Cybersecurity Technical Glossary
To help you navigate the terminology used in the industry, we’ve created a glossary of key cybersecurity terms.
AI (Artificial Intelligence)
A branch of computer science focused on creating smart machines capable of performing tasks that typically require human intelligence.
Cloud Computing
The delivery of computing services, including storage, servers, databases, and software, over the internet (“the cloud”)
Quantum Computing
An advanced field of computing that leverages quantum mechanics to perform calculations far faster than traditional computers. While quantum computing holds great potential, it also threatens current encryption methods, as quantum algorithms could easily break many encryption standards used today.
Firewall
A network security tool that monitors and controls incoming and outgoing network traffic. It creates a barrier between a trusted internal network and untrusted external networks, using pre-defined security rules to block unauthorized access while allowing safe communication
Social Engineering
A tactic attackers use to manipulate individuals into divulging confidential information or taking actions that compromise security.
Zero Trust Architecture
A security framework that assumes no user, device, or system can be trusted by default—even those within the network perimeter. It enforces continuous verification for every access request, minimizing the potential for breaches by limiting unnecessary trust.
Autonomous Security Systems
AI-driven system that can detect, respond to, and mitigate cybersecurity threats with minimal human intervention.
Penetration Testing
A simulated cyberattack conducted to evaluate the security of a system or network by identifying vulnerabilities.
AI-Driven Threats
Cyberattacks that leverage artificial intelligence (AI) and machine learning to improve their precision, adapt to defenses, and automate malicious activities. These threats can include AI-enhanced phishing, malware, and automated intrusion detection evasion.
Vulnerability Assessment
The process of identifying, analyzing, and prioritizing potential vulnerabilities in systems, networks, or software. The goal is to uncover security gaps so organizations can take proactive measures to mitigate risks before attackers exploit them.
Next-Generation Firewall (NGFW)
A Next-Generation Firewall (NGFW) extends beyond traditional firewalls by offering advanced features such as intrusion prevention systems (IPS), deep packet inspection (DPI), and application control. NGFWs are essential in modern networks to detect and block more sophisticated attacks.
CompTIA Security+
A globally recognized, vendor-neutral entry-level cybersecurity certification. It validates a candidate’s ability to handle core security tasks such as network security, threat management, and incident response, making it a popular choice for early-career cybersecurity professionals.
Fortinet NSE Certification
A certification program that validates an individual’s expertise in network security and firewall management. It includes multiple levels, ranging from foundational knowledge to advanced security skills.
Ethical Hacking
The practice of of legally penetrating systems or networks to identify security vulnerabilities before malicious hackers can exploit them. Ethical hackers, also known as white-hat hackers, help organizations strengthen their defenses by simulating real-world attacks.
Cloud Security
The policies, technologies, and practices designed to protect data, applications, and infrastructure in cloud environments. It includes identity management, encryption, and compliance monitoring to ensure that cloud-based resources remain secure across multiple providers and locations.
Machine Learning (ML)
A subset of AI that allows computers to learn from data and improve performance over time without being explicitly programmed. ML powers many automated threat detection systems in cybersecurity.
Governance, Risk, and Compliance (GRC)
A framework used to align an organization’s IT policies with business goals while managing risks and ensuring compliance with legal regulations like GDPR and CCPA.