cybersecurity stringlengths 4 48 |
|---|
phishing |
malware |
ransomware |
zero-day |
exploit |
vulnerability |
threat actor |
social engineering |
DDoS |
endpoint security |
firewall |
encryption |
authentication |
penetration testing |
threat intelligence |
compliance |
zero trust |
multi-factor authentication (MFA) |
incident response |
patch management |
rootkit |
spyware |
adware |
trojan |
worm |
virus |
botnet |
brute force attack |
man-in-the-middle (MitM) attack |
SQL injection |
cross-site scripting (XSS) |
denial of service (DoS) |
distributed denial of service (DDoS) |
VPN (Virtual Private Network) |
intrusion detection system (IDS) |
intrusion prevention system (IPS) |
security operations center (SOC) |
ethical hacking |
black hat hacker |
white hat hacker |
cybercrime |
cyber espionage |
data breach |
data loss prevention (DLP) |
cloud security |
mobile security |
internet of things (IoT) security |
application security |
network security |
security information and event management (SIEM) |
AI in cybersecurity |
blockchain security |
risk assessment |
access control |
cryptography |
decryption |
dark web |
cyber resilience |
business continuity plan (BCP) |
disaster recovery |
security architecture |
threat hunting |
malvertising |
keylogger |
shadow IT |
supply chain attack |
ransomware-as-a-service (RaaS) |
phishing simulation |
advanced persistent threat (APT) |
vishing |
smishing |
quishing |
deepfake |
endpoint detection and response (EDR) |
security awareness training |
remote access |
secure web gateway (SWG) |
DNS tunneling |
buffer overflow |
evil twin |
identity and access management (IAM) |
payload |
cyber warfare |
digital forensics |
passwordless authentication |
quantum computing security |
regulatory compliance |
GDPR |
NIST framework |
ISO/IEC 27001 |
data integrity |
CIA triad |
cyber kill chain |
attack vector |
threat modeling |
software development security (SDLC) |
secure coding |
perimeter security |
endpoint hardening |
threat intelligence platform (TIP) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.