🚀 Learn how to enable hiring excellence

Social Talent supports GlossaryTech to keep it free for the community

Cyber Security


Stands for Security Content Automation Protocol. It's a set of open standards for sharing security data developed by the U.S. National Institute of Standards and Technology (NIST). Enables the automated vulnerability management, measurement, and policy compliance evaluation of systems deployed in an organization.


Stands for Microsoft System Center Configuration Manager. Certification is designed to affirm a learner's ability to help businesses manage client computers and devices.


Stands for Security Operations Center. A centralized unit that monitors and analyzes an organization’s security posture, and deals with cybersecurity incidents.


Stands for Systems Security Certified Practitioner. It's a vendor-neutral entry-level information security certification issued by the International Information System Security Certification Consortium, also known as (ISC)².


Stands for Security Technical Implementation Guide. It contains policy requirements for security programs and best practices for Information Assurance (IA) enabled applications. Based on Department of Defense (DoD) policy and security controls.


A mechanism of directing a signal or data element toward a particular hardware address or hardware pieces. It makes it possible to connect multiple devices on the same network within a building or campus.

Threat intelligence

Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and action-oriented advice about an existing or emerging menace or hazard to assets.

Threat modeling

Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized.

Threat remediation

A process by which organizations identify and resolve threats to their systems. Occurs when the threat can be eradicated. It is dependent on the type, category and priority that the threat falls into.


Stands for Top Secret / Sensitive Compartmented Information. It's a US DoD security clearance. Eligibility for access to TS/SCI is determined by a Single Scope Background Investigation (SSBI) or periodic reinvestigation.


Stands for the Tactics, Techniques and Procedures of cyber threats. The highest-level description of the behavior or methods of working of cyber adversaries.


Vulnerability is a security weakness in a computer system that permits unauthorized or unwelcome access.

Vulnerability Assessment

A process of identifying, analyzing and ranking vulnerabilities in computer systems, applications, and network infrastructures. 

Vulnerability Management

A process of identifying, classifying, remediating, and mitigating security vulnerabilities. It is integral to computer security and network security.

Web Application Firewall

An application firewall for HTTP applications that protects servers. It filters and monitors HTTP traffic between a web application and the Internet.

Web Proxy

A computer or a software system that acts as a gateway between a local network and a larger-scale network such as the internet. It provides increased performance and security and helps filter what users connected to the network can access.

Wireless security

A subset of network security that prevents unauthorized and malicious access to computers or data using wireless networks. It is delivered through wireless devices.

Development by Synergize.digital

Sign up for updates
straight to your inbox