Backdoor -
Brute Force -
Bug -
Exploit -
Payload -
Botnet (Zombie) -
Darknet -
DDos -
Social Engineering -
Phishing -
Buffer Overflow -
Phishing -
Buffer Overflow -
NTP -
Malware -
Virus -
Macro Virus -
Worm -
Rabbit -
Trojan -
Trojan -
0day -
Honey Pot -
Information Gathering -
Honey Pot -
Information Gathering -
Post Exploitation -
Rolling Distribution -
OCR -
MDM - Mobile Device Management -
BYOD - Bring Your Own Device -
Enterprise Wipe -
SSO - Single Sign On -
OTP - One Time Password -
RFID -
IPS -
IDS -
SIEM -
Clickjacking -
Clickjacking -
Firewall -
Cloud -
VPN -
Breach -
Penetration Testing -
Cloud -
VPN -
Breach -
Penetration Testing -
SSL -
WAF -
Sandbox -
NAC -
CSRF -
XSS -
SQLi -
Encryption -
Encryption -
BAU (Business as Usual) -