Making Sense of Security Jargon

2FA/MFA

Adware

Agentless

Anti-Malware

Anti-Virus

APT

ARP route poisoning

Artifical Intellegence

Asymmetric Encryption

Attack Vector

Attribution

Automation

Black Box

Blue Team

Bot

Botnet

Breach

Brute Force

Bug Bounty

CA

Command and Control (C2)

Containment

Cracker

Credential Theft

Cryptography

Darknet

DoS/DDoS

Deception

Deep Web

Detection

DLP

Dwell Time

EDR

Encoding

Encryption

Encryption at Rest

Encryption in Transit

EPP

Eradication

Exploit

File Hash

GPG

Hacker

Hijack

Homomorphic encryption

Honeypot

Incident

Incident Response

Infrastructure as Code

IoT

Kill Chain

Lateral Movement

Lessons Learned

Lightweight (Nano...) Agent

Machine Learning

Malware

MFA

Microsegmentation

MITM

NAC

Next Generation ...

NGAV

NGFW

OpenAuth

P2PE

Password cracking

Password Hash

Patch

PCAP

Phishing

Pentest

Perfect Forward Secrecy

Petya

PGP

Pivoting

PKI

Preparation

Prevention

Privilege Escalation

Protection

Public/private key encryption

Purple Team

Ransomware

RAT

Recovery

Red Team

Remediation

Salts

SAMLv2

Sandboxing

Shadowbrokers

Situational Awareness

Spyware

SQL injection

Symmetric Encryption

Threat Hunting

Threat Intelligence

Threat Mapping

Tor

Trojan

TTPs

UBA

UEBA

Virtual Patching

Virus

Visibility

VPN

Vulnerability

Vulernability Assessment

Vulnerability Management

WannaCry

Webapp assessment

Whitehat

Worm

x.509

Zero-Day

Zombie