Search by letter :
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A
ACL (« ACCESS CONTROL LIST »
ADVANCED PERSISTENT THREAT (APT)
AGENCE NATIONALE DE LA SÉCURITÉ DES SYSTÈMES D’INFORMATION
B
BACKDOOR (PORTE DÉROBÉE)
BLUE TEAM
BUFFER OVERFLOW (DÉPASSEMENT DE MÉMOIRE TAMPON)
BUG BOUNTY
C
CERTIFICATE REVOCATION LIST
CISO
COMPUTER MALICIOUSNESS
CYBER
CYBERSÉCURITY AND CYBERDEFENSE
D
DARK NET
DATA PROTECTION OFFICER (DPO)
DEEP WEB
DÉFIGURATION (DEFACING)
DIGITAL CERTIFICATE
DNS (DOMAIN NAME SYSTEM)
E
ELEVATION OF PRIVILEGES
ENDPOINT
ÉVALUATION DES RISQUES
EVIL MAID ATTACK
F
FALSE NEGATIVE / POSITIVE
FIRMWARE (MICROCODE MICROPROGRAMME)
FLOW (COMPUTER VULNERABILITY)
FORENSIQUE (ANALYSE)
G
GDPR (ORGANISATION)
GOOGLE DORKS
GRAY HAT
GRIMALDI FORUM
H
HACKING
HACKTIVISTE
HASH
HONEYPOT (POT DE MIEL)
I
ICS (INDUSTRIAL CONTROL SYSTEM)
INFORMATION SYSTEMS SECURITY AUDIT PROVIDER (ISSAP)
INTEGRITY
INTRUSION TEST
IOT (INTERNET OF THINGS)
J
JAILBREAK
K
KERBEROS
KERNEL (NOYAU DU SYSTÈME D’EXPLOITATION)
KEYLOGGER
KILL CHAIN
L
LAYER (COUCHE)
M
MACRO
MAN-IN-THE-MIDDLE (ATTAQUE DE L’HOMME DU MILIEU)
METASPLOIT
MILITARY PROGRAMMING LAW (PML)
MULTI-FACTOR AUTHENTICATION (MFA)
N
NIDS (NETWORK-BASED INTRUSION DETECTION SYSTEM)
NIS (NETWORK & INFORMATION SECURITY)
NON-RÉPUDIATION
NTP (NETWORK TIME PROTOCOL)
O
OBFUSCATION
OODA (BOUCLE)
OPEN SOURCE INTELLIGENCE (OSINT)
OSI (MODÈLE)
P
PERSONAL IDENTIFYING INFORMATION (PII)
PHISHING (HAMEÇONNAGE)
PRIVATE KEY / PUBLIC KEY
Q
QUALIFICATION
R
REMEDIATION
RGS
RGPD
RISK ASSESSMENT
ROOT
S
SIEM (SECURITY INFORMATION AND EVENTS MANAGEMENT)
SOC
SOCIAL ENGINEERING
SPOOFING
T
TOR (THE ONION ROUTER)
TROJAN HORSE
TUNNEL
TYPOSQUATTING
U
USB (UNIVERSAL SERIAL BUS)
UTM (UNIFIED THREAT MANAGEMENT)
V
VER OU VIRUS ?
VULNÉRABILITÉ (HUMAINE)
VULNÉRABILITÉS (GESTION)
W
WATERING HOLE ATTACK (ATTAQUE DU POINT D’EAU)
WEAPONIZED
WEP / WAP
WHITE / BLACK LIST
WHITEBOX TESTING (TEST EN BOÎTE BLANCHE)
X
XSS (CROSS-SITE SCRIPTING)
Y
Y2K
Z
ZERO-DAY (FAILLE)
ZOMBIE