Glossário de cibersegurança
Os 100 termos mais relevantes para desenvolvimento profissional em cibersegurança. Mostramos aqui os já traduzidos. Para o catálogo completo (600+ termos), visite a versão em inglês.
Penetration TestingRed TeamExploitPayloadLateral MovementPrivilege EscalationSocial EngineeringPhishingSpear PhishingVishingSmishingPretextingWatering Hole AttackDrive-by DownloadZero-DayBuffer OverflowSQL InjectionCross-Site ScriptingCross-Site Request ForgeryRemote Code ExecutionCommand InjectionDirectory TraversalMan-in-the-MiddleSession HijackingCredential StuffingBrute Force AttackRainbow TablePass-the-HashKerberoastingLiving off the LandFileless MalwareRootkitBackdoorTrojanRansomwareWormBotnetCommand and ControlExfiltrationPivotingSIEMSOAREDRXDRMDRSOCNOCIDSIPSFirewallNext-Generation FirewallWeb Application FirewallData Loss PreventionNetwork Detection and ResponseThreat HuntingIncident ResponseDigital ForensicsMalware AnalysisReverse EngineeringSandboxingHoneypotCanary TokenDeception TechnologyThreat IntelligenceIndicators of CompromiseIndicators of AttackTactics, Techniques, and ProceduresMITRE ATT&CKKill ChainLog ManagementNetwork Traffic AnalysisVulnerability ScanningCIA TriadGovernance Risk and ComplianceRisk AssessmentRisk ManagementRisk AppetiteRisk ToleranceCompliance AuditInternal AuditControl FrameworkNIST 800-53ISO 27001ISO 27002SOC 2SOC 1PCI DSSHIPAAGDPRCCPACMMCFedRAMPFISMADISA STIGCIS ControlsCIS BenchmarksCOBITITILSecurity PolicyAcceptable Use Policy