ATO (Authorization to Operate)

Official government approval allowing an information system to operate within a defined environment, based on accepted risk.
Read full description
A
a

ATT&CK (MITRE ATT&CK)

A globally-accessible knowledge base of adversary tactics and techniques based on real-world observations, used for threat modeling and detection engineering.
Read full description
A
a

Blue Team

The internal security team responsible for defending an organization's systems, networks, and data against cyber threats and attack simulations.
Read full description
B
b

CMMC (Cybersecurity Maturity Model Certification)

A DoD framework requiring defense contractors to meet specific cybersecurity standards before being awarded federal contracts.
Read full description
C
c

COTS (Commercial Off-The-Shelf)

Commercially available hardware or software that can be purchased and deployed without custom development, enabling faster deployment and easier maintenance.
Read full description
C
c

CPT (Cyber Protection Team)

U.S. military teams trained to defend DoD networks, conduct vulnerability assessments, and respond to cyber incidents on priority systems.
Read full description
C
c

D3FEND

A MITRE framework that maps defensive cybersecurity techniques to known attack patterns, complementing ATT&CK for blue team operations.
Read full description
D
d

Database

A database is an organized collection of data that can be easily accessed, managed, and updated. It is used to store information in a structured way, allowing for efficient retrieval and manipulation of data.
Read full description
D
d

DevSecOps

The integration of security practices into every phase of the software development lifecycle, ensuring code is secure, compliant, and production-ready by default.
Read full description
D
d

DNS

The system that translates domain names into IP addresses.
Read full description
D
d

DOM

A programming interface for web documents.
Read full description
D
d

EDR (Endpoint Detection and Response)

Security technology that continuously monitors endpoints to detect, investigate, and respond to advanced threats in real time.
Read full description
E
e

FedRAMP

A U.S. government program providing a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.
Read full description
F
f

Front-End Development

Client-side development focused on what users see and interact with.
Read full description
F
f

Fulfillment

The process of receiving, packaging, and shipping orders for goods.
Read full description
F
f

Full-Stack Developer

A developer proficient in both front-end and back-end development.
Read full description
F
f

Functional Skills

The essential literacy and numeracy skills that apprentices need to succeed in their chosen field (reading, writing, comprehension, computer skills, among others).
Read full description
F
f

Gateway

A network node that connects two different networks and allows data to flow between them.
Read full description
G
g

ICS (Industrial Control Systems)

Specialized systems used to monitor and control physical infrastructure and industrial processes, increasingly targeted by sophisticated cyber threats.
Read full description
I
i

Incident Response (IR)

A structured methodology for detecting, containing, and recovering from security breaches to minimize damage and restore normal operations quickly.
Read full description
I
i

MTTR (Mean Time to Respond)

The average time required to detect and contain a security incident — a key KPI for measuring SOC efficiency and operational maturity.
Read full description
M
m

NIST 800-53

A catalog of security and privacy controls published by NIST for federal information systems, widely used as a compliance baseline for government and enterprise environments.
Read full description
N
n

OT (Operational Technology)

Hardware and software that monitors and controls physical devices, processes, and events in industrial and critical infrastructure environments.
Read full description
O
o

Penetration Testing

A simulated cyberattack conducted by authorized professionals to identify vulnerabilities in systems, networks, and applications before real attackers do.
Read full description
P
p

Red Team

An independent group that simulates real-world adversary tactics to test and improve an organization's detection and response capabilities.
Read full description
R
r

RMF (Risk Management Framework)

A structured NIST process for integrating security, privacy, and cyber supply chain risk management into the system development lifecycle.
Read full description
R
r

SIEM (Security Information and Event Management)

A platform that aggregates and analyzes security data from across an organization's environment to detect threats and generate alerts in real time.
Read full description
S
s

SOAR (Security Orchestration Automation and Response)

Technology that automates security workflows, orchestrates tools, and accelerates incident response — transforming manual SOC tasks into intelligent, repeatable processes.
Read full description
S
s

SOAR (Security Orchestration, Automation and Response)

Technology that automates security workflows, orchestrates tools, and accelerates incident response — transforming manual SOC tasks into intelligent, repeatable processes.
Read full description
S
s

Threat Hunting

A proactive security practice where analysts actively search for hidden threats and adversaries within an organization's environment before alerts are triggered.
Read full description
T
t

TTPs (Tactics Techniques and Procedures)

The behavior patterns and methods used by threat actors to plan and execute cyberattacks, used to build threat-informed defenses.
Read full description
T
t

Vulnerability Scanning

Automated identification and analysis of security weaknesses in systems, networks, and applications to prioritize remediation efforts.
Read full description
V
v

Zero Trust

A security model based on the principle of never trust always verify — requiring continuous authentication and authorization for every user device and connection regardless of location.
Read full description
Z
z

🔍 Nothing here yet!

We're working on adding content to this category.