and infections by enforcing company policy and filtering Internet-bound traffic. A secure web gateway is an on-premise or cloud-delivered network security service. Sitting between users and the Internet, secure web gateways provide advanced network protection by inspecting web requests against company policy to ensure malicious applications and websites are blocked and inaccessible. A secure web gateway includes essential security technologies such as URL filtering, application control, data loss prevention, antivirus, and https inspection to provide organizations with strong web security. 
securityThe protection of data, system operations, and devices from accidental or intentional ruin, damage, or exposure.IBM
Security AutomationSecurity automation is the use of technology that performs tasks with reduced human assistance in order to integrate security processes, applications, and infrastructure. 
security eventAny network occurrence or activity that may have an impact on the security of the network.IBM
Security Orchestration, Automation and Response (SOAR)Security orchestration, automation and response, or SOAR, is a stack of compatible software programs that enables an organization to collect data about security threats and respond to security events with little or no human assistance. 
Sensitive InformationInformation of which the loss, misuse, unauthorized access or modification could adversely affect the organization, its employees or its customers.NRECA / Cooperative Research Network
SIEM vs. SOAR vs. XDR

Security teams today can choose among security information and event management (SIEM), security orchestration and response (SOAR), and extended detection and response (XDR) products.

Gartner’s definitions of SIEM, SOAR and XDR are fairly similar. SIEM “supports threat detection, compliance and security incident management through the collection and analysis of security events, as well as a wide variety of other event and contextual data sources.” SOAR enables “organizations to collect inputs monitored by the security operations team.” XDR is “a unified security incident detection and response platform that automatically collects and correlates data from multiple proprietary security components.”

TechTarget
signatureA code in a policy that determines what an agent can detect.IBM
Significant Cyber IncidentA cyber incident that is (or group of related cyber incidents that together are) likely to result in demonstrable harm to the national security interests, foreign relations, or economy of the United States or to the public confidence, civil liberties, or public health and safety of the American people.Presidential Policy Directive / PPD-41
Simple Network Management Protocol (SNMP)A set of protocols for monitoring systems and devices in complex networks. Information about managed devices is defined and stored in a Management Information Base (MIB). See also SNMP manager, SNMP trap.IBM
snapshotAn image that is an exact copy of the original files or directories from which it was created.IBM
SNMPAn image that is an exact copy of the original files or directories from which it was created.IBM
SNMP managerA host that collects information from SNMP agents through the SNMP. See also Simple Network Management Protocol.IBM
SNMP trapAn SNMP message sent from the SNMP agent to the SNMP manager. The message is initiated by the SNMP agent and is not a response to a message sent from the SNMP manager. See also Simple Network Management Protocol.IBM
Social EngineeringPsychological manipulation of people into divulging sensitive information or performing certain actions.Symantec
Software Defined Wide Area Network (SDWAN)Software-Defined Networking (SDN) is an approach to networking that uses software-based controllers or application programming interfaces (APIs) to communicate with underlying hardware infrastructure and direct traffic on a network. This model differs from that of traditional networks, which use dedicated hardware devices (i.e., routers and switches) to control network traffic. SDN can create and control a virtual network – or control a traditional hardware – via software. While network virtualization allows organizations to segment different virtual networks within a single physical network, or to connect devices on different physical networks to create a single virtual network, software-defined networking enables a new way of controlling the routing of data packets through a centralized server. 
SSLSee Secure Sockets Layer.IBM
subnet maskSee network mask.IBM
Sunshine LawsOpen government laws that foster an informed citizenry by providing the public access to government documents and meetings.NCSL
Supervisory Control and Data Acquisition (SCADA)A generic name for a computerized system that is capable of gathering and processing data and applying operational controls over long distances. Typical uses include power transmission and distribution and pipeline systems. SCADA was designed for the unique communication challenges (e.g., delays, data integrity) posed by the various media that must be used, such as phone lines, microwave, and satellite. Usually shared rather than dedicated.NIST
Supply ChainLinked set of resources and processes between multiple tiers of developers that begins with the sourcing of products and services and extends through the design, development, manufacturing, processing, handling, and delivery of products and services to the acquirer.NIST
syslogA standard for transmitting and storing log messages from many sources to a centralized location to enhance system management.IBM

T

  
Technical ControlsSecurity controls for IT and ICS implemented and executed primarily through mechanisms contained in hardware, software, or firmware.DOE
ThreatAny circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), resources, and other organizations through an IT and ICS via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.DOE
threatA security issue, or a harmful act, such as the deployment of a virus or illegal network penetration.IBM
Threat Actor/AgentAn individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.US-CERT
Threat Intelligence Insights  
Threat Intelligence Sources  
Threat InvestigatorThreat Investigator automatically analyzes and investigates cases to help you make more informed decisions. 
tracerouteA utility that traces a packet from a computer to a remote destination, showing how many hops the packet required to reach the destination and how long each hop took.IBM
trafficIn data communication, the quantity of data transmitted past a particular point in a path.IBM
Traffic Light Protocol (TLP)A set of designations used to ensure that sensitive information is shared appropriately. It employs four colors to indicate expected sharing boundaries by the recipient(s).US-CERT
Traffic Light Protocol (TLP)RED: information cannot be effectively acted upon by additional parties, and could lead to impacts on a party’s privacy, reputation, or operations if misused. 
Traffic Light Protocol (TLP)AMBER: information requires support to be effectively acted upon, yet carries risks to privacy, reputation, or operations if shared outside of the organizations involved. 
Traffic Light Protocol (TLP)GREEN: information is useful for the awareness of all participating organizations as well as with peers within the broader community or sector. 
Traffic Light Protocol (TLP)WHITE: information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. 
Transmission Control Protocol (TCP)A communication protocol used in the Internet and in any network that follows the Internet Engineering Task Force (IETF) standards for internetwork protocol. TCP provides a reliable host-to-host protocol in packet-switched communication networks and in interconnected systems of such networks.IBM
transport protocolA specification of the rules that govern the exchange of information between components of a transport network; for example, the User Datagram Protocol (UDP).IBM
trapIn the Simple Network Management Protocol (SNMP), a message sent by a managed node (agent function) to a management station to report an exception condition.IBM

U

  
UDPSee User Datagram Protocol.IBM
United States Computer Emergency Readiness Team (US-CERT)A partnership between the U.S. Department of Homeland Security and the public and private sectors, established to protect the nation’s internet infrastructure. US-CERT coordinates defenses against and responses to cyber attacks across the nation.NIST
User Datagram Protocol (UDP)An Internet protocol that provides unreliable, connectionless datagram service. It enables an application program on one machine or process to send a datagram to an application program on another machine or process.IBM
User Segmentation in Cloud SecurityUser segmentation in cloud security involves dividing user access based on different roles and responsibilities within an organization to ensure that users have access to only the resources they need to perform their job functions. User segmentation reduces the attack surface by limiting the exposure of sensitive data and resources to only authorized users. Because cloud environments are dynamic and change rapidly, user segmentation is a critical component of a comprehensive cloud security strategy. Here are some key considerations for user segmentation in cloud security:PANW
User Segmentation in Cloud SecurityRole-based access control (RBAC): RBAC involves creating and defining permissions for roles, and then assigning users to the appropriate roles according to job functions. This approach ensures that users have access only to the resources they need to perform their job functions, reducing the risk of accidental or intentional data breaches. 
User Segmentation in Cloud SecurityMulti-factor authentication (MFA): MFA requires users to provide more than one form of authentication to access a resource. This can include a password, a security token, or biometric data. MFA is an effective way to prevent unauthorized access to cloud resources, particularly when combined with RBAC. 
User Segmentation in Cloud SecurityContinuous monitoring: Continuous monitoring of user activity is critical for detecting and responding to security incidents in real-time. This involves analyzing log data and user behavior to identify threats and vulnerabilities. 
User Segmentation in Cloud SecuritySeparation of duties: Separation of duties involves dividing responsibilities among multiple users to prevent any one user from having too much control over a system or process. This reduces the risk of fraud or errors and ensures that sensitive operations are performed by multiple users. 
User Segmentation in Cloud SecurityRegular access reviews: Regular access reviews involve routinely reviewing user access rights and permissions to ensure they’re still essential. Access reviews can help to identify and remove unnecessary access rights, reducing the risk of unauthorized access. 
User Segmentation in Cloud SecurityBy implementing RBAC, MFA, continuous monitoring, separation of duties, and regular access reviews, organizations can enhance their cloud security posture and protect against evolving threats. reduce the attack surface and prevent unauthorized access to sensitive data and resources. 

V

  
Virual Private Network (VPN)A VPN provides a secure, encrypted connection between two points. Before setting up the VPN connection, the two endpoints of the connection create a shared encryption key. This can be accomplished by providing a user with a password or using a key sharing algorithm. 
VirusA computer program that can copy itself and infect a computer without permission or knowledge of the user. A virus might corrupt or delete data on a computer, use e-mail programs to spread itself to other computers, or even erase everything on a hard disk.CNSS
VulnerabilityA specific weakness in an information system, system security procedures, internal controls, or implementation that a threat source could exploit.NIST

W

  
Watering Hole AttackA security exploit where the attacker infects websites frequently visited by members of a targeted group being attacked, with a goal of infecting a computer used by one or more of the targeted group members when they visit the infected website.NIST
Web Applications Firewall (WAF)A web application firewall (WAF) protects the application layer and is specifically designed to analyze each HTTP/S request at the application layer. It is typically user, session, and application aware, cognizant of the web apps behind it and what services they offer. Because of this, you can think of a WAF as the intermediary between the user and the app itself, analyzing all communications before they reach the app or the user. Traditional WAFs ensure only allowed actions (based on security policy) can be performed. For many organizations, WAFs are a trusted, first line of defense for applications, especially to protect against the OWASP Top 10—the foundational list of the most seen application vulnerabilities. This Top 10 currently includes:                                                                                                                                                 Injection attacks
Broken Authentication
Sensitive data exposure
XML External Entities (XXE)
Broken Access control
Security misconfigurations
Cross Site Scripting (XSS)
Insecure Deserialization
 
web filter inspection objectA filter that is used to control the types of web pages that users can access on a network.IBM
WebappA web application (web app) is an application program that is stored on a remote server and delivered over the internet through a browser interface. Web services are web apps by definition and many, although not all, websites contain web apps. 
WhitelistA list of entities considered trustworthy and granted access or privileges.US-CERT
WorkloadA workload can be broadly defined as the resources and processes needed to run an application. Hosts, virtual machines and containers are a few examples of workloads. Companies can run workloads across data centers, hybrid cloud and multicloud environments. Most organizations’ applications are becoming increasingly distributed across different cloud-native compute architectures, based on business needs. 
WormA self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself.CNSS

X

  
X-Press Update (XPU)A software update that is issued between major releases to protect a network against the latest security vulnerabilities and threats.IBM
XPUSee X-Press Update.IBM

Y

  

Z

  
zero configuration networkingA set of techniques or technologies used by an application to automatically discover devices on a network and configure network settings.IBM
Zero TrustA security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access.CSO Online
Zero-Day Attack/ExploitAn attack that exploits a previously unknown hardware, firmware, or software vulnerability.NIST