Abbiamo raccolto in questa pagina i principali termini usati dagli esperti di cybersecurity: l’elenco non è esaustivo, ma è in continuo aggiornamento!
- Application security
- APT (Advanced Persistent Threat)
- Attacco DDoS
- Autenticazione a più fattori
- Backdoor
- Baiting
- Baseline security
- Black-Box
- Blue Team
- Bug
- Business Continuity Plan (BCP)
- BYOD
- Clickjacking
- Command Injection
- Compliance
- Conservazione dei dati
- Cookie
- Cross-site Scripting (XSS)
- CSIRT (Computer Security Incident Response Team)
- Cybersecurity
- Cybersecurity Awareness
- Cyber Security Risk Assessment
- Cyber Threat Intelligence
- DART
- Data Breach
- Data protection
- Data Protection Impact Assessment (DPIA)
- Data Protection Officer (DPO)
- Dati personali
- Disaster recovery
- Disaster Recovery Plan
- DNS Poisoning
- DPIA
- Fingerprinting
- Firewall
- Garante Privacy
- GDPR
- Gestione del rischio IT
- Honeypot
- Identity and access management
- Incident management
- Incident Reporting
- Incident Response Plan
- ISO 27001
- Keylogger
- Leak
- Local File Inclusion
- Log analysis
- Log file
- Log management
- MDR (Managed Detection & Response)
- Mobile Application Assessment
- Notifica di violazione
- Packet Sniffer
- Patch management
- Penetration Test
- PenTest Esterno
- PenTest Interno
- Phishing
- Phishing Simulation
- Piano di ripristino delle attività
- Pre-texting
- Privacy by Default
- Privacy by Design
- Proxy
- Ransomware
- Regolamentazione
- Remediation Plan
- Remote Code Execution
- Remote File Inclusion
- Responsabile del Trattamento
- Risk Assessment
- Risk Management
- Rootkit
- RPO
- RTO
- Scam
- Scareware
- Servizi IT
- Sniffing
- Social Engineering
- Spyware
- SQL Injection
- Supply Chain Risk Management
- Threat Intelligence
- Titolare
- Trattamento
- Trojan
- Vulnerability Assessment
- Web Application Firewall
- Web Vulnerability Assessment
- Whaling
- White-Box Testing
- Worm
- XML External Entity
- Zero-Day