Encyclopedia Encyclopedia Vi er stolte af at præsentere vores encyclopedia omhandlende IT-sikkerhed og hacking. Her finder du en bred samling af definitioner og forklaringer inden for IT-sikkerhedens verden. A Access controlAD vs. Azure ADAntivirusAsset managementAuthenticationAuthorizationAttack Surface Reduction B Backdoor BaaS Behavioral Biometrics Botnet Big Data Biometriske data BI Værktøjer Brute force Buffer overflow C CaptchaChain of CustodyCloud SecurityComplianceCookiesCyberkill-chainCross-Site Scripting D Data Backup Data encryption / Data kryptering Data Loss Prevention Data Masking Data Warehouse Dark Web DDos Demilitarized Zone De-identification Deep Packet Inspection Deep Pack Review Denial-of-service (DoS) Digital Foodprint Digital Signatur Disaster Recovery Disaster Recovery Plan DNS DOS DRaaS E EncryptionEncryption keyEndpoint detection and response (EDR) F FIDO2File integrity monitoring (FIM)FirewallFirewall evasionFuzzing G GatewayGithubGDPRG Suite H HashingHoneypotHostingHTTPSHybrid Cloud I Identity and access management (IAM)Identity FederationIDSIncident responsInformation security policyInternet of Things (IoT)Intrusion PreventionInsider ThreatIP-adresseIT-compliance J JailbreakingJavaScriptJPEG K KernelKeyloggerKryptering L LAN (Local Area Network) Latency LED / LCDLinux Lokationsdata M MalwareMan-in-the-middle (MitM)Multi-factor AuthenticationMobile Design Management N Network segmentationNext-Generaxion Firewall O OAuthOpen Source OSI – Modellen OS (Operativsystem) P Patch Patch management Password Salting Penetration test Phishing Physical security Privacy By Design Q QoS (Quality og Service)QR-kode R RansomwareRedundancy / RedundansReverse EngineeringRisk assessmentRisk managementRootkit S Sandboxing SAML Secure Boot Secure Development Lifecycle Secure Shell Security Operations Center SIEM – Security Information and Event Management Sniffing Social Engineering Social Media Security Software-Defined Networking Spoofing SQL-injektion SSL / TLS T TokenizationThreatThreat HuntingThreat IntelligenceTrojansk hestTwo-factor authentication U UbuntuUEFIURLUSBUTM V Virtualisering Virus Vishing VolP VPN Vulnerability W WANWhitelistingWi-FiWindowsWorm X XaaS Xbox XML Y YouTube Yottabyte Z Zero-day exploitZero-day sårbarhed