Antivirus
APT
Attack Surface
DDoS
DNS
Phishing
Ransomware
Reconnaissance
SIEM
Spyware
Spyware that collects data without the computer user's consent and/or knowledge.
Security Information and Event Management is a solution in the field of computer security where software products and services combine security information management and security event management.
The CVE
Threat
Trojan
Common Vulnerabilities and Exposures system provides a reference method for publicly known information security vulnerabilities and exposures.
It refers to dangers that have the potential to harm a system consciously or unconsciously.
These are malicious software that use various methods to hide their true purpose.
Vulnerability
Security hole, security gap.