Γλωσσάριο Cybersecurity
Συγκεντρώσαμε αυτό το πλήρες γλωσσάριο των όρων ευαισθητοποίησης για την ασφάλεια ως μία δωρεάν και συνεχώς ενημερωμένη πηγή για να κάνουμε την ασφάλεια προσβάσιμη σε όλους. Γνωρίζουμε ότι η γλώσσα ασφάλειας μπορεί να είναι εκφοβιστική, οπότε αν ψάχνετε για σαφείς ορισμούς και ορολογία για την ασφάλεια στον κυβερνοχώρο, μην ψάχνετε άλλο. Παρακάτω θα βρείτε τους όρους με αλφαβητική σειρά, “αποκρυπτογραφημένο” από τη γλώσσα της πληροφορικής.
- #
- A
- Access Control
- Account Harvesting
- Active Content
- Activity Monitors
- Advanced Encryption Standard (AES)
- Adware
- Algorithm
- Anomaly-based detection
- Anti-malware
- Anti-spam
- Anti-spoofing
- Antispyware software
- Antivirus software
- API
- Applet
- Asymmetric Cryptography
- Attack (online)
- Attack signature
- Auditing
- Authentication
- Authenticity
- Authorization
- Autonomous System
- Autorun worm
- Availability
- B
- Backdoor
- Backdoor Trojan
- Backup
- Bandwidth
- Banner
- Baseline security
- Basic Authentication
- Biometrics
- BIOS
- Bit
- Blackhat hacker
- Blacklisting
- Block Cipher
- Bluetooth
- Boot Record Infector
- Boot sector malware
- Bot
- Botnet
- Bridge
- British Standard 7799
- Broadcast
- Broadcast Address
- Browser
- Browser hijacking
- Brute Force
- Buffer Overflow
- Bug
- Bulk Encryption
- Business Continuity Plan (BCP)
- Business Impact Analysis (BIA)
- Byte
- C
- Cache
- Cache Cramming
- Cache Poisoning
- Catfishing
- Certificate-Based Authentication
- Chargeware
- Checksum
- Chief Information Officer (CIO)
- Cipher
- Ciphertext
- CISO
- Client
- Code injection
- Computer Emergency Response Team (CERT)
- Computer Incident Response Team (CIRT)
- Computer Network
- Confidentiality
- Cookie
- CoreBOT
- Cost Benefit Analysis
- CPU
- Crimeware
- Cron
- Cross Site Scripting (XSS)
- Cryptanalysis
- Cryptographic Algorithm or Hash
- CryptoLocker
- CryptoWall
- CSO
- CTB Locker
- Cyber Attack
- Cyber incident
- Cyber security
- Cyber weapon
- D
- Daemon
- Dark Web
- Data
- Data Aggregation
- Data Asset
- Data Custodian
- Data Encryption Standard (DES)
- Data Integrity
- Data leakage
- Data loss
- Data Mining
- Data Owner
- Data theft
- Data Warehousing
- Day Zero
- Decryption
- Deep Web
- Defacement
- Demilitarized Zone (DMZ)
- Denial of Service
- Dialer
- Dictionary Attack
- Digest Authentication
- Digital Certificate
- Digital Envelope
- Digital Signature
- Digital Signature Algorithm (DSA)
- Digital Signature Standard (DSS)
- Disaster Recovery Plan (DRP)
- Discretionary Access Control (DAC)
- Distributed Scans
- DNS Cache Poisoning
- DNS hijacking
- Document malware
- Domain
- Domain generation algorithm (DGA)
- Domain Hijacking
- Domain Name
- Domain Name System (DNS)
- Domain shadowing
- Dormant code
- Drive-by attack
- Due diligence
- Dumpster diving
- Dyreza / Dyre
- E
- Eavesdropping
- Email malware distribution
- Encrypted Network
- Encryption
- End-to-End Encryption
- End-to-End Security
- Enterprise Risk Management
- Ethernet
- Event
- Exploit
- Exploit kit
- Exploit kits-as-a-service
- Exponential Backoff Algorithm
- Exposure
- External Security Testing
- F
- False positive
- False Rejects
- File Transfer Protocol (FTP)
- Filter
- Firewall
- Flooding
- Forensic Specialist
- Form-grabbing malware
- Forward Proxy
- G
- H
- Hacker
- Hacktivism
- Hash Function
- Header
- Hijack Attack
- Host
- HTTP Proxy
- HTTPS
- HTTPS scanning
- Hub
- Hybrid Attack
- Hybrid Encryption
- Hyperlink
- Hypertext Markup Language (HTML)
- Hypertext Transfer Protocol (HTTP)
- I
- Identity
- Incident
- Incident Handling
- Incremental Backups
- Inference Attack
- Information
- Information Assurance (IA)
- Information Flow Control
- Information Security
- Information Security Policy
- Information Security Risk
- Information System Resilience
- Information Systems Security (INFOSEC)
- Information Warfare
- Input Validation Attacks
- Inside Threat
- Integrity
- Intellectual Property
- Internal Security Testing
- Internet
- Internet Control Message Protocol (ICMP)
- Internet Engineering Task Force (IETF)
- Internet Message Access Protocol (IMAP)
- Internet Protocol (IP)
- Internet Protocol Security (IPsec)
- Internet Standard
- Internet worm
- Intranet
- Intrusion
- Intrusion Detection
- Intrusion Detection Systems (IDS)
- IoT
- IP Address
- IP Flood
- IP Forwarding
- IP Spoofing
- ISO
- K
- L
- M
- MAC Address
- Macro Virus
- Malicious Applet
- Malicious Code
- Malvertisement
- Malvertising
- Malware
- Man-in-the-middle Attack (MitM)
- Mandatory Access Control (MAC)
- Masquerade Attack
- Maximum Tolerable Downtime
- md5
- Mobile code
- Mobile phone malware
- Monoculture
- Morris Worm
- Multifactor Authentication
- N
- O
- P
- Packet
- Packet Sniffer
- Packet Switched Network
- Partitions
- Passive attack
- Password Authentication Protocol (PAP)
- Password Cracking
- Password Sniffing
- Patch
- Patching
- Payload
- Penetration
- Penetration Testing
- Personal Firewalls
- Pharming
- Phishing
- Ping of Death
- Plaintext
- Polymorphic malware
- Pop-up ad
- Port Scan
- Power virus
- Promiscuous Mode
- Proprietary Information
- Protocol
- Proxy Server
- Public Key
- Q
- R