Cyber Security Glossary

Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page:  1  2  3  4  5  6  7  8  9  10  ...  59  (Next)



  • ¬†IPv6 transition mechanism for migrating from Internet Protocol version 4 (IPv4) to IPv6
  • tunneling protocol that encapsulates IPv6 packets on specially configured IPv4 links according to the specifications of RFC 4213
  • IP protocol number for 6in4 is 41, per IANA reservation



  • Authentication Authorization¬† Accounting (AAA)
  • used to refer to a family of protocols that mediate network access
  • Authentication is used to verify the identity of a person
  • Authorization is used to verify the persons has the correct permissions to access something
  • Accounting involves recording the persons access, by logging their activities


  • After Action Report (AAR)
  • retrospective analysis on a given sequence of goal-oriented actions previously undertaken

Access Control

  • management of admission to system and network resources
  • grants authenticated users access to specific resources based on company policies and the permission level assigned to the user or user group
  • often includes authentication, which proves the identity of the user or client machine attempting to log in
  • often includes authorization, which is the process of determining which level of access each user is granted
  • can include physical access control, such as a locked door, or security guard
  • can include information access control, such a network login


  • Access Control List (ACL)
  • permissions attached to an object that specify which users are granted access to that object and the operations it is allowed to perform
  • each entry in an access control list specifies the subject and an associated operation that is permitted


An ActiveX control is an executable program that can be automatically delivered over the Internet where it usually runs within a browser.


  • Active Directory (AD)
  • Windows OS directory service that facilitates working with interconnected, complex and different network resources in a unified manner
  • provides a common interface for organizing and maintaining information related to resources connected to a variety of network directories
  • directories may be
    • systems-based
    • application-specific
    • network resources, like printers
  • serves as a single data store for quick data access to all users and controls access for users based on the directory's security policy


  • Android Debug Bridge¬† (ADB)
    • command-line tool that lets you communicate with a device
    • facilitates a variety of device actions, such as installing and debugging apps
    • provides access to a Unix shell that you can use to run a variety of commands on a device

Agile Development

  • practices involve discovering requirements and developing solutions through the collaborative effort of self-organizing and cross-functional teams and end users
  • advocates adaptive planning, evolutionary development, early delivery, and continual improvement
  • encourages flexible responses to change


  • Aircrack-ng
    • suite of tools that provide capabilities for conducting RF communication monitoring and wireless network security auditing
    • network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs
    • Works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic
    • Runs under Linux, FreeBSD, macOS, OpenBSD, and Windows

Page:  1  2  3  4  5  6  7  8  9  10  ...  59  (Next)