Welcome to the free Privacy Dictionary.
We’re in the process of building an amazing repository of definitions and examples.
- Active Attack
- Air Gap
- Attack Surface
- Backdoor
- BadUSB
- Baiting
- Barrel Phishing
- Behavior-Based Security
- Black Hat Hacker
- Bloatware
- Blue Hat Hacker
- Botnet
- CCTV
- Cloaking
- Cloning
- Cloud Security
- Computer Access Control
- Computer Worm
- Cryptography
- CVE
- Cyber Hygiene
- Cyberbullying
- Cybercrime
- Cybersecurity
- Cybersecurity Insurance
- Cyberstalking
- Cyberwarfare
- Dark Web
- Data lifecycle management
- Data Loss Prevention (DLP)
- Data Privacy
- Device Fingerprinting
- Digital Certificate
- Digital Identity
- Digital Rights Management
- DNSsec
- Double Barrel Phishing
- Dumpster Diving Attack
- EDR
- Email Security
- Encryption
- Enumeration
- Explicit Consent
- Facial Recognition System
- Fileless Malware
- Freeware
- Fuzzing
- General Data Protection Regulation
- Globbing
- Google Dorking
- Government Agency
- Gray Hat Hacker
- GRC
- Green Hat Hacker
- Hacking
- Hashing
- Holistic Security
- Honeynet
- Honeypot
- Identity Theft
- Implicit Consent
- Incognito Mode
- Indicators of Compromise
- Information Governance
- Information Security
- Information Utility
- IoT Security
- Iris Recognition
- ISO 27001
- Know Your Customer (KYC) Software
- Location-Based Services
- Malware
- Man-in-the-Middle Attack
- Managed Detection and Response
- Managed Security Service Provider
- Multi-Factor Authentication
- Network Security
- Non-governmental organization
- Offensive Security
- Passive Attack
- Penetration Testing
- Personal Information
- Pharming
- Phishing
- PKI
- Pretexting
- Privacy by Design
- Privacy Engineering
- Private Sector
- Privatization
- Public Sector
- Public-private partnership
- Quid Pro Quo
- Ransomware
- Red Flags Rule
- Red Hat Hacker
- Red Teaming
- Reverse Social Engineering
- Role-Based Access Control
- RSA Security
- Ryuk
- SAML
- Sandboxing
- SecOps
- Secure Communication
- Security Audit
- Security by Design
- Segregation of Duties
- Sensitive Data
- Shimming
- Shoulder Surfing
- Sidejacking
- SIEM
- Single-Factor Authentication
- Skimming
- Smishing
- SOAR
- SOC Audit
- Social Engineering
- Software Bill of Materials
- Spear Phishing
- Spoofing
- Supercookies
- Surveillanceware
- Swatting
- Swiping Cards
- Synthetic Data
- Tabnabbing
- Tailgating
- Threat
- Threat Intelligence
- Trojan
- Two-Factor Authentication
- Virus
- Vishing
- Voluntary Sector
- VPN
- War Driving
- Watering Hole Attack
- Web 3.0
- What is PII and Why is it Essential for Cyber Security?
- White Hat Hacker
- Whitelist
- Wiretapping