Your browser does not support JavaScript.
Cybersecurity Terms Lexicon
CTRL
K
Cybersecurity Terms Lexicon
Topics
Fundamentals
IAM
App Security
Network Security
Cloud Security
Security Ops
Incident Response
Threats
Theme
Auto
Dark
Light
Home
Categories
Security-Fundamentals
Security-Fundamentals
21
Posts
1
Sections
1
Types
Security Fundamentals
Confidentiality, Integrity, and Availability (CIA Triad)
Security-Fundamentals
The CIA triad is a core security model that frames how systems protect secrecy, correctness, and dependable access.
Read more about Confidentiality, Integrity, and Availability (CIA Triad).
Security Fundamentals
Defense in Depth Strategy
Security-Fundamentals
Defense in depth is the practice of using multiple security layers so one control failure does not expose the whole system.
Read more about Defense in Depth Strategy.
Security Fundamentals
Least Privilege Access Principle
Security-Fundamentals
Practice of giving users, services, and systems only the access they need to reduce blast radius.
Read more about Least Privilege Access Principle.
Security Fundamentals
Attack Surface and Exposure
Security-Fundamentals
The set of exposed interfaces, identities, services, and workflows an attacker could potentially reach.
Read more about Attack Surface and Exposure.
Security Fundamentals
Security Threats and Sources
Security-Fundamentals
A potential source of harm that could exploit weaknesses or otherwise affect a system or organization.
Read more about Security Threats and Sources.
Security Fundamentals
Security Vulnerabilities and Weaknesses
Security-Fundamentals
A weakness in software, configuration, process, or design that could be used to compromise security.
Read more about Security Vulnerabilities and Weaknesses.
Security Fundamentals
Security Risk and Impact
Security-Fundamentals
The possibility that a threat causes meaningful harm once likelihood, impact, and existing controls are considered.
Read more about Security Risk and Impact.
Security Fundamentals
Security Exploits in Practice
Security-Fundamentals
A method or piece of code used to take advantage of a vulnerability and cause unauthorized behavior.
Read more about Security Exploits in Practice.
Security Fundamentals
Risk Mitigation in Security
Security-Fundamentals
Action taken to reduce the likelihood or impact of a security problem when risk cannot be ignored.
Read more about Risk Mitigation in Security.
Security Fundamentals
Security Control Types and Roles
Security-Fundamentals
A safeguard or measure used to prevent, detect, correct, or otherwise reduce security risk.
Read more about Security Control Types and Roles.
Security Fundamentals
Security Misconfigurations and Exposure
Security-Fundamentals
Condition where systems, applications, identities, or resources are configured in ways that weaken protections.
Read more about Security Misconfigurations and Exposure.
Security Fundamentals
Attack Vectors and Entry Methods
Security-Fundamentals
The path or method a threat uses to reach a target system, user, application, or workload.
Read more about Attack Vectors and Entry Methods.
Security Fundamentals
Blast Radius and Impact Scope
Security-Fundamentals
The scope of systems, data, users, or operations affected when one component is compromised or fails.
Read more about Blast Radius and Impact Scope.
Security Fundamentals
Secure by Default Configuration
Security-Fundamentals
Systems, products, and services start in the safer configuration unless an administrator changes them.
Read more about Secure by Default Configuration.
Security Fundamentals
Zero-Day Vulnerability
Security-Fundamentals
A zero-day vulnerability is a security flaw that is newly discovered or not yet remediated, leaving defenders little or no patch window.
Read more about Zero-Day Vulnerability.
Security Fundamentals
Attack Paths and Chained Weaknesses
Security-Fundamentals
The sequence of weaknesses or trust relationships an attacker could chain together to reach a target.
Read more about Attack Paths and Chained Weaknesses.
Security Fundamentals
Crown Jewels in Security
Security-Fundamentals
Crown jewels are the systems, identities, data sets, or processes whose compromise would cause outsized harm to the organization.
Read more about Crown Jewels in Security.
Security Fundamentals
Least Functionality for Reduced Exposure
Security-Fundamentals
Practice of enabling only the features and services a system needs to perform its intended job.
Read more about Least Functionality for Reduced Exposure.
Security Fundamentals
Zero Trust Security Model
Security-Fundamentals
Zero trust is a security model that avoids broad implicit trust and continuously evaluates access based on identity, context, and policy.
Read more about Zero Trust Security Model.
Security Fundamentals
Security by Design Practices
Security-Fundamentals
Practice of considering security requirements and risks during planning and architecture instead of afterthoughts.
Read more about Security by Design Practices.
Security Fundamentals
Privilege Escalation Risks
Security-Fundamentals
Privilege escalation is the gain of more access or authority than a user, process, or workload was originally meant to have.
Read more about Privilege Escalation Risks.