Cybersecurity glossary
Browse Illumio’s library of cybersecurity 101 articles to learn about the fundamentals, key trends, and latest insights
Application Dependency Mapping
Application Dependency Mapping (ADM) is the process of identifying and visualizing all the interconnections between software applications, services, processes, and the underlying infrastructure they rely on, such as servers, databases, APIs, and networks.
Attack Surface
An attack surface is all of an organization's IT assets that are exposed to a potential attacker.
These assets may have physical or digital vulnerabilities that an unauthorized user can leverage to gain access to a corporate network and extract data. People themselves can also be an attack surface when they are targeted with phishing emails and other types of social engineering.
Botnet
Botnets are networks of computers that have been hijacked by malware and used to carry out cyberattacks. Most of the time, devices that are part of the botnet or "bots", are not the target of the attack and may only experience slower processing speeds when the bot software uses resources.
Breach Containment
Effective breach containment is a pivotal phase in the incident response lifecycle, bridging the gap between detection and eradication. Learn more about what it is, why it matters, and how to implement Illumio's approach to breach containment.
CI/CD Security
CI/CD Security is the practice of securing the tools, processes, and environments involved in continuous integration and continuous delivery
Cloud Detection and Response
Cloud Detection and Response (CDR) refers to a set of security capabilities designed to detect, investigate, and respond to threats within cloud environments. Unlike traditional security tools that focus on perimeter defenses, CDR provides visibility and control over cloud-native resources, including containers, microservices, and serverless functions.
Cloud Migration
Cloud migration means moving your data, apps, and workloads from on-prem systems to the cloud or even from one cloud provider to another. Companies make the move to scale faster, save money, and boost security.
Cloud Security
Discover the ultimate guide to cloud security and how Illumio CloudSecure can help your enterprise secure your cloud environment.
Cloud Workload Protection
Cloud applications and workloads are distributed across the country or the world to provide speed, access, and scalability. Cloud workload protection keeps these workloads secure as they move between different cloud environments. Older security strategies like endpoint protection and firewalls miss what is happening in the cloud environment.
Common Criteria
Common Criteria or CC is an international standard for computer security. It is a framework that computer users can employ to specify functional and assurance requirements for security.
Container Orchestration
Container orchestration is the automated management of containers. This allows a software team to maneuver these containers. This is done using strategic deployment, managing lifecycles, load balancing, and networking.
Container Security
Containers have changed the game for building and running apps — they’re fast, flexible, and built to scale. But with that speed comes serious security risks. Just because it’s in the cloud doesn’t mean it’s safe. In fact, the risks grow. That’s why container security matters. It keeps your apps protected, compliant, and ready to fight off modern threats.
Cyberattack
A cyberattack is an assault that cybercriminals have launched to target a network or the devices, applications, and data on a network. Attackers can steal data, disable or damage devices, and leave malware behind that can launch future attacks on other networks.
Cyber Resilience
Cyber resilience means being ready for cyberattacks — and knowing how to bounce back fast if one happens.It’s more than just trying to stop hackers. It’s about keeping your business running, even during an attack, and recovering quickly afterward.While cybersecurity focuses on keeping threats out, cyber resilience prepares you for what to do when they get in.
Cybersecurity
Cybersecurity is a term that defines the processes, technologies, and practices used to safeguard devices, applications, networks, and data from damage or unauthorized access. Cybersecurity is also known as electronic information security or information technology security.
Cybersecurity Compliance
Cybersecurity compliance means following laws, regulations, and industry standards that help keep a company’s digital assets, sensitive data, and IT systems safe from cyberattacks. Organizations must align with various cybersecurity compliance frameworks that outline security controls, best practices, and reporting guidelines.
DevSecOps
DevSecOps means "development, security and operations." It is a mindset and a way of working that ensures everyone is accountable for the security of the IT in the organization.
Distributed Denial of Service (DDoS) Attack
A distributed denial of service attack (DDoS) is an attempt to make an online service inaccessible by hitting it with a massive amount of traffic from a variety of machines. A DDoS attack can block access to servers, devices, databases, networks, and applications.
The difference between a DDoS attack and a standard denial of service attack is that a DDoS attack comes from multiple machines rather than just one. Let's look at how this is accomplished.
Endpoint Detection and Response
Endpoint Detection and Response (EDR) is a cybersecurity solution that continuously monitors and analyzes activity on endpoints like laptops, desktops, servers, and mobile devices to detect, investigate, and respond to threats in real time
Endpoint Security
Many employees today are issued laptops. Some workers at the office even have desktop systems, often for development work. These are the endpoints that need to be protected from malware with endpoint security.
Firewall
A firewall is a network security device that monitors and controls incoming and outgoing network traffic. Security rules set in the firewall device determine what type of data packets will be allowed into or out of a network.
GitOps
GitOps is a modern DevOps practice that uses Git as the single source of truth for declarative infrastructure and application deployments.
Hypervisor
A hypervisor is what makes virtualization technology possible. Let's look at the definition of virtualization to get a clearer understanding of what hypervisors do.
Incident Response
Incident response in cybersecurity refers to the organized approach a company or organization takes to prepare for, detect, contain, and recover from a cybersecurity incident, such as a data breach, malware attack, or unauthorized access.
Infrastructure as Code (IaC)
Infrastructure as Code (IaC) automates infrastructure setup using code and is an essential process to keep environments repeatable, scalable, and consistent.
Kubernetes Security
Kubernetes security means keeping your containerized applications safe from potential threats, vulnerabilities, and unauthorized access. As more companies use Kubernetes to run their containerized workloads, it’s crucial to ensure consistent security across clusters, nodes, and workloads.
Lateral Movement
Lateral movement has become synonymous with data breaches over the past several years, which references cybercriminals' techniques once they gain access to a network. Lateral movement allows hackers to move deeper into a system to track sensitive data, intellectual information, and other high-value assets.
Malware
Malware is a catch-all phrase that is a shortened version of "malicious software," which means it is any type of software that can damage devices, steal data, and cause chaos. This differs from a bug in software because while a bug is an accident, attackers create malware to intentionally cause harm.
Microsegmentation
Microsegmentation is a security technique that breaks data centers and cloud environments into segments down to the individual workload level. Organizations implement microsegmentation to reduce attack surface, achieve regulatory compliance, and contain breaches.
Network Access Control (NAC)
Network Access Control, or NAC, is all about keeping the wrong devices and users out of your network. It makes sure only trusted, secure devices get in — cutting down on hacks, data leaks, and unwanted access.But NAC does more than just check IDs at the door. It also enforces security rules, watches connected devices in real time, and works with other tools to support a strong Zero Trust strategy.
Network Security
Zero Trust security means no one gets automatic access ever. Not people, not devices, not apps. Everything has to prove who they are every time they try to connect, even if they’re already inside the network.
Network Segmentation
Cybersecurity isn’t just about keeping attackers out. It’s also about stopping them if they get in. That’s where network segmentation comes in. Read on to find out why network segmentation is an essential plan for businesses big and small, and why it matters.
Observability
Observability in cybersecurity is the ability to understand system behavior through logs, metrics, and traces, helping teams investigate and diagnose security issues.
PCI DSS
PCI DSS stands for Payment Card Industry Data Security Standard, and is a set of information security standards for any organization that handles and accepts branded credit cards from the major credit card networks such as American Express, Discover Financial Services, JCB International, MasterCard, and Visa.
Personally Identifiable Information (PII)
Personally identifiable information (PII) is any sensitive information or data intended to identify an individual. Sometimes a single piece of PII can identify a specific person, while at other times, other relevant PII details are required to result in a precise match to an individual.
Phishing
Phishing attacks are an attempt to trick people into doing things they would "never" do using social engineering. By masquerading as people with authority and using fear tactics, scammers can scare people into submitting their login credentials on a site that looks just like their banking site but isn't.
Policy Compute Engine
A Policy Compute Engine (PCE) is a central system that analyzes network and application traffic, determines the appropriate security policies, and distributes those policies to enforcement points, helping control and segment communications without being in the actual data path.
Ransomware Risk
Ransomware is a type of malware that encrypts files and information on a system and prevents access to the information until a ransom is paid via cryptocurrency to decrypt them. Discover prevention strategies and common FAQs with our informative guide.
Role-Based Access Control (RBAC)
Role-based access control (RBAC) is a way of limiting or managing access to or use of an application or network, based on an individual or device’s role in the organization and the permissions assigned to their role. RBAC allows employees to have access only to the applications and information necessary to do their job, and limits access to any information that doesn’t pertain to their role.
Security Breach
A security breach is an incident where an unauthorized party gains access to data, systems, or networks without permission. This can result in the exposure, theft, alteration, or destruction of sensitive information such as personal data, financial records, or intellectual property.
Security Policy
An information technology (IT) security policy sets the rules and procedures for users who access a company's IT resources. These rules protect an enterprise's data and systems from unauthorized access, use, modification, or destruction.
Shift Left Security
Shift Left Security is a software development approach that emphasizes integrating security early in the development lifecycle, "shifting left" in the timeline, rather than waiting until the end of the process or during deployment.
Software-Defined Networking (SDN)
Software-defined networking is a modern, dynamic alternative to traditional networking that aims to make the network easier to administrate and troubleshoot. In place of hardware devices like routers and switches, SDN communicates within the infrastructure established using APIs or software-based controls.
SSL (Secure Sockets Layer)
SSL (Secure Sockets Layer) is a security protocol that encrypts data transmitted between a user’s browser and a website, ensuring that sensitive information like passwords, credit card details, and personal data remain private and protected from interception. It’s the predecessor to TLS (Transport Layer Security), which is now the modern standard for secure internet communication.
Threat Intelligence
Threat intelligence is the information that a business or other organization uses to identify potential cybersecurity threats that it will face. Professionals look into these potential threats so that they can be prepared for a breach to take place pre-emptively.
Transport Layer Security (TLS)
TLS or Transport Layer Security, is a protocol that protects data as it travels across a network through encryption and authentication. Used in secure connections like HTTPS, it prevents eavesdropping, tampering, and impersonation.
VDI (Virtual Desktop Infrastructure)
Virtual Desktop Infrastructure (VDI) is a technology that allows the hosting of desktop environments on a central server or a cloud provider. End users can then access these virtual desktop environments remotely over the network from their personal laptops or tablets.
Visbility
Visibility in cybersecurity refers to the ability for security teams to see and monitor activity across networks, systems, devices, and applications. It allows organizations to track communication between assets, identify unusual behavior, and detect potential security threats across their IT environment.
Vulnerability Management
Vulnerability management is the process of discovering, prioritization, remediation, and ongoing measurement and reporting of security vulnerabilities in software and systems. This process is essential for organizations to understand and address vulnerabilities to minimize their "attack surface."
Zero Day Attacks
A zero-day attack is a cyberattack that exploits a software vulnerability that is unknown to the software vendor or developers. Because the vulnerability hasn’t been discovered or patched yet, defenders have “zero days” to fix it, making these attacks especially dangerous.
Zero Trust
Zero Trust architecture is a security strategy eliminating implicit trust by using micro-segmentation to help prevent breaches, ransomware, and lateral movement.
Zero Trust Security
Zero Trust works on one core idea: “Never trust, always verify.”It’s not a tool — it’s a strategy. Zero Trust uses different technologies and rules to lock down every part of your system, including cloud, endpoint, data center environments. It’s all about reducing risk and keeping bad actors out, no matter where they’re hiding. Learn more about Zero Trust Security in our guide.
Zero Trust Segmentation
Zero Trust Segmentation (ZTS), also called microsegmentation, is a security tool that helps stop threats from spreading inside a company’s network. Unlike older methods that use fixed boundaries like VLANs, ZTS works in real-time, focusing on who is accessing what, how they behave, and the current risks.
ZTNA (Zero Trust Network Access)
Zero Trust Network Access (ZTNA) models adaptively grant access to authorized users or devices based on contextual awareness. These systems set access permissions to deny by default, and only authorized users who are approved based on identity, time, device, and other configurable parameters are provided access to your network, data, or applications.