Security terminology

Glossary of Computer & Information Security Terms

Concise definitions used in defensive cybersecurity, vulnerability management, and incident response.

TermDefinition
CIA triadConfidentiality, Integrity, Availability — core security objectives.
VulnerabilityA weakness that could be used to violate security goals.
Patch managementProcess for testing and deploying updates to remediate vulnerabilities.
Zero TrustModel that assumes no implicit trust; access is continuously verified.
MFAMulti-factor authentication using two or more independent factors.
IAMIdentity and Access Management; control of identities and permissions.
SIEMCentralized log collection and correlation for detection and investigation.
EDREndpoint Detection and Response; endpoint telemetry and response tooling.
Threat modelingStructured approach to identify threats and mitigations during design.
CVE / NVDVulnerability identifiers (CVE) and database with metadata (NVD).
KEVCatalog of vulnerabilities known to be exploited in the wild (CISA).
ATT&CKKnowledge base describing adversary tactics and techniques.
SBOMInventory of software components for supply-chain visibility.
Incident responseDetect, contain, eradicate, and recover from security incidents.

Further reading