Glossary of Terms
Computer systems designed to perform tasks that normally require human intelligence, such as recognizing patterns, making decisions, and learning. In cybersecurity, it's used for threat detection, response automation, and behavioral analytics.
The automatic execution of predefined tasks in cybersecurity processes without human intervention (e.g., automatically blocking a malicious IP).
Examining user behavior patterns (keystroke dynamics, mouse movements, navigation habits) using AI/ML to establish a baseline of normal behavior and detect deviations indicative of threats.
Verifying identity using unique physiological or behavioral characteristics like fingerprints, facial features, or voice patterns.
A decentralized and distributed ledger system, originally for Bitcoin, used to record transactions securely and transparently without intermediaries. Used in cybersecurity for data protection, secure transactions, identity management, and supply chain transparency.
A network of compromised computers or devices (bots/zombies) controlled remotely by an attacker (botmaster) typically via a Command & Control (C2) server, often used for DDoS attacks, spamming, or credential stuffing.
Delivering computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale. Contrasted with Edge Computing.
Connecting distributed sensors (in homes, vehicles, workplaces) with AI systems to generate insights, improve capabilities of individual sensors, and enable context-aware decisions (e.g., in urban mobility, environmental monitoring).
Digital or virtual currency secured by cryptography, typically using blockchain technology for decentralized transaction recording (e.g., Bitcoin, Ethereum).
Synthetic media (images, video, audio) created using AI where a person's likeness or voice is replaced with someone else's. Poses threats like misinformation, social engineering, identity theft, and reputation damage.
Digital models of the physical world created using technologies like laser scanning. Used to optimize construction and operational efficiency, reducing carbon impact.
Processing, storing, and analyzing data on local devices or edge servers near the data source, rather than in centralized cloud infrastructure. Reduces latency, optimizes bandwidth, and enhances privacy/security.
Advanced probiotic systems (e.g., microbes) genetically engineered to produce therapeutic substances (drugs, enzymes) within the body in a controlled manner.
The fifth generation of wireless technology, offering faster speeds, lower latency, greater capacity, and more reliable connectivity than previous generations (4G LTE, 3G). Uses technologies like millimeter-wave spectrum and massive MIMO.
A type of AI capable of generating new content, such as text, images, audio, or code (e.g., used in mental health monitoring, creating deepfakes, or by hackers for phishing).
Technology that embeds invisible markers in AI-generated content (text, images, audio, video) to verify authenticity and trace origins, helping combat misinformation and protect IP.
A quantum algorithm that can search an unsorted database quadratically faster than classical algorithms ($O(\sqrt{N})$ time). It effectively reduces the key length of symmetric encryption algorithms by half.
A method of detecting viruses by examining code for suspicious properties or abnormal behavior, rather than relying solely on known virus signatures. More adaptable to new threats.
The security discipline that enables the right individuals to access the right resources at the right times for the right reasons. Increasingly incorporating biometrics and behavioral analytics.
Unchangeable or unable to be altered. In blockchain, once data (like a transaction) is added to a block and the block is added to the chain, it cannot be modified.
A network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these objects to connect and exchange data.
A network of compromised IoT devices controlled remotely by attackers, often used for large-scale attacks like DDoS. Examples include the Mirai botnet.
A subset of AI that enables systems to learn and improve from experience without being explicitly programmed. Used in cybersecurity for analyzing data, identifying patterns, and making predictions.
A security process that requires users to provide two or more verification factors to gain access to a resource (e.g., password + SMS code, biometric + PIN). Recommended for IoT security.
A specific malware that targets IoT devices, turning them into remotely controlled bots for large-scale network attacks, notably DDoS attacks. Emerged in 2016.
An open-source software solution for collecting, storing, distributing, and sharing cyber security indicators and threats analysis. Recommended as a tool for threat intel feeds.
Laboratory-produced nanomaterials with enzyme-like catalytic properties, offering increased stability, lower production costs, and simpler synthesis compared to natural enzymes. Applications in medicine, environmental remediation, etc.
A branch of AI that helps computers understand, interpret, and manipulate human language. Used in cybersecurity for analyzing security logs and reports.
Dividing a computer network into smaller, isolated subnetworks or segments to improve security and performance. Recommended for isolating IoT devices.
The coordinated execution of multiple automated tasks across disparate security tools and systems (e.g., detecting malware, quarantining the device, blocking the source IP, and creating a ticket).
Systems that generate clean, renewable energy from salinity (salt content) differences between two water sources (e.g., river water meeting seawater), often using semipermeable membranes.
A distributed network architecture where participants (peers) make a portion of their resources (processing power, disk storage, network bandwidth) directly available to other network participants, without central coordination instances.
Cryptographic algorithms (also called quantum-resistant) thought to be secure against attacks by quantum computers. Examples include lattice-based, hash-based, and code-based cryptography.
A type of computing that uses quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data. Poses threats to current encryption standards (e.g., via Shor's and Grover's algorithms).
An approach to digital identity that empowers individuals to control their own identity data, typically using decentralized technologies like blockchain, without relying on centralized authorities.
A quantum algorithm capable of factoring large prime numbers exponentially faster than classical computers. Poses a significant threat to asymmetric encryption algorithms like RSA and ECC.
Self-executing contracts with the terms of the agreement directly written into code. They run on a blockchain, automatically executing when predefined conditions are met.
Modernized electrical grids using information and communication technology to gather and act on information about the behavior of suppliers and consumers to improve efficiency, reliability, economics, and sustainability.
Technology solutions that allow organizations to collect security threat data and alerts from different sources, where incident analysis and triage can be performed using a combination of human and machine power to define, prioritize, and drive standardized incident response activities.
Materials that integrate load-bearing mechanical functionality with rechargeable energy storage, potentially reducing weight and complexity in applications like electric vehicles and aircraft.
A general category of cloud computing services that bundle various resources like compute, storage, and networking, delivered over the internet on a subscription basis. Includes SaaS, PaaS, IaaS.
A security model based on the principle of "never trust, always verify." It requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or outside of the network perimeter. Recommended for 5G security.