Outsmart. Outsecure. Outlast.

Cyber Security Glossary / Dictionary


Cyber Security Terms and Definitions


In the ever-evolving world of cyber security, understanding key terminology is essential to protect your business and personal data. This comprehensive cyber security glossary provides clear and concise definitions of the most important terms, concepts, and threats in the digital security landscape. From ransomware and phishing to zero-day exploits and encryption, this guide is designed to help you stay informed and secure. Whether you're an IT professional, a business owner, or just someone looking to enhance your cyber security knowledge, this glossary is your essential resource for comprehensive cyber security awareness.



Application Whitelisting

Allowing only approved applications to run on a system, blocking all others by default to prevent malware.

Example: A business uses application whitelisting to ensure only verified software runs on employee computers.



Whitelisting

A security strategy where only explicitly approved applications, users, IP addresses, or processes are allowed access to a system, network, or resource. Everything not included on the whitelist is automatically blocked by default, reducing the attack surface and limiting potential threats.

Example: A company's IT department whitelists specific software applications on employee computers, ensuring that only approved programs can run on the network.

See also: Blacklisting



Blacklisting

A security strategy where specific applications, users, IP addresses, or processes that are known to be malicious or unauthorised are explicitly blocked from accessing a system, network, or resource. Everything not included on the blacklist is allowed by default, but may still be monitored for suspicious activity.

Example: A web server's firewall blacklists IP addresses associated with repeated unauthorised login attempts to prevent further access.

See also: Whitelisting