Logo
Glossaries image

Glossaries

  • DNS and Domains
  • Threat Intelligence
  • Internet Threats
  • Vulnerabilities
  • Digital Forensics
  • Security Technology
Closer look image

Closer look

    • Technology Applications
    • Technology FAQs
    • Tech Conversations
-->

All ThreatDotMedia Glossaries

Don’t get overwhelmed by cybersecurity concepts you hear or read about. We unraveled complicated cybersecurity terms to give you simplified definitions.
Glossary image
Close icon
  • DNS and Domains
  • Threat Intelligence
  • Internet Threats
  • Vulnerabilities
  • Digital Forensics
  • Security Technology
All glossaries
  • DNS and Domains
  • Threat Intelligence
  • Internet Threats
  • Vulnerabilities
  • Digital Forensics
  • Security Technology
Homepage Glossary
Glossary of the week
Glossary DNS and Domains image
DNS and Domains Glossary

As a critical part of how the Internet works, the Domain Name System (DNS) warrants a dedicated space for people to grasp what it can do and has done for us.

What is an Iterative DNS Query?
What is the Domain Life Cycle?
All 22 definitions
Glossary Threat Intelligence image
Threat Intelligence Glossary
What is a TTP?
What is Strategic Threat Intelligence?
All 8 definitions
Glossary Internet Threats image
Internet Threats Glossary
What is Cross-Site Tracing?
What is NDR Backscatter?
All 11 definitions
Glossary Vulnerabilities image
Vulnerabilities Glossary
What is a Business Logic Vulnerability?
What is the SSL POODLE Vulnerability?
All 11 definitions
Glossary Digital Forensics image
Digital Forensics Glossary
What is Latent Data?
What is Slack Space?
All 13 definitions
Glossary Security Technology image
Security Technology Glossary
What is a Cybersecurity Assessment Tool (CSAT)?
What is an Information Security Management System (ISMS)?
All 6 definitions
Subscription image
Stay Updated on the Latest Cybersecurity Concepts and Trends
Follow us:
  • About
  • FAQ
  • Terms
  • Guidelines
  • Contact