Cyber Glossary
Our cyber clossary will help you learn more about cybersecurity topics
We offer a range of advanced security features, such as intrusion prevention, content filtering, and web application firewall. These features help to ensure that your network is protected against all types of cyber threats, no matter where they originate
SafeUTM empowers its customers to take on the increasing performance requirements of the borderless network, both today and in the future
SafeUTM's Cyber Glossary provides a comprehensive list of technical terms used in the field of cybersecurity. Use SafeUTM's growing library to improve your understanding of cybersecurity concepts
Cyber Glossary
Access control involves managing and regulating who can access resources or data within a system. It includes authentication to verify user identity and authorization to determine what actions they are allowed to perform.
Access control
APT is a sophisticated and targeted cyber attack strategy where skilled attackers infiltrate a specific target over a prolonged period. They use advanced techniques, such as custom malware and social engineering, to gain unauthorized access, maintain persistence, and steal valuable information without detection
Advanced Persistent Threat (APT)
Adware is software that displays advertising content, often intrusively, to generate revenue for developers. It is typically bundled with free software and can impact user experience or compromise privacy.
Anti-malware software detects, prevents, and removes malicious software (malware) from computer systems. It employs techniques like signature-based detection and behavioral analysis to protect systems from viruses, worms, Trojans, ransomware, and spyware.
Authentication is the process of verifying the identity of a user or entity trying to access a system. It confirms that the claimed identity matches the actual identity using methods like passwords, biometrics, or security tokens.
Authorization determines the permissions and privileges granted to authenticated users based on their verified identity. It ensures users have appropriate access rights to resources and systems, following security policies and access control rules.
Attack surface refers to all the possible entry points and vulnerabilities that attackers can exploit in a system or network. It includes interfaces, protocols, applications, and hardware components, and a larger attack surface increases the risk of successful attacks.
Attack surface

An attack vector is the specific method or pathway used by attackers to launch a cyber attack. It can involve techniques like phishing emails, malware-infected attachments, network exploits, or social engineering to exploit vulnerabilities in a target system.
Attack vector
Want to get the WHOLE glossary?
Leave us your email and we'll send you the file
By clicking the button you agree to our Privacy Policy