Cybersecurity English
Cybersecurity English Glossary
677 professional cybersecurity english terms with definitions, pronunciation and examples. Learn what each term means — free with Termify.
B
- Bài tập Tabletop la gi? A discussion-based incident response simulation where team members review and role-play their actions and decisions for ...
- Báo cáo khắc phục la gi? A formal document detailing the corrective actions taken to address identified cryptographic or PKI vulnerabilities, inc...
- Báo cáo rủi ro la gi? The process of collecting, analyzing, and communicating information about risk exposures, controls, and mitigation activ...
- Báo Cáo Sự Cố la gi? The formal process of documenting and communicating information about detected security incidents to relevant stakeholde...
- Báo cáo Sự cố la gi? The formal process of documenting and communicating the details of a cybersecurity incident to relevant stakeholders, re...
- Báo cáo sự cố la gi? The formal communication process for notifying internal or external authorities about detected security incidents, as re...
- Báo cáo tuân thủ la gi? The process of preparing and delivering evidence-based reports to demonstrate adherence to regulatory, legal, and contra...
- Bản tóm tắt thông điệp la gi? A fixed-length, unique output value generated by applying a cryptographic hash function to a message, used for verifying...
- Bảng điều khiển rủi ro la gi? A real-time interface that aggregates, visualizes, and monitors PKI or cryptographic risks, vulnerabilities, and remedia...
- Bảng điều khiển tuân thủ la gi? A real-time visualization tool that aggregates and displays the status of cryptography and PKI controls, risks, incident...
- Bảo mật chuyển tiếp la gi? A cryptographic property ensuring that the compromise of long-term keys does not compromise past session keys, providing...
- Bảo Mật Container Ứng Dụng la gi? Practices and controls for securing containerized applications and environments, including image scanning, runtime prote...
- Bảo mật máy tính để bàn ảo la gi? Practices, controls, and technologies used to secure virtual desktop infrastructure (VDI) and virtual desktops in cloud ...
- Bảo mật Service Mesh la gi? A set of controls, policies, and tools for ensuring secure communication, authentication, and authorization between micr...
- Bảo mật tầng truyền tải la gi? A cryptographic protocol designed to provide secure communication over a computer network, protecting data in transit vi...
- Bảo mật điểm trao đổi Internet la gi? The collective security controls, policies, and operational measures implemented at an Internet Exchange Point (IXP) to ...
- Bảo Toàn Bằng Chứng la gi? The controlled process of securing, documenting, and protecting digital or physical evidence to maintain integrity for i...
- Bảo vệ chống giả mạo điểm cuối la gi? A security feature that prevents unauthorized users or malware from disabling, modifying, or bypassing endpoint security...
- Bảo vệ chống phát lại bản mã la gi? A security mechanism that detects and blocks the reuse of captured ciphertext to prevent replay attacks in encrypted com...
- Bảo vệ cấp giao diện la gi? A security control that enforces policy, filtering, or access restrictions at a specific network interface, segmenting a...
- Bảo Vệ Metadata Instance la gi? A security control that prevents unauthorized access to the metadata service of virtual machine or container instances, ...
- Bảo vệ phát lại phiên la gi? Controls and mechanisms designed to prevent attackers from capturing and reusing legitimate session tokens or data packe...
- Bảo Vệ Trước Mối Đe Dọa API la gi? A set of security mechanisms designed to detect, block, and mitigate malicious activity targeting application programmin...
- Bất thường hành vi mạng la gi? An observed deviation from established patterns of normal network activity that may indicate the presence of malicious a...
- Bằng chứng giảm thiểu la gi? Documented proof that specific technical or administrative actions have effectively addressed and reduced the risk of cr...
- Bằng chứng khắc phục la gi? Documented proof that a PKI or cryptographic vulnerability or deficiency has been addressed and corrective actions were ...
- Bề mặt tấn công la gi? The sum of all points in a cryptographic or PKI environment where an unauthorized user could attempt to enter data, extr...
- Bọc hàm không máy chủ la gi? The security practice of encapsulating serverless functions within wrappers or middleware to enforce policy, perform inp...
- Bối cảnh mối đe dọa la gi? The evolving set of potential threats, adversary capabilities, and attack vectors relevant to cryptographic and PKI ecos...
- Bộ mã hóa la gi? A named set of cryptographic algorithms used to negotiate security settings in network protocols like TLS, including key...
- Bộ thu thập lưu lượng vải hiển thị la gi? A hardware or virtual device that creates a copy of network traffic for out-of-band monitoring, analytics, and security ...
- Bộ xử lý mã hóa la gi? A hardware device or chip specifically designed to perform cryptographic operations such as encryption, decryption, sign...
C
- CA cấp dưới la gi? A Certificate Authority (CA) that is certified and authorized by a root or higher-level CA to issue digital certificates...
- Chia sẻ chỉ báo tự động la gi? The automatic exchange of cyber threat indicators between organizations and trusted partners using standardized formats ...
- Chia sẻ tài nguyên không hợp lệ la gi? A security risk where system resources are shared without proper isolation or access controls, leading to unintended dat...
- Chiến dịch đánh lừa mạng la gi? Deliberate use of decoys, traps, and misinformation within an organization's environment to detect, divert, and analyze ...
- Chiến lược an ninh la gi? A high-level plan that defines how an organization will protect its information assets, meet regulatory obligations, and...
- Chiến lược giảm thiểu la gi? A structured approach involving technical, administrative, or procedural controls to reduce the likelihood or impact of ...
- Chiến lược hạn chế API la gi? A structured approach to limit the number of API requests made by a client or IP within a specified timeframe, preventin...
- Chiến lược ngăn chặn la gi? A set of planned actions and measures taken to limit the spread and impact of a cybersecurity incident, preventing furth...
- Chiến lược Phòng thủ Nhiều lớp la gi? An approach that uses multiple, overlapping security controls at different layers (network, application, endpoint) to pr...
- Chu vi xác định bằng phần mềm la gi? A cybersecurity framework that dynamically creates one-to-one network connections between users and resources using iden...
- Chuyển cấp sự cố la gi? The formal process of transferring a detected security incident to higher-level personnel or specialized teams for furth...
- Chuyển cấp vụ việc la gi? The process of transferring a security incident or case to a higher-level team or authority due to severity, complexity,...
- Chuyển tiếp gói tin an toàn la gi? The practice of transmitting data packets across networks in a manner that maintains confidentiality, integrity, and aut...
- Chuyển tiếp phân đoạn vi dịch vụ la gi? A network architecture approach in which communications between microservices are isolated into distinct, secured segmen...
- Chuyển đổi chứng chỉ la gi? The managed transition from an expiring or old certificate to a new certificate in a way that minimizes service interrup...
- Chuẩn an ninh cơ bản la gi? A set of minimum security controls and configurations established for cryptographic or PKI systems to ensure compliance ...
- Chuẩn bảo mật cơ bản la gi? A documented set of minimum security controls or configurations established as a standard for systems, services, or proc...
- Chuỗi bảo quản chứng cứ la gi? A formal process documenting the chronological handling, transfer, and control of digital evidence, ensuring its integri...
- Chuỗi chứng chỉ la gi? An ordered sequence of certificates, from an end-entity certificate up to the root authority, each certifying the next i...
- Chuỗi khai thác la gi? The sequential use of multiple exploits to bypass security mechanisms and gain unauthorized access to cryptographic or P...
- Chuỗi tấn công la gi? A sequence of steps or techniques used by threat actors to exploit cryptographic or PKI weaknesses, progressing from ini...
- Chèn mã động la gi? The process of inserting monitoring hooks or logic into running code to analyze application behavior, detect anomalies, ...
- Chính sách bảo mật không máy chủ la gi? A set of security controls and guidelines specifically designed to protect serverless computing architectures by restric...
- Chính sách chia sẻ tài nguyên la gi? A set of security rules and access controls governing how digital resources such as data, storage, and APIs are shared a...
- Chính sách chứng chỉ la gi? A set of rules and practices that indicates the applicability of a certificate to a particular community or class of app...
- Chính sách chữ ký la gi? A set of technical and procedural requirements governing the creation, validation, and management of digital signatures ...
- Chính sách cách ly điểm cuối la gi? A defined set of rules for isolating endpoints that exhibit suspicious or non-compliant behavior to prevent them from ac...
- Chính sách cô lập workload la gi? A security policy that enforces strict logical and sometimes physical separation of workloads to prevent unauthorized ac...
- Chính sách cấp phát la gi? A formal document or set of rules that defines the procedures and requirements for issuing digital certificates within a...
- Chính sách danh sách trắng ứng dụng la gi? A security control that restricts the execution of software to only pre-approved applications, preventing unauthorized o...
- Chính sách kiểm dịch điểm cuối la gi? A formalized set of procedures and controls for isolating endpoints exhibiting signs of compromise or non-compliance fro...
- Chính sách lưu trữ la gi? A documented set of rules defining how long information or records must be retained to comply with regulatory, legal, or...
- Chính sách Phân đoạn Vi mô la gi? A set of rules that define fine-grained network zones and enforce isolation between workloads to limit lateral movement.
- Chính sách quản lý thông tin xác thực la gi? A formal set of rules and procedures for creating, storing, rotating, and revoking authentication credentials to ensure ...
- Chính Sách Truy Cập Có Điều Kiện la gi? A security rule that grants or blocks access to resources based on specific conditions such as user location, device pos...
- Chính sách Tường lửa Máy chủ la gi? A defined set of rules and configurations that control inbound and outbound network traffic at the individual host or VM...
- Chính Sách Vi Phân Đoạn la gi? A granular security approach that divides networks into isolated segments at the workload or application level, enforcin...
- Chấm điểm rủi ro la gi? The process of quantifying and prioritizing risks by assigning numerical or qualitative values based on likelihood, impa...
- Chấm điểm rủi ro la gi? The quantitative or qualitative assignment of a value to a risk, based on the likelihood and impact of vulnerabilities w...
- Chấm điểm rủi ro động la gi? A continuous process that calculates the real-time security risk posed by users, devices, or applications based on behav...
- Chấp nhận rủi ro la gi? A formal decision to acknowledge and accept the consequences of a specific risk, typically documented and approved by au...
- Chấp nhận rủi ro la gi? The formal decision to tolerate a known risk in cryptographic or PKI systems, typically documented through risk manageme...
- Chặn lưu lượng độc hại la gi? Automated or manual actions taken to identify and prevent the flow of network traffic identified as malicious, including...
- Chặn script độc hại la gi? The detection and prevention of unauthorized, harmful scripts (such as JavaScript, PowerShell, or macros) from executing...
- Chỉ số phơi nhiễm la gi? A quantitative value representing the degree of risk, visibility, or attack surface present in PKI or cryptographic asse...
- Chỉ số rủi ro la gi? A measurable signal or metric used to identify, quantify, or monitor risks affecting cryptographic or PKI assets, suppor...
- Chỉ định VLAN kiểm dịch la gi? The process of isolating endpoints identified as compromised or non-compliant by assigning them to a dedicated VLAN with...
- Chống lượng tử la gi? The property of cryptographic algorithms to withstand attacks by quantum computers, typically achieved by using post-qua...
- Chủ quyền dữ liệu la gi? The concept that digital data is subject to the laws and governance structures within the nation where it is collected o...
- Chủ Thể Dữ Liệu la gi? An individual whose personal data is collected, held or processed by a data controller or processor as defined by privac...
- Chứng chỉ CA la gi? A digital certificate issued to a Certificate Authority, used to sign and validate other digital certificates within a P...
- Chứng chỉ gốc la gi? A self-signed digital certificate that identifies a trusted Certificate Authority (CA) at the apex of a certification ch...
- Chứng chỉ thiết bị la gi? A digital certificate issued to a device (such as a server, router, or IoT component) to authenticate its identity withi...
- Chứng chỉ thuộc tính la gi? A digital certificate that binds attribute information (such as roles or permissions) to a subject, separate from the id...
- Chứng chỉ tự ký la gi? A digital certificate that is signed by the same entity whose identity it certifies, rather than by a trusted Certificat...
- Chứng nhận sức khỏe điểm cuối la gi? A process by which the health state of an endpoint device is cryptographically measured and validated before it is allow...
- Chứng nhận truy cập la gi? A formal, periodic review process in which managers or data owners attest that users have the appropriate levels of acce...
- Cách ly giữa các tenant la gi? Security controls that strictly separate data, processes, and resources among different tenants in multi-tenant cloud or...
- Cách ly hệ điều hành khách la gi? The practice of isolating virtual machines (guests) from each other and from the host system to prevent unauthorized acc...
- Cách ly máy chủ la gi? The process of removing a compromised or suspicious host from the network to prevent lateral movement and further compro...
- Cách ly máy chủ để ngăn chặn la gi? A network defense strategy to restrict or cut off network access for a compromised or suspicious host to prevent lateral...
- Cách ly phiên đặc quyền la gi? The separation and monitoring of administrative sessions from standard user sessions to prevent misuse of privileged acc...
- Cách Ly Thời Gian Chạy Container la gi? A set of controls and configurations that ensure each running container is logically and physically separated from other...
- Cô lập trình duyệt từ xa la gi? A security technique in which a user’s web browsing session is executed on a remote server, isolating all web content fr...
- Công bố lỗ hổng bảo mật la gi? The process by which security vulnerabilities are reported to the relevant organization, vendor, or public, typically fo...
- Công cụ mối đe dọa la gi? An automated software module that aggregates, analyzes, and correlates threat intelligence related to cryptographic or P...
- Căn chỉnh quy định la gi? The degree to which organizational controls, processes, and policies conform to laws, regulations, and relevant industry...
- Cơ chế đăng xuất không đúng la gi? A logout process that fails to fully invalidate all session tokens and authentication artifacts, allowing potential sess...
- Cơ quan chính sách la gi? An entity within a PKI or trust framework responsible for defining, governing, and maintaining security and operational ...
- Cơ quan xác thực la gi? A trusted service or entity that provides real-time or historical status information about digital certificates, typical...
- Cơ sở dữ liệu lỗ hổng la gi? A centralized, authoritative repository cataloging known cryptographic and PKI-related vulnerabilities, including CVEs, ...
- Cảm biến thu thập luồng la gi? A network device or software agent that passively gathers, aggregates, and forwards network flow records (such as NetFlo...
- Cảnh Báo An Ninh la gi? Automated or manual notification process by which a security system or analyst informs relevant personnel of detected su...
- Cảnh báo cấu hình sai tài nguyên la gi? Automated notification generated when a cloud resource, such as storage or compute, is configured in a way that exposes ...
- Cảnh báo leo thang đặc quyền la gi? The process of generating real-time alerts whenever a user or process attempts to gain higher-level access than authoriz...
- Cảnh báo rò rỉ dữ liệu la gi? The real-time detection and notification of unauthorized attempts to transfer sensitive or regulated data out of protect...
- Cấp phát người dùng la gi? The process of creating, managing, and assigning user accounts and privileges within an organization's IT systems in acc...
- Cấp Quyền Quá Mức la gi? A security misconfiguration where a user or entity is assigned more access rights than necessary, violating the principl...
- Cấu hình bảo mật sai la gi? A common vulnerability where systems, servers, or applications are deployed with insecure default settings, incomplete c...
- Cấu hình bảo mật sai la gi? A failure to implement correct or secure settings in cryptographic, PKI, or network assets, resulting in exposure to exp...
- Cấu hình chuẩn bảo mật la gi? A documented set of secure settings and parameters for systems or applications, serving as a reference point for complia...
- Cặp khóa la gi? A set of two mathematically linked cryptographic keys, typically consisting of a public key for encryption/verification ...
- Cổng biên giới bảo mật la gi? A security-hardened network device or configuration that manages and filters traffic entering or leaving the network per...
- Cổng bảo mật API la gi? A dedicated service or device that provides centralized security controls for APIs, including authentication, authorizat...
- Cổng dịch vụ honeypot la gi? A dedicated network gateway or proxy that directs traffic to and from honeypot resources, isolating deceptive assets fro...
- Cổng email bảo mật la gi? A dedicated security appliance or cloud service that monitors, filters, and blocks malicious email content (spam, phishi...
- Cổng Mã Hóa Đám Mây la gi? A security appliance or service that encrypts sensitive data before it is transferred to cloud services, ensuring confid...
- Cổng truy cập từ xa la gi? A secured network device or service that brokers and controls remote user access to internal organizational resources, e...
- Cửa sổ khai thác la gi? The period between public disclosure of a cryptographic or PKI vulnerability and the application of effective remediatio...
- Cửa sổ phơi nhiễm la gi? The time period during which cryptographic or PKI assets remain susceptible to exploitation due to the existence of unpa...
D
- Danh mục mối đe dọa la gi? A structured and curated inventory of recognized PKI or cryptographic threats, attack vectors, and related mitigation st...
- Danh sách khai thác la gi? An authoritative and frequently updated catalog of all known exploits that could target cryptographic or PKI assets, inc...
- Danh sách kiểm soát truy cập la gi? A table or data structure used to specify permissions attached to system objects, defining which users or processes are ...
- Danh sách thu hồi JWT la gi? A security control that maintains a list of invalidated JSON Web Tokens (JWTs), preventing previously issued tokens from...
- DDoS tầng ứng dụng la gi? A type of distributed denial-of-service attack that targets the application layer (OSI Layer 7) with malicious HTTP or A...
- Dòng thời gian sự cố la gi? A detailed chronological record of all events, actions, and system states related to a security incident, used for inves...
- Dấu vết kiểm toán la gi? A chronological record of system activities and user actions, providing documented evidence to support accountability, t...
- Dấu vết kiểm toán không đủ la gi? A deficiency in logging or tracking system activities that undermines the ability to reconstruct security events, invest...
- Dẫn xuất khóa la gi? A cryptographic process for generating one or more secret keys from a shared secret or password using a deterministic fu...
- Dịch vụ cách ly trình duyệt la gi? A security control that runs browser sessions in isolated, remote containers or sandboxes to protect endpoints from web-...
- Dịch vụ cô lập trình duyệt la gi? A security mechanism that isolates end-users’ web browsing activity from the endpoint or corporate network by running br...
- Dịch Vụ Quản Lý Khóa la gi? A centralized service or system that creates, stores, rotates, and manages cryptographic keys used for securing data at ...
- Dịch vụ token hóa la gi? A security process or managed solution that replaces sensitive data elements with non-sensitive equivalents (tokens), of...
- Dịch vụ đăng ký la gi? A trusted PKI component that manages requests for digital certificates, validates identity, and issues or renews certifi...
G
- Ghi lại phiên đặc quyền la gi? The logging and monitoring of all actions performed during privileged sessions, such as administrative or root access, t...
- Ghi Nhật Ký Hoạt Động Đám Mây la gi? The process of capturing, storing, and analyzing logs of user actions, system events, and resource access within cloud e...
- Ghi nhật ký kiểm toán la gi? The process of recording security-related events, operations, or accesses within a cryptographic or PKI environment to p...
- Ghi nhật ký kiểm toán la gi? The systematic recording of events and user actions in information systems to enable traceability, accountability, and f...
- Ghi nhật ký sự kiện bảo mật la gi? The systematic recording of security-related activities, alerts, and incidents within systems or networks to support det...
- Ghi Nhật Sự Cố la gi? The systematic recording of incident details, timelines, actions taken, and outcomes to ensure transparency, facilitate ...
- Ghim chứng chỉ la gi? A security technique that restricts which certificates are considered valid for a particular service or domain, by stori...
- Ghim chứng chỉ đám mây la gi? A security technique that restricts applications or devices to accept only specific trusted certificates or public keys ...
- Gia hạn chứng chỉ la gi? The process of issuing a new certificate for an entity before the expiration of the current certificate, maintaining con...
- Giao Thức Liên Kết Danh Tính la gi? A standardized mechanism allowing multiple organizations or domains to securely share and validate user identities using...
- Giao thức xác thực từ xa la gi? A cryptographic protocol that enables a verifier to remotely validate the integrity and trustworthiness of a device or s...
- Giao Tiếp Sự Cố la gi? The timely and coordinated exchange of information about an incident’s status, impact, and response among internal teams...
- Giá trị nonce la gi? A randomly or pseudo-randomly generated number used only once in a cryptographic communication to prevent replay attacks...
- Giá trị salt la gi? A random value added to data, typically passwords, before hashing to ensure that identical inputs produce different hash...
- Giám sát an ninh la gi? The ongoing supervision and review of security policies, controls, and processes to ensure effective risk management and...
- Giám sát an ninh la gi? Continuous observation, collection, and analysis of security events and data across information systems to detect threat...
- Giám Sát Liên Tục la gi? Ongoing real-time observation and analysis of security controls and risks to ensure timely detection of threats and comp...
- Giám sát lạm dụng API la gi? Continuous observation and analysis of API traffic to detect misuse patterns, abuse, or automated attacks, such as scrap...
- Giám sát truy cập thông tin xác thực la gi? The process of continuously tracking, analyzing, and alerting on access to credentials (passwords, tokens, secrets) in o...
- Giám sát tuân thủ la gi? Ongoing supervision and review of an organization's compliance with laws, regulations, policies, and contractual obligat...
- Giám Sát Tuân Thủ Liên Tục la gi? The ongoing process of automatically assessing systems, configurations, and user activities to ensure adherence to regul...
- Giám sát tính toàn vẹn máy chủ la gi? Continuous assessment of a host system’s files, processes, and configurations to detect unauthorized changes, tampering,...
- Giám sát Đông-Tây la gi? Continuous inspection and analysis of lateral (intra-network) data flows within an organization's internal environment t...
- Giám định số la gi? The discipline of identifying, preserving, analyzing, and documenting digital evidence from electronic devices to suppor...
- Giải tuần tự không an toàn la gi? A vulnerability where untrusted or tampered data is deserialized without proper validation, potentially leading to remot...
- Giảm bán kính ảnh hưởng la gi? Limiting the potential impact of a security breach by isolating assets and implementing controls that constrain the effe...
- Giảm nhẹ chuyển hướng mở la gi? Security controls that detect and prevent web applications from redirecting users to untrusted external URLs, reducing t...
- Giảm Nhẹ Sự Cố la gi? Targeted actions taken to reduce the immediate and long-term impact of a security incident, including containment, eradi...
- Giảm nhẹ tấn công phát lại la gi? Security controls implemented to detect and prevent replay attacks, where previously valid data transmissions are malici...
- Giảm thiểu khai thác la gi? Technical and procedural controls implemented to reduce or eliminate the risk of exploitation of vulnerabilities in cryp...
- Giảm thiểu mối đe dọa dai dẳng la gi? A set of proactive and reactive controls aimed at detecting, containing, and eradicating advanced persistent threats (AP...
- Giảm thiểu mối đe dọa tự động la gi? The use of automated controls, tools, and workflows to detect, respond to, and neutralize cyber threats in real time, mi...
- Giảm thiểu rủi ro la gi? The application of technical, administrative, or physical controls in cryptographic and PKI environments to lower the li...
- Giảm Thiểu Thoát Hypervisor la gi? A set of security controls and techniques that prevent or detect attempts by virtual machines to break out of hypervisor...
- Giới hạn tốc độ API la gi? A security control mechanism that restricts the number of API requests from a user or client within a specified timefram...
- Giới hạn tốc độ không hợp lệ la gi? A security weakness where APIs or web services do not sufficiently restrict the frequency or volume of requests, allowin...
- Giới hạn đối tượng JWT la gi? A security control ensuring a JWT token is only accepted by the intended recipients (audiences), preventing token reuse ...
- Giữ pháp lý la gi? A directive to preserve all forms of relevant information when litigation or investigation is reasonably anticipated.
- Gán mối đe dọa la gi? Threat Attribution is the analytical process of linking a detected cyber threat, campaign, or incident to a specific act...
- Gói khóa la gi? The process of encrypting one cryptographic key with another key to securely transport or store keys, typically used for...
- Gõ cổng động la gi? A security technique requiring a dynamic, pre-defined sequence of connection attempts to specific ports before granting ...
- Gắn Thẻ Tài Nguyên Đám Mây la gi? The process of assigning metadata labels to cloud resources to facilitate access management, cost allocation, compliance...
- Gắn thời gian cho gói tin la gi? The process of attaching accurate time information to network packets for logging, monitoring, forensic analysis, and la...
- Gốc tin cậy phần cứng la gi? A cryptographic foundation embedded in hardware (e.g., TPM, HSM, or secure enclave) that provides immutable security anc...
H
- Hiến Chương An Ninh la gi? A formal document that defines the scope, authority, and responsibilities of the security function within an organizatio...
- Hoạt động An ninh la gi? All coordinated activities performed in a Security Operations Center (SOC) to monitor, detect, investigate, and respond ...
- Hành động khắc phục la gi? Steps taken to eliminate the cause of a detected security incident, restore affected systems, and strengthen defenses to...
- Hành động khắc phục la gi? A specific corrective step taken to address a vulnerability, nonconformity, or security finding in cryptographic or PKI ...
- Hạ tầng PKI la gi? A system of hardware, software, policies, and procedures needed to create, manage, distribute, use, store, and revoke di...
- Hạn chót khắc phục la gi? The maximum time allowed to fully address a vulnerability or nonconformity in PKI or cryptographic environments, as defi...
- Hạn Chế API Đặc Quyền la gi? Controls that limit access to sensitive API endpoints or functions to only those users or services with explicit privile...
- Hội đồng giám sát la gi? A governing committee or group responsible for strategic direction, oversight, and monitoring of the organization’s risk...
K
- Khai thác gán hàng loạt la gi? A vulnerability where an attacker assigns values to object properties that should not be directly set by the user, often...
- Kho root la gi? A trusted repository of root CA certificates used by operating systems and applications to validate the trustworthiness ...
- Kho tin cậy la gi? A repository of trusted root and intermediate certificates used by applications and systems to verify the authenticity o...
- Kho tấn công la gi? A comprehensive, regularly updated list or database of all known attack techniques, tools, or vectors relevant to crypto...
- Khoảng trống bảo mật la gi? A missing or insufficient security control in cryptographic or PKI systems that exposes assets to risk, noncompliance, o...
- Khoảng trống quy định la gi? Any deficiency or mismatch between current organizational controls, policies, or processes and those required by relevan...
- Khung bảo mật chuyển tiếp la gi? A cryptographic protocol property ensuring that compromise of long-term keys does not compromise past session keys, as r...
- Khung chính sách la gi? A structured set of overarching policies, standards, and guidelines that governs how information security, compliance, a...
- Khung kiểm soát la gi? A structured set of governance, risk, and compliance (GRC) policies, processes, and controls aligned to industry standar...
- Khung tin cậy la gi? A formal structure of policies, roles, rules, and standards that define how trust is established, maintained, and evalua...
- Khung trách nhiệm giải trình la gi? A structured set of responsibilities, roles, and processes that ensure individuals and teams are answerable for security...
- Khung tuân thủ la gi? An integrated system of standards, guidelines, and procedures designed to help an organization meet all relevant legal, ...
- Khám phá kiểm kê tài sản la gi? The process of systematically identifying, cataloging, and updating all IT and OT assets within an organization's enviro...
- Khám phá tài sản la gi? The process of identifying and cataloging all PKI, cryptographic, or supporting assets within an organizational environm...
- Khám phá điểm cuối API la gi? The process of identifying available API endpoints, often through automated tools or by analyzing documentation and appl...
- Khóa chia sẻ trước la gi? A symmetric key distributed to and shared by parties before communication begins, commonly used in VPNs, Wi-Fi WPA2-PSK,...
- Khóa chủ thể la gi? The cryptographic public key associated with the subject of a digital certificate, used to verify signatures or encrypt ...
- Khóa công khai la gi? The openly distributed cryptographic key in an asymmetric key pair, used to verify digital signatures or encrypt data fo...
- Khóa nhà phát hành la gi? The private key held by a Certificate Authority (CA) or issuer used to sign digital certificates and assert trust in a P...
- Khóa phiên la gi? A temporary symmetric key used for a single communication session, providing confidentiality and integrity for exchanged...
- Khóa riêng la gi? A confidential cryptographic key in an asymmetric key pair, used to sign or decrypt data, and must be kept secret to mai...
- Khóa tạm thời la gi? A cryptographic key generated for temporary use in a single session or operation, after which it is discarded and not re...
- Khóa đối xứng la gi? A cryptographic key used in symmetric encryption where the same key is used for both encryption and decryption operation...
- Khôi phục khóa la gi? A controlled process for restoring lost or inaccessible cryptographic keys, typically from a secure backup or escrow, fo...
- Khôi phục sự cố la gi? The coordinated set of actions taken to restore systems, operations, and services to normal functioning after a security...
- Khả năng phát hiện la gi? Detection Capability is the measure of an organization's ability to identify and recognize cyber threats, malicious acti...
- Khẩu vị rủi ro la gi? The level and type of risk an organization is willing to accept in pursuit of its objectives, as formally defined by sen...
- Khắc phục dựa trên chính sách la gi? Automated or manual corrective actions triggered by predefined policies to mitigate detected security incidents or confi...
- Khẳng định đã ký la gi? A digital statement or claim, such as an authentication response or attribute, that is cryptographically signed to ensur...
- Kiến trúc DNS chịu lỗi la gi? A DNS infrastructure designed for high availability, redundancy, and resistance to attacks or failures, ensuring continu...
- Kiến trúc Niềm tin Tuyệt đối la gi? A security model centered on the assumption that no user or device, inside or outside the network perimeter, is trusted ...
- Kiến Trúc Zero Trust la gi? A security model based on the principle that no user, device, or network component should be trusted by default. Enforce...
- Kiến trúc Zero Trust la gi? A security model that assumes no implicit trust is granted to systems or users inside or outside the network; verificati...
- Kiểm kê tài sản la gi? A comprehensive list of all information assets within an organization, including hardware, software, data, and supportin...
- Kiểm kê tài sản la gi? A comprehensive, up-to-date record of all hardware, software, certificates, cryptographic modules, and other PKI-relevan...
- Kiểm kê tài sản không hợp lệ la gi? A failure to maintain a complete, accurate, and up-to-date list of all hardware, software, and cloud assets, leading to ...
- Kiểm soát bộ nhớ đệm không đúng la gi? Failure to configure cache settings securely, leading to the unintended storage or exposure of sensitive data in shared ...
- Kiểm soát chuẩn hóa đầu vào la gi? Processes that convert various possible input formats to a standard, canonical form before validation, helping to preven...
- Kiểm soát ghi log nhạy cảm la gi? Procedures and mechanisms to ensure that confidential or regulated information is never written to logs, reducing the ri...
- Kiểm soát giảm nhẹ la gi? A technical or procedural safeguard implemented to reduce the likelihood or impact of cryptographic or PKI-related risks...
- Kiểm Soát Instance Ngắn Hạn la gi? Security controls and automation for governing short-lived, temporary compute instances to prevent persistence, limit at...
- Kiểm Soát Mạo Danh Người Dùng la gi? Mechanisms and safeguards that prevent or detect unauthorized use of a legitimate user's identity within a system or app...
- Kiểm soát nơi lưu trữ dữ liệu la gi? Policies and technical mechanisms that ensure organizational data is stored, processed, and managed in specific legal or...
- Kiểm soát phản ứng sự cố la gi? The process of isolating or restricting the impact of an active security incident to prevent further spread, as describe...
- Kiểm soát phần mềm độc hại la gi? Malware Containment is the set of actions and controls enacted to isolate and prevent the spread of malicious software w...
- Kiểm soát sự cố la gi? The actions taken to limit the impact of a security incident by isolating affected systems, preventing lateral movement,...
- Kiểm soát thay đổi la gi? A formal process used to ensure that all modifications to systems, processes, or documents are introduced in a controlle...
- Kiểm soát truy cập bị hỏng la gi? A critical security flaw where access restrictions are incorrectly implemented, enabling users to perform actions or acc...
- Kiểm Soát Truy Cập Lưu Trữ la gi? Policies and mechanisms that restrict and monitor access to data storage systems, ensuring only authorized users or appl...
- Kiểm soát truy cập thích ứng la gi? A dynamic security mechanism that adjusts access decisions in real-time based on user behavior, device health, risk cont...
- Kiểm soát tuân thủ la gi? A specific policy, process, or technical measure implemented to ensure an organization meets applicable legal, regulator...
- Kiểm thử bảo mật la gi? The process of evaluating cryptographic, PKI, and supporting systems for compliance with security requirements, through ...
- Kiểm thử xâm nhập la gi? An authorized and controlled simulated attack on cryptographic and PKI systems, conducted to identify exploitable vulner...
- Kiểm toán an ninh la gi? A formal, systematic review of an organization’s information systems, controls, and procedures to verify their effective...
- Kiểm toán bảo mật la gi? A formal, systematic review and verification of cryptographic and PKI processes, controls, and compliance with standards...
- Kiểm toán truy cập đám mây la gi? Systematic logging and analysis of access events in cloud environments to ensure compliance, detect anomalies, and suppo...
- Kiểm toán tuân thủ la gi? A systematic, independent review to determine whether activities and related results comply with planned arrangements, p...
- Kiểm tra entropy không đủ la gi? Failure to verify that cryptographic functions use sources of randomness with adequate entropy, increasing the risk of p...
- Kiểm tra lưu lượng mã hóa la gi? A process that enables the examination of encrypted network traffic to detect threats, enforce policies, and prevent dat...
- Kiểm tra thông tin xác thực la gi? The process of validating the strength, configuration, and authenticity of credentials used within cryptographic or PKI ...
- Kiểm tra tổng khóa la gi? A value derived from a cryptographic key using a checksum or hash algorithm, used to verify the integrity or correctness...
- Kênh bảo mật la gi? A communication path protected by cryptographic means, ensuring confidentiality, integrity, and authentication of data i...
- Kênh lệnh an toàn la gi? An encrypted, authenticated communication pathway used for transmitting privileged commands or control signals, as descr...
- Kênh điều khiển lệnh la gi? A communications channel used by attackers or malware to issue instructions to compromised hosts, or by defenders for au...
- Kế hoạch giám sát la gi? A documented approach outlining processes, tools, and responsibilities for continuously observing and assessing security...
- Kế Hoạch Giảm Thiểu la gi? A documented strategy detailing specific actions and controls to reduce the likelihood or impact of identified risks.
- Kế hoạch khắc phục la gi? A formal strategy that outlines actions, responsibilities, and timelines to correct identified security or compliance de...
- Kế hoạch khắc phục la gi? A documented set of actions designed to eliminate the root cause and effects of a security incident, restore affected sy...
- Kế hoạch khắc phục la gi? A documented set of actions, responsibilities, and timelines designed to resolve identified cryptographic or PKI vulnera...
- Kế hoạch ứng phó la gi? A documented strategy outlining procedures, roles, responsibilities, and communications for responding to cybersecurity ...
- Kết quả quét la gi? The output or findings generated by automated or manual scans of PKI or cryptographic systems for vulnerabilities, compl...
- Kịch bản tấn công la gi? A detailed narrative describing a potential attack vector or sequence of actions that a threat actor may use to exploit ...
- Kỹ thuật phát hiện la gi? The discipline of designing, implementing, and tuning security monitoring rules, analytics, and automation to identify t...
L
- Leo thang đặc quyền la gi? An attack or exploit in which a user or application gains higher access rights or privileges than intended by system pol...
- Leo thang đặc quyền la gi? The process by which a threat actor gains unauthorized elevated access rights within cryptographic or PKI systems.
- Liên kết mã thông báo la gi? A security mechanism where cryptographic tokens are cryptographically bound to a TLS connection, ensuring that tokens ca...
- Liên tục kinh doanh la gi? A holistic management process that identifies potential threats and ensures organizational resilience by planning for co...
- Liên đoàn Đám mây Lai la gi? The operational model enabling secure interoperability and resource management across multiple private and public cloud ...
- Liệt kê mạng la gi? The systematic identification and cataloging of networked assets, hosts, and services, including cryptographic and PKI i...
- Liệt kê tấn công la gi? The process of systematically identifying and cataloging all possible attack vectors and threat actors relevant to a cry...
- Luân chuyển khóa la gi? The scheduled process of replacing cryptographic keys with new keys to limit the period a compromised key can be misused...
- Luân chuyển khóa la gi? The scheduled or event-driven replacement of cryptographic keys in a system to reduce exposure from key compromise and e...
- Luân phiên khóa API la gi? The operational practice of periodically replacing and invalidating existing API keys to minimize the risk of key compro...
- Luồng xác thực bị hỏng la gi? A security flaw in authentication workflows allowing users to bypass, disrupt, or abuse login and identity verification ...
- Làm giàu cảnh báo la gi? The process of adding contextual information to security alerts, such as asset details, user context, or threat intellig...
- Làm sai lệch tài nguyên API la gi? The unauthorized modification or manipulation of API resources, typically by altering request parameters or payloads to ...
- Lưu ký khóa la gi? A key management process in which cryptographic keys are held in escrow by a trusted third party, enabling recovery unde...
- Lưu Trữ Bí Mật Không Đúng Cách la gi? A vulnerability where sensitive secrets, such as API keys or passwords, are stored in insecure locations, such as plaint...
- Lưu trữ dữ liệu la gi? The set of policies and procedures governing how long organizational data must be kept, archived, or deleted in complian...
- Lưu trữ khai thác la gi? A centralized and curated repository of documented exploits relevant to cryptographic or PKI environments, used for thre...
- Lưu Trữ Mã Hóa Bị Lỗi la gi? A vulnerability where sensitive data is improperly encrypted, decrypted, or stored using weak cryptographic algorithms, ...
- Lưu trữ nhật ký la gi? The process and policy of securely retaining security event and audit logs for a defined period to ensure availability f...
- Lưới bảo mật vi dịch vụ la gi? A distributed security framework that provides consistent identity, policy enforcement, and encrypted communication acro...
- Lưới đánh lừa phân tán la gi? A security architecture that uses distributed decoys, honeypots, and lures throughout the network or cloud to detect, de...
- Lược đồ chữ ký la gi? A cryptographic algorithm for creating and verifying digital signatures, specifying mathematical processes and key struc...
- Lạm dụng logic kinh doanh la gi? The exploitation of legitimate business logic in applications to gain unauthorized advantages, often bypassing technical...
- Lập bản đồ dữ liệu la gi? The structured process of identifying, documenting, and connecting the flow of data elements across systems, application...
- Lập bản đồ kiểm soát la gi? The process of linking controls to regulatory, policy, or framework requirements to demonstrate compliance and facilitat...
- Lập bản đồ quy trình la gi? A systematic technique for visually documenting and analyzing business or IT processes, their sequence, stakeholders, in...
- Lập bản đồ quy trình la gi? A structured method of visually documenting and analyzing processes, including their steps, controls, and responsible pa...
- Lập kế hoạch khả năng phục hồi la gi? The strategic process of designing and implementing measures to ensure an organization can adapt, recover, and continue ...
- Lắp ráp lại phân mảnh IP la gi? The process of reconstructing fragmented IP packets into their original form for delivery, inspection, or security analy...
- Lọc lưu lượng ra ngoài la gi? The process of monitoring and controlling outgoing network traffic to block unauthorized, malicious, or policy-violating...
- Lọc vectơ truy cập la gi? A network defense technique that restricts or monitors traffic based on access vectors such as protocol, port, and direc...
- Lỗ hổng tài sản la gi? A weakness in a cryptographic, PKI, or related system asset that could be exploited by a threat actor to compromise conf...
- Lỗi thời phiên bản API la gi? The process and risk associated with retiring or deprecating old API versions, often resulting in unsupported endpoints ...
- Lộ chức năng nhạy cảm la gi? A flaw where critical application functions, such as admin features or payment operations, are accessible to unauthorize...
M
- Ma Trận Rủi Ro la gi? A graphical tool that maps risk likelihood and impact to prioritize mitigation and support risk management decisions.
- Máy chủ chính sách NAC la gi? A core component of network access control (NAC) systems, responsible for evaluating endpoint posture, enforcing securit...
- Mã hóa hạ tầng mạng la gi? Encryption mechanisms applied to the entire data path within a network fabric, ensuring confidentiality and integrity of...
- Mã hóa lai la gi? A cryptographic approach that combines asymmetric and symmetric encryption to leverage the advantages of both for secure...
- Mã hóa lưu trữ đám mây la gi? The use of cryptographic techniques to protect data stored in cloud environments, ensuring confidentiality and integrity...
- Mã hóa mesh dịch vụ la gi? End-to-end encryption of communications between services within a service mesh architecture, typically using mutual TLS ...
- Mã hóa truyền vận chuyển lẫn nhau la gi? Encryption mechanism where both endpoints authenticate each other and establish encrypted transport, as defined in NIST ...
- Mã khối la gi? A symmetric key encryption algorithm that encrypts data in fixed-size blocks, such as AES and 3DES.
- Mô hình hóa mối đe dọa la gi? A structured methodology to identify, analyze, and address potential threats and vulnerabilities in information systems ...
- Mô hình hóa đường tấn công la gi? The systematic mapping and simulation of possible routes an adversary might take to compromise assets, used to assess ri...
- Mô Hình Mối Đe Dọa la gi? A structured process for identifying, prioritizing, and evaluating potential threats and vulnerabilities to an organizat...
- Mô hình mối đe dọa la gi? A structured process to identify, categorize, and prioritize potential threats to cryptographic systems or PKI deploymen...
- Mô hình quản trị la gi? A documented structure that defines roles, responsibilities, decision-making processes, and authority for managing infor...
- Mô phỏng khai thác la gi? A controlled emulation of exploit attempts against cryptographic or PKI vulnerabilities to assess system resilience and ...
- Mô phỏng mối đe dọa la gi? The practice of emulating real-world attacks on cryptographic or PKI infrastructure to test defenses, validate response ...
- Mô phỏng tấn công la gi? A controlled emulation of cyberattacks against systems, networks, or people to assess security posture, validate defense...
- Mô phỏng tấn công la gi? The process of emulating real-world cyberattacks against cryptographic infrastructure or PKI environments to evaluate de...
- Mô phỏng đối thủ la gi? The simulation of real-world attacker behaviors and techniques in a controlled environment to test and improve detection...
- Mô phỏng đối thủ la gi? Adversary Simulation is a controlled security exercise that emulates realistic cyber attacks by mimicking the tactics, t...
- Mô-đun nền tảng tin cậy la gi? A hardware security chip designed to securely store cryptographic keys, certificates, and perform integrity checks to en...
- Môi giới bảo mật SaaS la gi? A security model and technology platform that intermediates access between enterprise users and SaaS applications, enfor...
- Mạng lưới container an toàn la gi? The practice of applying security controls, segmentation, and encrypted communication to the networking layer between co...
- Mạng phủ an toàn la gi? A logically separated, secured network built on top of an existing network to provide enhanced security controls and iso...
- Mất Dữ Liệu la gi? The unintended or unauthorized destruction, corruption, or loss of data, potentially resulting in business disruption or...
- Mẫu chứng chỉ la gi? A predefined configuration for certificate attributes and extensions, used by CAs to automate and standardize certificat...
- Mệt mỏi cảnh báo la gi? Alert Fatigue is a condition in which security analysts become desensitized or overwhelmed due to excessive or repetitiv...
- Mục tiêu kiểm soát la gi? A specific statement of the desired result or purpose that a control is intended to achieve, forming the basis for asses...
- Mức độ chức năng bị lỗi la gi? An API vulnerability where improper function-level authorization allows attackers to access or execute functions beyond ...
- Mức độ đối tượng bị hỏng la gi? A critical API vulnerability where improper access controls allow attackers to manipulate or access objects belonging to...
N
- Neo chuỗi la gi? The process of ensuring that a certificate chain terminates at a trusted root certificate authority (trust anchor), as r...
- Neo tin cậy la gi? A trusted entity (typically a root certificate authority) whose public key is used as the ultimate basis for validating ...
- Nghiên cứu khai thác la gi? The investigative process of analyzing, discovering, and documenting methods by which vulnerabilities in PKI or cryptogr...
- Ngoại lệ bản vá la gi? A formally documented decision to temporarily or permanently not apply a specific patch to a PKI or cryptographic system...
- Ngoại lệ chính sách la gi? A formally approved, documented deviation from an established security policy, typically granted on a temporary basis wi...
- Nguyên nhân gốc rễ la gi? The fundamental underlying reason or origin of a security incident, breach, or operational failure, identified through s...
- Nguồn định tuyến BGP la gi? The original source Autonomous System (AS) that advertises a specific IP prefix into the global BGP routing table, valid...
- Ngăn chặn cảnh báo la gi? The intentional filtering or silencing of specific security alerts to reduce noise from false positives and allow focus ...
- Ngăn Chặn Di chuyển Bên la gi? Techniques and controls designed to detect and stop an adversary’s efforts to move laterally within a network after init...
- Ngăn chặn xâm nhập máy chủ la gi? A security solution deployed on host systems to proactively detect, block, and log malicious activity, such as exploits ...
- Ngăn ngừa khai thác la gi? A set of technical and procedural controls to proactively prevent exploitation of vulnerabilities in cryptographic and P...
- Ngăn ngừa lan rộng bí mật la gi? The implementation of processes and tools to prevent sensitive secrets—such as API keys, credentials, and certificates—f...
- Ngăn Ngừa Mất Dữ Liệu la gi? A suite of technologies and policies designed to detect, monitor, and prevent the unauthorized transmission or disclosur...
- Ngăn Ngừa Replay Token la gi? Security controls and techniques that ensure tokens, such as authentication or session tokens, cannot be reused by attac...
- Ngăn ngừa thoát khỏi container la gi? Security controls and mechanisms implemented to prevent processes within a container from breaching isolation boundaries...
- Ngăn rò rỉ mã thông báo la gi? Measures and controls implemented to prevent authentication or authorization tokens from being inadvertently exposed, in...
- Ngưỡng Chịu Rủi Ro la gi? The amount and type of risk an organization is willing to accept in pursuit of its objectives, as defined in risk manage...
- Ngẫu nhiên hóa cổng tạm thời la gi? A technique where ephemeral (temporary) TCP/UDP ports are assigned randomly to reduce the risk of port prediction attack...
- Ngữ cảnh lỗ hổng la gi? The operational, environmental, and architectural conditions under which a cryptographic or PKI vulnerability may be pre...
- Nhà cung cấp bảo mật quản lý la gi? An external organization that delivers outsourced security monitoring, management, and incident response services for cl...
- Nhà Môi Giới Truy Cập Đám Mây la gi? A security policy enforcement point between cloud service users and providers that ensures enterprise security requireme...
- Nhập khóa la gi? The process of securely bringing a cryptographic key into a software or hardware cryptographic module, typically in comp...
- Nhập mã PIN la gi? The act of securely entering a personal identification number (PIN) into a trusted hardware or software interface for au...
- Nâng Cấp Cảnh Báo la gi? The process of forwarding a security alert to higher-level analysts or decision makers when the event exceeds the curren...
- Né tránh vượt qua phát hiện la gi? Techniques used by threat actors to evade or bypass security detection mechanisms such as IDS, IPS, or endpoint protecti...
- Nền Tảng Bảo Vệ Khối Lượng Công Việc la gi? A cloud-native security solution that provides visibility and real-time protection for workloads—such as virtual machine...
- Nền tảng tin cậy la gi? A computing environment equipped with hardware and software components (e.g., TPM, secure boot) designed to ensure integ...
O
P
- Phong bì số la gi? A mechanism in cryptography where a message is encrypted with a symmetric key and the symmetric key is then encrypted wi...
- Phát Hiện Bí Mật Tĩnh la gi? The process of identifying hardcoded or unchanging secrets such as API keys or passwords within source code or binaries.
- Phát hiện bất thường la gi? Anomaly Detection is the process of identifying unusual patterns, events, or activities in datasets, logs, or network tr...
- Phát hiện giả mạo dữ liệu la gi? Mechanisms and monitoring used to detect unauthorized or malicious modification of data in storage, transit, or processi...
- Phát hiện khai thác la gi? The process of identifying and alerting on attempted or successful exploitation of vulnerabilities in cryptographic, PKI...
- Phát hiện kênh ngầm la gi? The identification and monitoring of unauthorized communication channels that exploit legitimate network protocols or re...
- Phát Hiện Lệch Cấu Hình la gi? The automated identification of unintended changes in system configurations from an approved baseline, used to prevent p...
- Phát hiện Mối đe dọa Trực tuyến la gi? Real-time inspection of network traffic by security appliances placed directly in the data path to identify and block th...
- Phát hiện nhồi thông tin xác thực la gi? The identification and mitigation of automated attacks in which attackers use lists of compromised credentials to gain u...
- Phát Hiện Shadow IT la gi? The process of identifying unauthorized or unmanaged IT systems, applications, or services within an organization, typic...
- Phát hiện Sự cố la gi? The process of identifying potential or actual security incidents in an IT environment by monitoring logs, events, and n...
- Phát hiện sự cố la gi? The process of identifying and confirming security events indicating unauthorized activity or compromise of cryptographi...
- Phát hiện tấn công phát lại la gi? A security mechanism to identify and block attempts where valid data transmissions are maliciously repeated or delayed, ...
- Phát Hiện và Đáp Ứng Điểm Cuối la gi? A cybersecurity solution that monitors, detects, and responds to threats on endpoint devices in real time, integrating t...
- Phát hiện và Ứng phó được Quản lý la gi? A managed security service that provides continuous threat monitoring, detection, investigation, and active response to ...
- Phát hiện đường hầm DNS la gi? The process of monitoring and identifying covert data exfiltration or command-and-control channels hidden within DNS que...
- Phát hiện đường đi ngang la gi? The process of identifying unauthorized lateral movement within a network, typically by monitoring for abnormal access o...
- Phát lại tấn công la gi? The process of re-enacting a recorded or theoretical attack vector against PKI or cryptographic systems to test detectio...
- Phát lại tấn công la gi? A controlled reproduction of a previously observed or simulated attack scenario targeting cryptographic or PKI assets, u...
- Phân loại bảo mật la gi? The categorization of data or assets based on sensitivity, value, and required level of protection, typically in alignme...
- Phân loại Cảnh báo la gi? The systematic process of evaluating, prioritizing, and categorizing security alerts based on severity, credibility, and...
- Phân loại dữ liệu la gi? The process of categorizing data based on its sensitivity, value, and the impact to the organization if disclosed, alter...
- Phân loại dữ liệu la gi? The systematic process of categorizing information based on sensitivity, criticality, and regulatory requirements to det...
- Phân loại sự cố la gi? Incident Categorization is the process of classifying security events or incidents based on type, severity, impact, and ...
- Phân loại sự kiện la gi? The process of rapidly classifying, prioritizing, and assigning security events for investigation based on impact, sever...
- Phân loại tài sản la gi? The process of categorizing cryptographic, PKI, and related assets based on sensitivity, criticality, and regulatory req...
- Phân loại tài sản la gi? The process of classifying PKI and cryptographic assets based on value, criticality, sensitivity, and role within the or...
- Phân phối CRL la gi? The mechanism and locations for making Certificate Revocation Lists (CRLs) available to PKI participants to check the re...
- Phân tách nhiệm vụ la gi? A risk management control principle that divides critical tasks and privileges among multiple individuals to reduce oppo...
- Phân tích an ninh la gi? Security Analytics refers to the use of advanced data analysis techniques, including machine learning and statistical mo...
- Phân tích bắt gói tin la gi? The process of collecting and analyzing network packet data to detect threats, troubleshoot issues, and validate securit...
- Phân tích Dòng mạng la gi? The process of collecting, monitoring, and analyzing metadata about network traffic flows to detect anomalies and threat...
- Phân tích hành vi người dùng la gi? Advanced analytics that monitor and analyze user activity patterns to detect insider threats, compromised accounts, and ...
- Phân tích hành vi thời gian chạy la gi? Continuous monitoring and assessment of applications’ or systems’ activities during execution to detect anomalies or thr...
- Phân tích lưu lượng bất thường la gi? The identification and categorization of network traffic patterns that deviate from established baselines to detect pote...
- Phân tích lạm dụng API la gi? The use of data analysis techniques to monitor, identify, and report on abnormal or malicious usage patterns within API ...
- Phân tích mối đe dọa la gi? Threat Analysis is the systematic evaluation of potential and actual cyber threats by assessing threat actor capabilitie...
- Phân tích nhật ký la gi? The process of examining and interpreting system, application, and security logs to detect, investigate, and respond to ...
- Phân tích Pháp y la gi? The scientific examination and investigation of digital devices, logs, or data to identify, collect, preserve, and analy...
- Phân tích pháp y la gi? The application of specialized techniques to collect, preserve, and analyze digital evidence from information systems fo...
- Phân tích phơi nhiễm la gi? Systematic evaluation of cryptographic or PKI assets and their attack surface to determine points of exposure to vulnera...
- Phân tích phần mềm độc hại la gi? The process of examining malicious software to understand its behavior, intent, origin, and potential impact on affected...
- Phân tích phụ thuộc mã la gi? The process of examining software dependencies for known vulnerabilities, outdated components, or license compliance iss...
- Phân tích rủi ro la gi? The systematic process of identifying, evaluating, and prioritizing risks to organizational assets, considering likeliho...
- Phân Tích Sự Cố la gi? The comprehensive examination and assessment of a security incident to determine its cause, scope, impact, and lessons l...
- Phân Tích Token OAuth la gi? A protocol mechanism defined in RFC 7662 that allows resource servers to query an authorization server about the status ...
- Phân tích tác động la gi? The process of identifying and evaluating the potential consequences and business impacts of threats, incidents, or poli...
- Phân tích tác động la gi? A structured assessment of the potential consequences or business disruption resulting from the exploitation of vulnerab...
- Phân tích xoay trục tình báo mối đe dọa la gi? The analytic process of using one indicator (such as an IP, domain, or hash) as a starting point to discover related thr...
- Phân đoạn dựa trên vai trò la gi? A network security practice dividing network resources or data access based on user or device roles, enforcing least pri...
- Phân đoạn mạng la gi? The practice of dividing a computer network into subnetworks, each being a network segment, to improve security, perform...
- Phân đoạn mạng đám mây la gi? The practice of dividing cloud-based network environments into distinct, isolated segments to enforce security boundarie...
- Phân đoạn mạng đám mây la gi? The process of dividing a cloud network into isolated segments or zones to control traffic flow and limit lateral moveme...
- Phân đoạn Mạng Ảo la gi? The division of a physical network into multiple logical networks using virtualization techniques to isolate traffic and...
- Phòng chống chiếm đoạt phiên la gi? Countermeasures and controls implemented to detect, prevent, and respond to session hijacking attacks, such as session f...
- Phòng chống nhồi nhét thông tin xác thực la gi? Measures and technologies to detect, block, and mitigate automated login attempts using stolen or reused username-passwo...
- Phòng thủ chiếm quyền tài khoản la gi? Security measures designed to detect and prevent unauthorized access to user accounts, including the use of MFA, behavio...
- Phơi nhiễm khai thác la gi? The state in which PKI or cryptographic systems are vulnerable to a known exploit, due to unpatched or misconfigured com...
- Phơi nhiễm mối đe dọa la gi? The degree to which a PKI or cryptographic system is vulnerable or visible to potential threat actors, based on controls...
- Phạm vi kiểm thử la gi? The extent to which cryptographic or PKI system components, use cases, and controls are validated by automated or manual...
- Phạm vi quét la gi? The extent to which cryptographic systems, PKI components, and related assets are included in vulnerability or configura...
- Phản chiếu lưu lượng đám mây la gi? A cloud-native capability that duplicates network traffic to analysis tools for monitoring, threat detection, and compli...
- Phản hồi mã hóa la gi? A block cipher mode of operation (CFB) that turns a block cipher into a self-synchronizing stream cipher, providing conf...
- Phản hồi sự cố đám mây la gi? A structured approach to managing and mitigating security incidents in cloud environments, including preparation, detect...
- Phản Ứng An Ninh la gi? Coordinated activities by security personnel to mitigate, contain, and resolve identified threats or incidents in accord...
- Phản ứng lừa đảo la gi? Coordinated actions taken to detect, contain, and mitigate phishing attacks, including user notification, credential res...
- Phối hợp ứng phó la gi? The structured management and collaboration among teams and stakeholders to ensure efficient containment, eradication, a...
- Playbook An ninh la gi? A documented set of repeatable incident response procedures and decision trees tailored to specific threat scenarios or ...
- Proxy kết thúc TLS la gi? A network device or service that decrypts incoming TLS traffic at the network edge, forwarding unencrypted traffic inter...
- Proxy nhận biết danh tính la gi? A security proxy that enforces access controls and authentication based on user or device identity before allowing acces...
Q
- Quay lại bản vá la gi? The process of reverting cryptographic or PKI system components to a previous version when a deployed patch introduces i...
- Quy trình khắc phục la gi? Remediation Workflow is a structured, documented process for addressing and resolving identified security issues or inci...
- Quy trình khắc phục la gi? A formalized sequence of steps for resolving cryptographic or PKI vulnerabilities, including assignment, tracking, verif...
- Quy trình kiểm soát la gi? A series of coordinated actions and procedures implemented to manage and mitigate risk by enforcing policies and securit...
- Quy trình sự cố la gi? A structured sequence of tasks and escalation steps followed during the lifecycle of a security incident, from detection...
- Quy Trình Xác Thực HMAC la gi? A procedure using Hash-based Message Authentication Code (HMAC) to verify data integrity and authenticity during transmi...
- Quy trình điều tra la gi? A structured series of analytical steps undertaken by security teams to determine the scope, cause, and impact of a cybe...
- Quy Trình Ứng Phó la gi? A formalized, step-by-step sequence of procedures and roles that guide the incident response process from detection thro...
- Quy tắc ứng xử la gi? A formal set of ethical and behavioral guidelines that define acceptable and unacceptable actions for personnel within a...
- Quyền sở hữu dữ liệu la gi? The formal assignment of authority and accountability for data assets to specific individuals or roles within an organiz...
- Quyền sở hữu rủi ro la gi? The assignment of accountability and authority for managing identified risks to a specific individual or organizational ...
- Quét lỗ hổng không dùng agent la gi? A vulnerability assessment performed without installing agents on target systems, using network, API, or credentialed sc...
- Quét mã tĩnh la gi? The process of automatically analyzing source code or binaries for security vulnerabilities, coding errors, or policy vi...
- Quét tuân thủ la gi? An automated scan of cryptographic or PKI systems to verify conformity with regulatory and industry requirements.
- Quét đánh giá xâm phạm la gi? A security scan that evaluates systems for indicators of compromise (IoCs), persistent threats, or policy violations, as...
- Quét ảnh container la gi? The process of automatically analyzing container images for vulnerabilities, malware, and policy violations before deplo...
- Quản lý bản vá la gi? A formal process for the identification, acquisition, testing, and deployment of patches to correct vulnerabilities in c...
- Quản lý bản vá tự động la gi? A systematic approach that uses software tools to automatically identify, acquire, test, and deploy security patches acr...
- Quản lý Chứng chỉ Thiết bị la gi? The process of issuing, deploying, renewing, and revoking digital certificates used to authenticate and secure devices w...
- Quản Lý Danh Tính Đặc Quyền la gi? A security discipline and toolset focused on discovering, controlling, and monitoring accounts with elevated access righ...
- Quản lý dữ liệu la gi? The assignment of responsibility for the management, oversight, and protection of data assets to designated individuals ...
- Quản lý khóa la gi? The set of processes and mechanisms for generating, distributing, storing, using, rotating, archiving, and destroying cr...
- Quản lý khóa la gi? The set of processes and mechanisms used for the secure generation, distribution, storage, rotation, and destruction of ...
- Quản lý khủng hoảng la gi? Coordinated organizational actions and communication aimed at containing, resolving, and recovering from severe security...
- Quản lý ngoại lệ la gi? A formal process for documenting, assessing, approving, and monitoring deviations from standard policies or controls, en...
- Quản Lý Quyền Hạ Tầng la gi? A process and toolset for discovering, controlling, and auditing permissions and access rights across cloud and hybrid i...
- Quản lý sự cố la gi? A structured process for identifying, assessing, responding to, and recovering from security incidents to minimize impac...
- Quản Lý Sự Cố la gi? A coordinated set of processes and tools for identifying, assessing, responding to, tracking, and resolving security inc...
- Quản lý Trường hợp la gi? The process of documenting, tracking, and resolving security incidents or investigations within a structured platform, e...
- Quản Lý Tuân Thủ la gi? The coordinated set of processes and controls designed to ensure adherence to legal, regulatory, and internal policy req...
- Quản lý vai trò la gi? The process of defining, assigning, and controlling user roles and associated privileges within systems to enforce least...
- Quản lý đăng ký thiết bị la gi? The process of registering and configuring devices to ensure compliance with security policies before granting access to...
R
- Ranh giới tin cậy bên thứ ba la gi? A defined security demarcation between an organization’s internal systems and those of third-party entities, used to enf...
- Ràng buộc mã phiên la gi? A security mechanism that cryptographically ties a session token to a specific user device or connection context, preven...
- Rò rỉ thông tin xác thực la gi? The unauthorized disclosure or leak of authentication credentials or cryptographic secrets (such as private keys or cert...
- Rủi ro bên thứ ba la gi? The exposure to potential harm or loss resulting from external vendors, suppliers, contractors, or service providers who...
- Rủi ro quy định la gi? The potential for losses or legal penalties resulting from non-compliance with laws, regulations, or mandatory standards...
S
- Sao lưu khóa la gi? The secure process of creating a protected copy of a cryptographic key, enabling recovery if the original is lost or dam...
- SIEM bản địa đám mây la gi? A Security Information and Event Management platform built specifically for cloud architectures, offering elastic scalab...
- Sinh nonce la gi? The process of generating a unique, unpredictable, and usually random number (nonce) used once per cryptographic protoco...
- Săn lùng mối đe dọa la gi? A proactive and iterative search through networks, endpoints, and datasets to detect and isolate advanced threats that e...
- Săn mối đe dọa mạng la gi? The proactive process of searching for hidden threats or adversaries within network traffic using behavioral analytics, ...
- Săn Mối Đe Dọa Tự Động la gi? The continuous, proactive, and algorithm-driven search for threats and anomalies in an environment, using automated tool...
- Sơ đồ phân quyền bị lỗi la gi? A security flaw where access control logic is incomplete or inconsistent, enabling unauthorized users to gain access to ...
- Sẵn sàng ứng phó la gi? The state of preparedness of personnel, processes, and technology to quickly and effectively respond to cybersecurity in...
- Sẵn Sàng Ứng Phó Sự Cố la gi? The proactive state of an organization’s people, processes, and technology to efficiently detect, respond to, and recove...
- Sổ tay săn mối đe dọa la gi? A documented, repeatable procedure outlining hypothesis-driven threat hunting steps, data sources, detection logic, and ...
- Sổ đăng ký rủi ro la gi? A central repository listing identified organizational risks, their likelihood, impact, mitigation actions, and responsi...
- Sử dụng khóa la gi? A certificate extension that defines the allowed cryptographic operations for the associated key, such as digital signat...
T
- Theo dõi khắc phục la gi? The ongoing process of monitoring and managing corrective actions taken to resolve identified security or compliance iss...
- Theo dõi khắc phục la gi? The process of monitoring and documenting the status and effectiveness of actions taken to correct identified vulnerabil...
- Theo Dõi Sự Cố la gi? The systematic process of recording, updating, and monitoring security incidents throughout their lifecycle to ensure ac...
- Thiết bị HSM la gi? A dedicated hardware device designed to securely generate, manage, and store cryptographic keys, and perform cryptograph...
- Thiếu sót kiểm soát la gi? A weakness in the design or operation of a control that prevents it from effectively mitigating risk or achieving compli...
- Thu thập bằng chứng la gi? The systematic process of gathering digital artifacts, logs, devices, or other data relevant to a security incident, fol...
- Thu thập pháp y điểm cuối la gi? The process of acquiring and preserving digital evidence from cloud or on-premises endpoints in a manner consistent with...
- Thuật toán chữ ký la gi? A cryptographic algorithm used to generate and verify digital signatures, ensuring data authenticity and integrity, such...
- Thuật toán MAC la gi? A cryptographic function that produces a short piece of information used to authenticate a message and provide integrity...
- Thông Báo An Ninh la gi? The formal process of communicating significant security events or incident statuses to designated stakeholders or regul...
- Thông Báo Mối Đe Dọa la gi? Official communication to stakeholders regarding the discovery or presence of a specific cyber threat, often required by...
- Thông báo rủi ro la gi? A formal alert generated to inform stakeholders of emerging or realized PKI or cryptographic risks, often automated with...
- Thông báo sự cố la gi? The act of formally informing stakeholders, management, or regulatory bodies about a detected or ongoing security incide...
- Thông báo vi phạm la gi? The formal process of informing affected parties, regulators, and other stakeholders about a confirmed data breach, in a...
- Thông báo về quyền riêng tư la gi? A formal document that informs individuals about how their personal data is collected, used, stored, and protected by th...
- Thỏa thuận khóa la gi? A cryptographic protocol that enables two or more parties to establish a shared secret key over an insecure channel, com...
- Thời gian sống của khóa la gi? The maximum period that a cryptographic key is allowed to be active and used for cryptographic operations before mandato...
- Thời hạn hiệu lực la gi? The designated timeframe during which a cryptographic certificate or key is considered valid and trusted for use, after ...
- Thử khai thác la gi? An unauthorized action or sequence initiated by a threat actor to actively test or leverage a cryptographic or PKI vulne...
- Thực thi chính sách la gi? The process of ensuring that policies, standards, and procedures are implemented and followed within the organization, w...
- Thực thi chính sách CORS la gi? The process of strictly applying Cross-Origin Resource Sharing (CORS) policies to control which origins can interact wit...
- Thực thi chính sách phân đoạn la gi? The application and monitoring of access control policies that govern traffic between network segments to minimize unaut...
- Thực thi chính sách điểm cuối la gi? The application of security controls to endpoints (e.g., laptops, mobiles) to ensure compliance with organizational secu...
- Thực thi Cổng API la gi? Operational policy and control enforcement at the API gateway layer, ensuring only validated and authorized API traffic ...
- Thực thi giới hạn tốc độ API la gi? A control that limits the number of API requests a client or application can make within a specific time frame to preven...
- Thực thi hạn ngạch API la gi? The process of applying limits to the number of API requests allowed for each user, application, or key, to prevent reso...
- Thực thi hết thời gian phiên la gi? Policy and technical controls to ensure user sessions automatically expire after a defined period of inactivity, minimiz...
- Thực thi lược đồ API la gi? The practice of validating incoming and outgoing API requests and responses against a defined schema to prevent structur...
- Thực thi phía máy khách la gi? Reliance on client-side logic to enforce security controls, which can be bypassed or manipulated, undermining the intend...
- Thực thi phạm vi mã thông báo la gi? The process of restricting token privileges to the minimum necessary set of actions or resources, ensuring that access t...
- Thực Thi Quy Tắc Kinh Doanh la gi? Implementation and monitoring of business logic controls within applications to prevent unauthorized or unintended actio...
- Thực thi Ràng buộc Token la gi? A security control requiring the cryptographic binding of authentication tokens to specific TLS sessions or client devic...
- Thực thi tiêu đề bảo mật la gi? The application of mandatory HTTP response headers (such as CSP, HSTS, X-Frame-Options) to protect web applications from...
- Thực thi truy cập mạng la gi? The application of technical controls to regulate and restrict user, device, or service access to network resources, enf...
- Thực thi Đặc quyền Tối thiểu la gi? The continuous process of restricting user, process, or system access rights to the minimum necessary to perform authori...
- Tiêm tiến trình la gi? A technique used by attackers or legitimate tools to inject code into the address space of another process, enabling cod...
- Tiếp tục phiên la gi? A TLS or secure channel mechanism that enables clients and servers to reuse a previously negotiated session state for fa...
- Tiết lộ dữ liệu nhạy cảm la gi? A risk where confidential or regulated data is unintentionally disclosed through insecure APIs, weak encryption, or impr...
- Tiết lộ dữ liệu quá mức la gi? A security weakness where APIs expose more data than necessary to clients, increasing the risk of sensitive information ...
- Tiết lộ thông tin ngoài ý muốn la gi? The accidental or unauthorized exposure of sensitive data due to flawed application logic, misconfigurations, or insuffi...
- Token phần cứng la gi? A physical device, such as a USB or smart card, used to store cryptographic keys and perform authentication or signing o...
- Triển khai bản vá la gi? The distribution and installation of security updates to cryptographic or PKI-related systems to remediate vulnerabiliti...
- Triển khai bản vá ảo la gi? The process of applying security controls, such as firewall rules or IPS signatures, to mitigate vulnerabilities without...
- Triển khai IPsec định tuyến la gi? An implementation of IPsec that leverages routing protocols to establish secure tunnels between network endpoints, suppo...
- Triển khai Mạng mật ong đánh lừa la gi? The setup of a network of decoy systems and services designed to lure, detect, and analyze attacker behavior.
- Trung tâm hợp nhất chỉ báo la gi? A centralized facility or platform that aggregates, correlates, and analyzes cybersecurity indicators (such as IOCs) fro...
- Truy cập giữa các Tenant la gi? The mechanism by which users, services, or applications are granted permission to access resources across different isol...
- Truy Cập Đúng Thời Điểm la gi? A privileged access management method that grants users temporary, time-bound, and auditable access rights to critical s...
- Trình phản hồi trực tuyến la gi? A network service that provides real-time certificate status information, typically using the Online Certificate Status ...
- Trích xuất khóa la gi? The process of obtaining a cryptographic key from a hardware or software source, typically for backup, migration, or for...
- Trạng thái bản vá la gi? The documented and regularly updated record of the deployment, verification, and compliance of cryptographic or PKI-rela...
- Trạng thái thu hồi la gi? The current validity state of a digital certificate, indicating whether it has been revoked by the issuing certificate a...
- Trạng thái thu hồi la gi? The current validity state of a digital certificate as determined by a recognized Certificate Authority (CA), typically ...
- Trạng thái trực tuyến la gi? In cryptography/PKI, refers to the real-time validity of a digital certificate or credential as determined by protocols ...
- Tuân thủ chính sách la gi? The degree to which organizational personnel follow established internal policies, procedures, and standards.
- Tuân thủ mật mã la gi? Adherence to laws, regulations, and standards that govern cryptographic practices, algorithm usage, and key management, ...
- Tuân thủ pháp lý la gi? The state of adhering to all applicable laws, regulations, and legal obligations relevant to an organization's business ...
- Tuân thủ quy định la gi? Adherence to laws, regulations, and standards applicable to the organization's operations and information security pract...
- Tài liệu chính sách la gi? The comprehensive collection and maintenance of all written policies, procedures, and standards governing security, risk...
- Tài Liệu Cảnh Báo la gi? The detailed recording of all relevant information about a security alert, including source, analysis, actions, and outc...
- Tài liệu sự cố la gi? The detailed and systematic recording of all relevant information, actions, decisions, and evidence related to a cyberse...
- Tác nhân đe dọa la gi? An individual, group, or entity with the intent, capability, and opportunity to exploit vulnerabilities in cryptographic...
- Tác động kinh doanh la gi? The effect or consequence an incident, risk, or change has on an organization's operations, assets, individuals, or repu...
- Tác Động Đến Quyền Riêng Tư la gi? The effect of a process, project, or system on the privacy of individuals, often measured and documented through a forma...
- Tách biệt mặt phẳng dữ liệu la gi? The separation of the data forwarding path from management and control planes within network infrastructure to improve s...
- Tách kênh VPN la gi? A VPN configuration that allows some traffic to be routed through the secure VPN tunnel while other traffic accesses the...
- Tái xác nhận quyền truy cập la gi? A formal process to periodically review and validate user access rights to systems and data to ensure only authorized pe...
- Tên chủ thể la gi? The distinguished name (DN) in a digital certificate that uniquely identifies the certificate holder or entity, as speci...
- Tình báo Mối đe dọa la gi? Evidence-based knowledge about existing and emerging threats, derived from analysis of indicators, adversary behavior, a...
- Tình báo mối đe dọa la gi? Curated, actionable knowledge regarding cryptographic or PKI-related threats, including adversary tactics, relevant indi...
- Tình báo mối đe dọa điểm cuối la gi? The real-time collection and analysis of threat indicators and adversary tactics from endpoint devices to enhance detect...
- Tình báo mối đe dọa đám mây la gi? The process of gathering, analyzing, and operationalizing information about cloud-specific threats, adversary tactics, a...
- Tích hợp dịch vụ xác nhận la gi? The process of connecting systems to trusted attestation services that validate the integrity and security posture of cl...
- Tư thế bảo mật la gi? The overall status of an organization’s cybersecurity policies, controls, capabilities, and readiness to detect, prevent...
- Tư Thế Bảo Mật Đám Mây la gi? The overall security status and configuration of cloud services, assets, and workloads in accordance with organizational...
- Tương quan cảnh báo la gi? Alert Correlation is the process of analyzing and linking related security alerts from different sources or systems to i...
- Tương quan hoạt động đám mây la gi? The process of linking and analyzing disparate cloud events, logs, and telemetry to detect patterns indicative of threat...
- Tương Quan Mối Đe Dọa la gi? The analytical process of aggregating and comparing multiple data points from diverse sources to identify relationships ...
- Tương quan sự kiện la gi? The process of analyzing and combining related security events from multiple sources to identify patterns indicative of ...
- Tấn công chuyển tiếp xác thực la gi? A cyberattack in which authentication credentials are intercepted and forwarded (relayed) to impersonate a legitimate us...
- Tấn công phân tích mật mã la gi? A method of attacking cryptographic systems by analyzing the algorithms and ciphertexts to extract secret keys or plaint...
- Tấn công sửa đổi tham số la gi? An attack technique where an adversary manipulates input parameters in client requests to alter application behavior, by...
- Tần suất quét la gi? The rate at which cryptographic assets or PKI-enabled systems are scanned or assessed for vulnerabilities, exposures, or...
- Tối thiểu hóa dữ liệu la gi? The principle and practice of limiting personal or sensitive data collection, processing, and retention to only what is ...
- Tổ chức gốc la gi? The top-level Certificate Authority (CA) in a PKI hierarchy whose root certificate is self-signed and serves as the ulti...
- Tổng hợp nhật ký la gi? Log Aggregation is the process of collecting and centralizing logs from diverse systems, applications, and devices into ...
- Tổng hợp số liệu viễn trắc mạng la gi? The collection, normalization, and consolidation of network telemetry data (such as flow records, logs, or metrics) from...
- Tự Đánh Giá Kiểm Soát la gi? Short for 'Control Self-Assessment'—an internal process where departments evaluate the design and effectiveness of their...
- Tự động hóa bảo mật la gi? Security Automation is the application of technology to perform repetitive or time-sensitive security operations tasks—s...
- Tự động hóa kiểm thử la gi? The application of automated tools and scripts to perform repeatable, consistent validation of cryptographic functions, ...
- Tự động hóa Playbook la gi? The automated execution of predefined incident response actions and workflows using orchestration tools, reducing manual...
- Tự động hóa điều phối bảo mật la gi? The integration and automation of security processes, tools, and workflows to accelerate detection, investigation, and r...
- Tự động phát hiện tài sản la gi? The automated identification and inventory of all devices, cloud resources, software, and services within an organizatio...
V
- Vector tấn công la gi? A specific method or pathway by which a threat actor attempts to exploit vulnerabilities in cryptographic or PKI infrast...
- Vi Phạm Chính Sách la gi? An act or omission that breaches or contradicts an established organizational policy, potentially leading to disciplinar...
- Vi Phạm Chính Sách An Ninh la gi? Any action or event that contravenes an established information security policy or standard, triggering investigation or...
- Viễn trắc bảo mật la gi? Security Telemetry refers to the automated collection, transmission, and aggregation of security-relevant data—such as l...
- Vé phiên la gi? A data structure issued by a server to a client in TLS to enable stateless session resumption by encapsulating keying ma...
- Vòng Đời Cảnh Báo la gi? The sequence of phases that a security alert undergoes, from initial detection and triage through investigation, escalat...
- Vòng đời định danh máy la gi? The complete set of processes for creating, managing, renewing, and retiring machine identities (e.g., certificates, key...
- Vùng chứa khóa la gi? A logical or physical storage area used to hold cryptographic keys, often protected by access controls and used in softw...
- Vùng giao diện không tin cậy la gi? A designated network segment where interfaces connect to untrusted networks or devices, typically requiring strict secur...
- Vượt Qua Giới Hạn Tốc Độ la gi? A technique or vulnerability where attackers evade rate limiting controls to send more requests than intended, potential...
- Vận chuyển nghiêm ngặt MTA la gi? An email security policy (MTA-STS) that enforces strict encrypted transport (typically via TLS) between Mail Transfer Ag...
X
- Xem xét quản lý la gi? A formal evaluation conducted by senior management to assess the adequacy and effectiveness of security, compliance, and...
- Xoay khóa tự động la gi? A security control that automatically replaces cryptographic keys at predefined intervals to minimize the risk of key co...
- Xung đột băm la gi? An event where two different inputs produce the same output hash value from a cryptographic hash function, undermining d...
- Xác minh bản vá la gi? The process of confirming that applied patches to cryptographic, PKI, or related systems have been correctly installed, ...
- Xác minh chữ ký JWT la gi? The process of validating the cryptographic signature of a JSON Web Token (JWT) to ensure its integrity and authenticity...
- Xác minh khắc phục la gi? The process of confirming that actions taken to correct cryptographic or PKI vulnerabilities are effective and that affe...
- Xác minh khởi động an toàn la gi? A cryptographic process that ensures only trusted, signed firmware and software are loaded during system startup, preven...
- Xác nhận khóa la gi? A cryptographic process where parties confirm to each other that they possess the same secret key, usually as a final st...
- Xác nhận tuân thủ la gi? The systematic confirmation that cryptographic, PKI, and supporting systems conform to relevant standards, policies, and...
- Xác thực bản vá la gi? The process of confirming through controlled testing that a security patch applied to cryptographic modules or PKI compo...
- Xác thực chuỗi la gi? The process of verifying each certificate in a chain from the end entity up to the root CA, ensuring all links are trust...
- Xác thực chuỗi DNSSEC la gi? The process of verifying each link in the DNSSEC signature chain from root to record to ensure domain name authenticity ...
- Xác thực chứng chỉ máy khách la gi? A process that verifies the authenticity and trustworthiness of client certificates during mutual TLS connections, enabl...
- Xác Thực Cảnh Báo la gi? The process of verifying whether a security alert is genuine, actionable, and relevant, typically by correlating with ad...
- Xác thực hết hạn mã thông báo la gi? The process of checking the expiration date and time of authentication or authorization tokens to ensure that expired to...
- Xác thực hợp đồng API la gi? The process of verifying that an API’s requests and responses strictly conform to the documented interface specification...
- Xác thực khai thác la gi? The process of confirming, through controlled testing, that a discovered vulnerability in a cryptographic or PKI system ...
- Xác thực logic nghiệp vụ la gi? The process of systematically verifying application workflows and rules to ensure that implemented business logic enforc...
- Xác thực lẫn nhau la gi? A security process in which both entities in a communication verify each other's identities, typically using digital cer...
- Xác thực mô-đun mật mã la gi? The formal process of testing and certifying that a cryptographic module meets defined security standards such as FIPS 1...
- Xác thực nonce phát lại la gi? A security mechanism that ensures a unique nonce value is included and validated in each request or transaction, protect...
- Xác thực toàn vẹn định tuyến la gi? A set of mechanisms that verify the authenticity and correctness of network routing information to prevent route hijacki...
- Xác thực tuân thủ la gi? The formal process of testing and confirming that systems, processes, and controls meet regulatory, contractual, and pol...
- Xác Thực Đa Yếu Tố la gi? A security mechanism requiring users to present two or more independent forms of evidence (factors) to verify their iden...
- Xác thực địa chỉ nguồn la gi? The process of verifying that the source IP address of a packet is legitimate and not spoofed, typically enforced at net...
- Xây dựng chuỗi la gi? The process of assembling a complete, ordered set of certificates from an end-entity certificate up to a trusted root, v...
- Xử lý dữ liệu la gi? The processes and procedures for collecting, processing, storing, transmitting, and disposing of data in a secure and co...
- Xử lý lỗi không đúng la gi? Failure to securely process or sanitize application errors, leading to information disclosure or security bypass opportu...
- Xử lý ngoại lệ la gi? The systematic process of identifying, logging, resolving, and reporting deviations from expected information security o...
- Xử lý Sự cố la gi? A structured set of procedures used by security teams to address, manage, and resolve cybersecurity incidents, including...
- Xử lý sự cố la gi? The comprehensive process of managing a cybersecurity incident from initial detection through analysis, containment, era...
- Xử lý yêu cầu preflight la gi? The process of managing HTTP preflight requests (OPTIONS method) sent by browsers to check CORS permissions before the a...
Á
- Ánh xạ chính sách la gi? The process in PKI where certificate policies from one CA are mapped to equivalent policies in another, allowing interop...
- Ánh xạ danh tính liên kết la gi? A process that links a user’s identity and credentials across multiple trusted identity providers, enabling Single Sign-...
- Ánh Xạ Danh Tính Liên Kết la gi? A process that links user identities from external or partner identity providers to local systems, enabling single sign-...
- Ánh xạ kiểm soát la gi? The process of aligning cryptographic or PKI controls with regulatory frameworks, standards, or organizational requireme...
- Ánh xạ nhận dạng tài nguyên la gi? The process of associating digital resources (such as VMs, APIs, or storage objects) with unique, verifiable identities ...
Đ
- Điều khiển Bảo vệ Ranh giới la gi? Security mechanisms (e.g., firewalls, gateways) deployed at network perimeters to monitor and filter inbound and outboun...
- Điều phối an ninh la gi? The automated coordination and integration of security tools, processes, and workflows to accelerate response and improv...
- Điều phối phản ứng la gi? Response Coordination is the organized management of communication, task allocation, and resource deployment among stake...
- Điều phối phản ứng thích ứng la gi? The automated coordination and execution of security responses that dynamically adjust based on incident severity and co...
- Điều tra cảnh báo la gi? The process of analyzing and validating security alerts to determine their legitimacy, scope, and required response acti...
- Điều Tra Cảnh Báo la gi? The structured process of examining the source, context, and impact of a security alert to determine its validity, root ...
- Điều tra sự cố la gi? A systematic process of collecting, analyzing, and documenting evidence to determine the cause, impact, and scope of a s...
- Điểm quyết định chính sách la gi? A logical component in access control architectures (e.g., ABAC, RBAC) that evaluates access requests against policy rul...
- Điểm tin cậy thiết bị la gi? A security metric that evaluates the trustworthiness of a device based on hardware, software, configuration, compliance ...
- Điểm yếu kiểm soát la gi? A flaw, gap, or insufficient strength in technical or procedural controls that may allow threats to compromise cryptogra...
- Đào tạo an ninh la gi? Instructional activities designed to equip personnel with the knowledge and skills to recognize, prevent, and respond to...
- Đào tạo nhận thức la gi? Education provided to personnel to raise awareness about security risks, threats, and safe practices, often as part of c...
- Đám Mây Riêng Ảo la gi? A logically isolated section of a public cloud where organizations can launch resources in a virtual network that they d...
- Đánh dấu xác thực bảo mật la gi? An XML-based framework (SAML) for exchanging authentication and authorization data between security domains, commonly us...
- Đánh giá an ninh la gi? A systematic evaluation of the security posture of systems, networks, and processes to identify vulnerabilities, threats...
- Đánh Giá Chính Sách la gi? A formal and systematic evaluation of organizational policies to ensure their adequacy, effectiveness, and compliance wi...
- Đánh Giá Chính Sách la gi? A formal and systematic evaluation of organizational policies to ensure their adequacy, effectiveness, and compliance wi...
- Đánh giá cơ bản la gi? A comprehensive evaluation of the security posture of PKI and cryptographic systems against established industry baselin...
- Đánh giá hình phạt la gi? The formal process of determining and imposing financial or legal penalties for non-compliance with regulatory or contra...
- Đánh giá khai thác la gi? The evaluation of identified vulnerabilities in cryptographic or PKI assets to determine the likelihood and potential im...
- Đánh giá khoảng cách la gi? A structured review that compares current security controls and practices against required standards or frameworks to id...
- Đánh giá kiểm soát la gi? A formal evaluation of the design and effectiveness of security controls to determine whether they are operating as inte...
- Đánh Giá Kiểm Soát la gi? An assessment of security controls to determine their effectiveness, adequacy, and proper implementation within the orga...
- Đánh giá kiểm soát la gi? A systematic assessment of technical and procedural security controls in cryptographic and PKI environments to determine...
- Đánh giá lỗ hổng la gi? A systematic process for identifying, classifying, and evaluating vulnerabilities in information systems, cryptographic ...
- Đánh giá mối đe dọa la gi? A structured process for identifying, evaluating, and prioritizing potential threats to an organization's assets, operat...
- Đánh giá mối đe dọa la gi? A structured process for identifying, analyzing, and prioritizing potential threats to an organization's assets, operati...
- Đánh giá mức độ nghiêm trọng la gi? A standardized scale or categorization of the impact and urgency of vulnerabilities or incidents affecting cryptographic...
- Đánh giá nhà cung cấp la gi? A structured evaluation of third-party providers’ security, compliance, and risk management practices prior to and durin...
- Đánh giá quy định la gi? A systematic evaluation of processes, policies, and controls to ensure alignment with applicable regulatory requirements...
- Đánh giá rủi ro la gi? The process of assessing the potential impact and likelihood of identified risks to determine their significance and gui...
- Đánh Giá Sự Cố la gi? A structured post-incident process for evaluating the effectiveness of detection, response, and recovery measures to ide...
- Đánh giá tác động la gi? A systematic analysis of the consequences that an identified risk or incident could have on business operations, assets,...
- Đánh giá tư thế thiết bị la gi? The evaluation of a device's security state, such as patch levels, configurations, and presence of security controls, be...
- Đánh giá xâm nhập la gi? Compromise Assessment is the comprehensive evaluation of an organization’s systems, networks, and data to identify evide...
- Đóng dấu thời gian la gi? The process of recording the exact date and time that a digital document or transaction was created or signed, often wit...
- Đóng sự cố la gi? The formal completion and documentation of all response activities for a security incident, ensuring lessons learned and...
- Đường cong elliptic la gi? A type of algebraic curve used in public-key cryptography, providing strong security with smaller key sizes; the basis o...
- Đường dây nóng đạo đức la gi? A confidential reporting mechanism that allows employees and third parties to report ethical or compliance concerns anon...
- Đường dẫn chứng chỉ la gi? An ordered sequence of certificates from the end-entity certificate to a trusted root certificate, used to establish tru...
- Đường hầm riêng ảo la gi? A secure, encrypted connection established over a public or untrusted network, forming a logical link that protects data...
- Đường tấn công la gi? A sequence or route by which a threat actor progresses through vulnerabilities, misconfigurations, or controls in crypto...
- Đệm chữ ký la gi? A method of formatting a message or hash before digital signature creation, used to prevent certain attacks and ensure c...
- Định danh nhà phát hành la gi? A unique value or distinguished name that identifies the Certificate Authority (CA) or entity that issues a digital cert...
- Định hình gói thích ứng la gi? A dynamic network management technique that adjusts packet flows based on real-time bandwidth, latency, or application p...
- Đối tượng trực tiếp không an toàn la gi? A vulnerability where applications expose internal object references, such as file or database keys, directly to users w...
- Độ trưởng thành kiểm soát la gi? A measure of how well an internal control is designed, implemented, and operating as intended to mitigate risk and meet ...
- Động cơ phân loại lưu lượng la gi? A system or module that automatically identifies, categorizes, and labels network traffic based on protocols, applicatio...
- Động cơ quét la gi? A dedicated software module or appliance that performs automated vulnerability, compliance, or configuration scans on cr...
Ư
- Ưu tiên cảnh báo la gi? The process of ranking and categorizing security alerts based on risk, relevance, and organizational impact, to enable e...
- Ưu tiên lỗ hổng la gi? The process of ranking discovered cryptographic and PKI vulnerabilities according to risk, exploitability, business impa...
- Ưu tiên rủi ro la gi? The process of ranking identified risks based on their likelihood, potential impact, and organizational risk appetite to...
- Ưu tiên rủi ro la gi? The structured process of ranking risks to cryptographic and PKI systems based on likelihood, impact, and exposure, to g...
- Ưu Tiên Sự Cố la gi? The classification and ranking of security incidents based on risk, severity, and potential business impact to determine...
Ủ
- Ủy ban kiểm toán la gi? A formally established group within an organization tasked with oversight of financial reporting, internal controls, ris...
- Ủy ban quản trị la gi? A formal group of executives and stakeholders responsible for overseeing information security, compliance, and risk mana...
- Ủy quyền cấp chức năng la gi? A control mechanism that verifies a user’s or system’s permission for each specific API endpoint or business function be...
- Ủy quyền đồng ý OAuth la gi? Process by which a resource owner grants a client application delegated access to protected resources, based on explicit...
Learn All Cybersecurity English Terms Free
Master every term with native pronunciation, IPA transcriptions and career quizzes. 100% free, forever.
Download Free for iOS