IT-sikkerhedsordbogen
Cybersecurity kan være en jungle. Hvad enten du er IT-haj eller blot nysgerrig på IT-Sikkerhed, denne guide i junglen er til dig.
Vi forklarer de fleste emner relateret til IT-Sikkerhed på en let forståelig måde, i et klart sprog uden teknisk slang..

- 2 Factor Authentication (2FA)
- Anonymizing proxy
- Anti-malware
- Antivirus
- Appliance
- Application control
- ARP-spoofing
- ATM jackpotting
- Attack Vector
- Autorun worms
- Backdoor Trojan
- Backup
- Behavioral analysis
- Biometri
- Birthday Attack
- Bluetooth hack
- Boot sector malware
- Botnet
- Browser hijacker
- Brute force attack
- Buffer overflow
- BYOD
- CASB
- CEO-fraud
- Cipher
- Clickjacking
- Cloud
- Command and control center
- Compliance
- Cookie
- Cryptojacking
- Cryptomalware
- Darknet
- Dark web
- Data leakage
- Data loss
- Data theft
- Defacing
- Denial-of-service attack
- Device control
- DMZ
- DNS hijacking
- Document malware
- DoH
- Drive-by download.
- Endpoint security
- Engangspassword
- Exploit
- Falsk positiv
- Firewall
- GAP-analyse
- GDPR
- Hacker
- Hacktivism
- Hoax
- Honeypot
- HTTPS scanning
- IEEE 802.1x
- IoT
- IPsec
- IPS – Intrusion Prevention Systems
- Jailbreak
- Java Script
- Keylogger
- Kryptering
- LDAP
- Machine Learning
- MAC OS Firewall
- Malware
- MD5
- Memory scraper
- MFA
- Mobile phone malware
- Mobilsikkerhed
- NAC
- PAM
- Parasitic viruses
- Pass-the-hash attack
- Password
- Password manager
- Patch
- Phishing
- Potentially unwanted applications
- Ransomware
- Rootkit
- Sandbox
- SANS
- Social Engineering
- Social Networking
- SPAM
- Spamfilter
- Spear phishing
- SPF, DKIM og DMARC
- Spoofing
- SQL injection
- SSL
- Sårbarhed
- TOR
- Trojan
- Typosquatting
- Ukategoriserede hjemmesider
- UTM
- Virus
- VPN
- Vulnerability
- WAF
- Web application firewall
- Whaling
- Worms
- Zombie