Skip to content
Products
SentryCA
SentryASM
SentryBA
SentryTH
Why RishiSec
Consultancies
Managed Service Providers
Value Added Resellers
Business & IT Teams
Resources
Blog
Cheat Sheets
Glossary
Integrations
About Us
Glossary
Home
Resources
Glossary
((HASP)) Hardware against software piracy
(AES) Advanced Encryption Standard (AES)
(AET) advanced evasion technique
(AI) artificial intelligence
(APT) advanced persistent threat
(ATA) Advanced Technology Attachment
(BEC) Business email compromise
(BYOD) Bring-Your-Own-Device
(BYOE) Bring-Your-Own-Encryption
(CA) certificate authority
(CIRT) Cyber Incident Response Team
(CISA) Cybersecurity and Infrastructure Security Agency
(CISO) Chief Information Security Officer
(CISSP) Certified Information Systems Security Professional
(CMMC) Cybersecurity Maturity Model Certification
(CNA) Computer network attack
(CND) computer network defense (CND)
(CNE) Computer network exploitation (CNE)
(CNO) Computer network operations (CNO)
(COTS) Commercial-off-the-shelf
(CSPM) Cloud Security Posture Management
(CTI) Cyber threat intelligence
(CVE) Common Vulnerabilities and Exposures
(DDoS) Distributed denial-of-service attack
(DGA) Domain-generation algorithm
(DMARC) Domain-based Message Authentication, Reporting and Conformance
(DNS) Domain Name System (DNS)
(DPI) Deep packet inspection
(DrDoS) Distributed reflection denial-of-service attack
(EaaS) Encryption-as-a-service
(EDR) Endpoint detection and response
(ELINT) Electronic intelligence
(GB) Gigabyte
(GDPR) General Data Protection Regulation
(GOTS) Government-off-the-shelf
(HUMINT) Human intelligence
(IAM) identity and access management
(ICS) Industrial control system
(IDE) Integrated Drive Electronics
(IDE)Integrated development environment
(IDS) Intrusion detection system
(IoT) Internet-of-things
(JCDC) Joint Cyber Defense Collaborative
(KB) Kilobyte
(MB) Megabyte
(micro VM) Micro virtual machine
(NDR) Network detection and response
(NFT) Non-fungible token
(NIST) National Institute of Standards and Technology
(NTP) Network Time Protocol
(OS)Operating system
(OSINT)Open source intelligence
(XDR) Extended Detection and Response
(XSS) Cross-site scripting
abstraction layer
account hijacking
account takeover prevention
Accumulo
acoustic cryptanalysis
Active Cyber Defense
active defense
adversary group naming
adware
agile software development
AI
alert fatigue
algorithm
anagram
Android
angler phishing
anomoly detection
anonymizer
anti-cheat software
anti-malware
Apple Lockdown Mode
application
APT
APT side hustle
Astroturf
Asymmetric Encryption
ATM skimming
Attack Surface
Attack traffic
Attack Vector
Attribution
Backdoor
Baiting
Baselining
Bashmob
Behavior analysis
Benign
Big data
Biometric
BIOS
Bit
Black box testing
Black hat
Black swan event
Blacklist
Blocklist