Tech Glossary

Clear definitions for security, privacy, and networking terms

114 terms defined

A

A Windows interface that allows applications and services to integrate with anti-malware products, enabling security software to scan scripts and memory content before execution.

A sophisticated, long-term cyberattack campaign, typically by nation-state actors, that gains unauthorized access and remains undetected to steal data or conduct espionage.

Access Token

🛡️ Security

A credential issued by an authorization server that grants an application temporary access to specific resources on behalf of a user.

Account Takeover (ATO)

🛡️ Security

An attack where adversaries gain unauthorized access to a user's online account, typically through credential theft, social engineering, or token abuse.

Actively Exploited

🛡️ Security

A vulnerability that attackers are currently using in real-world attacks, requiring immediate patching regardless of severity score.

App Governance

🛡️ Security

A Microsoft Defender for Cloud Apps feature that provides visibility into OAuth apps, detects anomalous behavior, and enables policy-based controls over third-party application access.

Authentication Bypass

🛡️ Security

A vulnerability that allows attackers to gain access to a system or application without providing valid credentials, circumventing login security controls.

Authorization Code Flow

🛡️ Security

The most secure OAuth 2.0 flow where the client receives an authorization code that is exchanged for tokens via a back-channel server request.

Azure CLI

🛡️ Security

Microsoft's command-line interface for managing Azure resources and services, commonly used by developers and IT administrators for automation and deployment tasks.

B

Baiting

🛡️ Security

A social engineering attack that uses a false promise or enticing offer to lure victims into a trap, such as leaving infected USB drives or offering free downloads.

Bandwidth

🌐 Networking

Maximum data transfer rate of a network connection, measured in Mbps or Gbps.

Biometric Authentication

🛡️ Security

Using physical characteristics like fingerprints or facial recognition to verify identity.

Brute Force Attack

🛡️ Security

An attack method that tries every possible password combination until finding the correct one.

Buffer Overflow

🛡️ Security

A vulnerability where a program writes data beyond the boundaries of allocated memory, potentially overwriting adjacent memory and allowing attackers to execute malicious code.

A sophisticated scam targeting businesses that conduct wire transfers, where attackers compromise or impersonate executive email accounts to authorize fraudulent payments.

C

CISA KEV

🛡️ Security

The Known Exploited Vulnerabilities catalog maintained by CISA, listing vulnerabilities actively exploited in attacks that federal agencies must patch by specific deadlines.

Callback Phishing

🛡️ Security

A hybrid social engineering attack where phishing emails instruct victims to call a phone number, leading to vishing attacks that bypass email security controls.

ClickFix Attack

🛡️ Security

A social engineering technique that tricks users into running commands or completing actions on their computers, typically disguised as fixing an error or completing a verification step.

Command Injection

🛡️ Security

A security vulnerability that allows attackers to execute arbitrary operating system commands on the host system through a vulnerable application.

Conditional Access

🛡️ Security

A Microsoft Entra ID feature that enforces access policies based on conditions like user location, device compliance, risk level, and application sensitivity.

Consent Phishing

🛡️ Security

A social engineering attack where victims are tricked into granting malicious applications OAuth permissions, giving attackers persistent access to their accounts.

A Microsoft security feature that enables near real-time token revocation and policy enforcement, reducing the window of exposure when user risk changes or sessions are terminated.

D

DHCP

🌐 Networking

Protocol that automatically assigns IP addresses to devices on a network.

DMZ (Demilitarized Zone)

🌐 Networking

A network segment that sits between an internal network and the internet, hosting public-facing services while protecting the internal network from direct exposure.

DNS (Domain Name System)

🌐 Networking

The internet's phonebook—translates domain names (google.com) to IP addresses.

DNS Leak

🔐 VPN

When your DNS queries bypass the VPN tunnel, potentially exposing your browsing activity.

Defense in Depth

🛡️ Security

A security strategy using multiple layers of protection so that if one layer fails, other layers continue to provide security.

Deserialization

🛡️ Security

The process of converting stored or transmitted data back into an object. Insecure deserialization can allow attackers to execute code by manipulating serialized data.

Device Code Flow

🛡️ Security

An OAuth 2.0 flow designed for devices with limited input capabilities, where users authenticate on a separate device by entering a code displayed on the target device.

Double VPN

🔐 VPN

Routing traffic through two VPN servers for an extra layer of encryption.

E

Encryption

🛡️ Security

The process of converting data into a coded format that can only be read with the correct decryption key.

End-to-End Encryption (E2EE)

🛡️ Security

Encryption where only the sender and recipient can read the message—not even the service provider.

Execution Policy

🛡️ Security

A PowerShell security feature that determines the conditions under which PowerShell loads configuration files and runs scripts, ranging from Restricted (no scripts) to Bypass (no restrictions).

Exploit

🛡️ Security

Code or technique that takes advantage of a vulnerability to cause unintended behavior, such as gaining unauthorized access.

F

Firewall

🌐 Networking

Security system that monitors and controls network traffic based on predetermined rules.

Firmware

🏠 Smart Home

Permanent software programmed into a device's hardware that controls its basic functions.

G

Geo-blocking

🔐 VPN

Restricting access to content based on the user's geographic location.

I

IP Address

🔐 VPN

A unique numerical identifier assigned to every device connected to the internet.

A security system that monitors network traffic for malicious activity and can automatically block or prevent detected threats in real-time.

Identity Protection

🛡️ Security

A Microsoft Entra ID Premium feature that uses machine learning to detect risky sign-ins and user behaviors, automatically enforcing remediation like MFA challenges or password resets.

Illicit Consent Grant

🛡️ Security

An attack technique where adversaries register malicious OAuth applications that request excessive permissions, then trick users into authorizing them.

K

CISA's catalog of vulnerabilities that are actively being exploited in the wild, requiring federal agencies to patch within specific timeframes.

Kill Switch

🔐 VPN

A VPN feature that blocks all internet traffic if the VPN connection drops, preventing data leaks.

L

Latency

🌐 Networking

The delay between sending a request and receiving a response, measured in milliseconds (ping).

Lateral Movement

🛡️ Security

Techniques attackers use to move through a network after initial compromise, seeking additional systems to control and data to steal.

Legacy Authentication

🛡️ Security

Older authentication protocols (POP, IMAP, SMTP AUTH, older Office clients) that don't support modern security features like MFA, making them prime targets for credential attacks.

Living Off the Land

🛡️ Security

An attack technique where adversaries use legitimate, pre-installed system tools (like PowerShell, WMI, or certutil) rather than custom malware, making detection more difficult.

M

MAC Address

🌐 Networking

A unique hardware identifier assigned to every network interface.

MFA Bypass

🛡️ Security

Techniques that circumvent multi-factor authentication protections, including token theft, real-time phishing proxies, MFA fatigue attacks, and OAuth abuse.

Matter

🏠 Smart Home

A new universal smart home standard backed by Apple, Google, and Amazon for cross-platform compatibility.

Mesh Network

🏠 Smart Home

A network where devices connect to multiple nodes, extending coverage and providing redundancy.

Metadata

📖 General

Data about data—like email timestamps, file sizes, or location tags on photos.

Microsoft Entra ID

🛡️ Security

Microsoft's cloud-based identity and access management service (formerly Azure Active Directory), providing authentication, SSO, and security features for Microsoft 365 and other applications.

N

No-Logs Policy

🔐 VPN

A VPN provider's commitment to not record or store user activity, connection times, or IP addresses.

O

OAuth

🛡️ Security

An open standard authorization protocol that allows applications to access user resources without exposing passwords, using tokens instead of credentials.

OAuth Scope

🛡️ Security

A mechanism in OAuth that limits an application's access to a user's account, defining specific permissions like read email, send messages, or access files.

OTA Update

🏠 Smart Home

Over-The-Air update—firmware or software updates delivered wirelessly without physical connection.

Open Source

📖 General

Software with publicly available source code that anyone can inspect, modify, and distribute.

OpenVPN

🔐 VPN

An open-source VPN protocol widely considered secure and reliable, though slower than WireGuard.

Out-of-Band Update

🛡️ Security

An emergency security patch released outside the normal update schedule to address critical vulnerabilities that can't wait for the next Patch Tuesday.

P

Pass-the-Hash

🛡️ Security

An attack technique where an attacker uses a captured password hash to authenticate without needing to crack or know the actual password.

Password Manager

🛡️ Security

Software that securely stores and auto-fills passwords, generating strong unique passwords for each account.

Patch

🛡️ Security

A software update that fixes security vulnerabilities, bugs, or adds improvements to an existing program.

Phishing

🛡️ Security

A social engineering attack using fake emails or websites to steal login credentials or personal info.

Port Forwarding

🌐 Networking

Directing incoming traffic on specific ports to a particular device on your network.

Pretexting

🛡️ Security

A social engineering technique where attackers create a fabricated scenario (pretext) to manipulate victims into providing information or taking actions they normally would not.

Privilege Escalation

🛡️ Security

An attack technique where an adversary gains elevated access rights beyond what was initially granted.

Proprietary

📖 General

Software owned by a company with restricted access to source code.

Q

QoS (Quality of Service)

🌐 Networking

Network feature that prioritizes certain traffic types (like video calls) over others.

Quid Pro Quo Attack

🛡️ Security

A social engineering technique where attackers offer something (like IT support) in exchange for information or access, exploiting the human tendency to reciprocate.

R

RCE (Remote Code Execution)

🛡️ Security

A critical vulnerability class that allows an attacker to run arbitrary code on a target system from a remote location, typically over a network or the internet, without requiring physical access.

Refresh Token

🛡️ Security

A long-lived credential used to obtain new access tokens without requiring the user to re-authenticate, enabling persistent application access.

Router

🌐 Networking

A device that directs data packets between your local network and the internet.

S

An XML-based standard for exchanging authentication and authorization data between identity providers and service providers, commonly used for single sign-on (SSO).

SSL/TLS

🛡️ Security

Cryptographic protocols that secure data transmitted between your browser and websites (the lock icon in HTTPS).

SSO (Single Sign-On)

🛡️ Security

An authentication method allowing users to access multiple applications with one set of login credentials, reducing password fatigue while requiring strong security controls.

Security Defaults

🛡️ Security

A set of basic identity security settings in Microsoft Entra ID that enable MFA, block legacy authentication, and protect privileged accounts—recommended for organizations without premium licenses.

Security Key

🛡️ Security

A physical hardware device used for authentication, providing stronger protection than SMS or app-based 2FA.

Session Hijacking

🛡️ Security

An attack where an adversary takes over a legitimate user session by stealing or predicting session tokens, gaining unauthorized access to systems or data.

Smishing

🛡️ Security

SMS phishing—a social engineering attack using text messages to trick recipients into clicking malicious links or providing personal information.

Social Engineering

🛡️ Security

The psychological manipulation of people into performing actions or divulging confidential information, exploiting human trust rather than technical vulnerabilities.

Spear Phishing

🛡️ Security

A targeted phishing attack directed at specific individuals or organizations, using personalized information to appear more legitimate and increase success rates.

Split Tunneling

🔐 VPN

A VPN feature allowing some traffic through the VPN while other traffic uses your regular connection.

T

Tailgating

🛡️ Security

A physical social engineering technique where an unauthorized person follows an authorized individual into a restricted area, exploiting social courtesy.

Thread

🏠 Smart Home

A low-power mesh networking protocol designed for IoT devices, used alongside Matter.

Throughput

📖 General

Actual amount of data successfully transferred over a connection, often lower than bandwidth.

Token Protection

🛡️ Security

Security measures that bind OAuth tokens to specific devices or sessions, preventing stolen tokens from being replayed on attacker-controlled systems.

U

UPnP

🌐 Networking

Allows devices to automatically configure port forwarding—convenient but a security risk.

Unified Audit Log

🛡️ Security

A centralized logging system in Microsoft 365 that records user and admin activities across Exchange, SharePoint, Teams, and other services for security monitoring and compliance.

V

VLAN (Virtual LAN)

🌐 Networking

A logical network segment that separates devices even when physically connected to the same network.

Vishing

🛡️ Security

Voice phishing—a social engineering attack conducted via phone calls where attackers impersonate trusted entities to extract sensitive information or payments.

Vulnerability

🛡️ Security

A weakness in software, hardware, or processes that can be exploited by attackers to gain unauthorized access or cause harm.

W

Whaling

🛡️ Security

A highly targeted phishing attack aimed at senior executives or high-value targets, often involving significant research and sophisticated impersonation.

WireGuard

🔐 VPN

A modern, lightweight VPN protocol known for high speeds and strong security.

Wormable

🛡️ Security

A vulnerability that can be exploited to spread automatically from system to system without user interaction, similar to how biological worms spread.

Z

Z-Wave

🏠 Smart Home

A wireless protocol for smart home devices, known for reliability and less interference than WiFi.

Zero Trust

🛡️ Security

A security model that requires strict verification for every user and device trying to access resources, regardless of whether they're inside or outside the network perimeter.

Zero-Day

🛡️ Security

A security vulnerability that is exploited or publicly disclosed before the software vendor can release a patch, giving developers 'zero days' to fix it.

Zero-Day

🛡️ Security

A software vulnerability unknown to the vendor, giving them "zero days" to fix it before exploitation.

Zero-Knowledge

🛡️ Security

A security model where the service provider has no ability to access your decrypted data.

Zigbee

🏠 Smart Home

A low-power wireless protocol commonly used for smart home device communication.