A
Access control
AD vs. Azure AD
Antivirus
Asset management
Authentication
Authorization
Attack Surface Reduction
B
Backdoor
BaaS
Behavioral Biometrics
Botnet
Big Data
Biometriske data
BI Værktøjer
Brute force
Buffer overflow
C
Captcha
Chain of Custody
Cloud Security
Compliance
Cookies
Cyberkill-chain
Cross-Site Scripting
D
Data Backup
Data encryption / Data kryptering
Data Loss Prevention
Data Masking
Data Warehouse
Dark Web
DDos
Demilitarized Zone
De-identification
Deep Packet Inspection
Deep Pack Review
Denial-of-service (DoS)
Digital Foodprint
Digital Signatur
Disaster Recovery
Disaster Recovery Plan
DNS
DOS
DRaaS
E
Encryption
Encryption key
Endpoint detection and response (EDR)
F
FIDO2
File integrity monitoring (FIM)
Firewall
Firewall evasion
Fuzzing
G
Gateway
Github
GDPR
G Suite
H
Hashing
Honeypot
Hosting
HTTPS
Hybrid Cloud
I
Identity and access management (IAM)
Identity Federation
IDS
Incident respons
Information security policy
Internet of Things (IoT)
Intrusion Prevention
Insider Threat
IP-adresse
IT-compliance
J
Jailbreaking
JavaScript
JPEG
K
Kernel
Keylogger
Kryptering
L
LAN (Local Area Network)
Latency
LED / LCD
Linux
Lokationsdata
M
Malware
Man-in-the-middle (MitM)
Multi-factor Authentication
Mobile Design Management
N
Network segmentation
Next-Generaxion Firewall
O
OAuth
Open Source
OSI – Modellen
OS (Operativsystem)
P
Patch
Patch management
Password Salting
Penetration test
Phishing
Physical security
Privacy By Design
Q
QoS (Quality og Service)
QR-kode
R
Ransomware
Redundancy / Redundans
Reverse Engineering
Risk assessment
Risk management
Rootkit
S
Sandboxing
SAML
Secure Boot
Secure Development Lifecycle
Secure Shell
Security Operations Center
SIEM – Security Information and Event Management
Sniffing
Social Engineering
Social Media Security
Software-Defined Networking
Spoofing
SQL-injektion
SSL / TLS
T
Tokenization
Threat
Threat Hunting
Threat Intelligence
Trojansk hest
Two-factor authentication
U
Ubuntu
UEFI
URL
USB
UTM
V
Virtualisering
Virus
Vishing
VolP
VPN
Vulnerability
W
WAN
Whitelisting
Wi-Fi
Windows
Worm
X
XaaS
Xbox
XML
Y
YouTube
Yottabyte
Z
Zero-day exploit
Zero-day sårbarhed