Cyber Security Glossary

A complete glossary of essential Cyber Security terms.

AJAX progress indicator
Search: (clear)
  • Wiretapping
    Wiretapping is the process of monitoring and recording data that is flowing between two points in a communication system.
  • World Wide Web
    The World Wide Web (WWW) is the global, hypermedia-based collection of information and services that is available on Internet servers and is accessed by browsers using Hypertext Transfer Protocol and other information retrieval mechanisms.
  • Worm
    A type of malware that replicates itself in order to spread to other computers.
  • WWW
    The World Wide Web (WWW) is the global, hypermedia-based collection of information and services that is available on Internet servers and is accessed by browsers using Hypertext Transfer Protocol and other information retrieval mechanisms.
  • X.400
    X.400 was originally published in 1984 by CCITT and later re-written in 1988 jointly by ISO and CCITT. X.400 is a standard that conforms to layer 7 of the OSI and is a standard used for transporting e-mail messages. X.400 is an alternative standard to the commonly used SMTP and includes support for several transport connections including Ethernet, TCP/IP, and dial-up.
  • XHTML
    XHTML is short for eXtensible HyperText Markup Language. XHTML is a hybrid between XML and HTML and designed for network devices as a method of displaying web pages on network and portable devices. XHTML was first released January 26, 2000.
  • XML
    XML is short for eXtensible Markup Language. XML is a specification developed by W3C starting with the recommendation on February 10, 1998. XML is similar to HTML, XML uses tags to markup a document, allowing the browser to interpret the tags and display them on a page. Unlike HTML, XML language is unlimited (extensible) which allows self-defining tags and can describe the content instead of only displaying a page’s content. Using XML other languages such as RSS and MathML have been created, even tools like XSLT were created using XML.
  • XMPP
    XMPP which stands for Extensible Messaging and Presence Protocol, is a communications protocol for messaging systems. It is based on XML, storing and transmitting data in that format. It is used for sending and receiving instant messages, maintaining buddy lists, and broadcasting the status of one’s online presence. XMPP is an open protocol standard. Anyone can operate their own XMPP service, and use it to interact with any other XMPP service. The standard is maintained by XSF, the XMPP Standards Foundation.
  • XMT
    XMT is also called Transmit. XMT is the method of sending data to an alternate computer or device.
  • XNS
    XNS is short for Xerox Network Services, XNS is a proprietary network communications protocol developed by Xerox. XNS is no longer used and has been replaced by Transmission Control Protocol / Interface Program (TCP/IP).
  • Y2K
    Y2K is short for Year 2000 Bug or the millennium bug. Y2K is a warning first published by Bob Bemer in 1971 describing the issues of computers using a two-digit year date stamp.
  • Ymodem
    A Ymodem is a file-transfer protocol developed by Chuck Forsburg, that is similar to the enhanced 1K version of Xmodem. Ymodem sends data in 1024-byte blocks, allows for multiple file transmissions at once, performs cyclical redundancy checks (CRC), and can reduce the transfer size to compensate for poor connections.
  • Yottabyte
    Yottabyte is abbreviated as YB. A yottabyte is equal to 1,208,925,819,614,629,174,706,176 (280) bits, or 1,000,000,000,000,000,000,000,000 (1024) bytes and is the largest recognized value used with storage.
  • Zero-Day
    A zero-day vulnerability is a flaw in the software, hardware or firmware that is unknown to the responsible parties for patching or fixing the flaw.
  • Zero-day Attack
    A zero-day (or zero-hour or day zero) attack is a computer threat that attempts to manipulate the computer application vulnerabilities that are undisclosed to the software developer. Zero-day exploits is the actual code that can use a security hole to carry out an attack. These exploits are used or shared by attackers before the software developer knows about the vulnerability.
  • Zombies
    A zombie is an infected computer that is remotely controlled by a hacker. It is part of a large group of compromised computers called a botnet.