Cyber Law Analysis Glossary

Important definitions and terminologies used in Cyber Law Analysis

A

  • access and identity management in Cyber Law Analysis
  • access control in Cyber Law Analysis
  • access control mechanism in Cyber Law Analysis
  • access in Cyber Law Analysis
  • active attack in Cyber Law Analysis
  • active content in Cyber Law Analysis
  • advanced persistent threat in Cyber Law Analysis
  • adversary in Cyber Law Analysis
  • Adware in Cyber Law Analysis
  • air gap in Cyber Law Analysis
  • alert in Cyber Law Analysis
  • all source intelligence in Cyber Law Analysis
  • allowlist in Cyber Law Analysis
  • analyze in Cyber Law Analysis
  • antispyware software in Cyber Law Analysis
  • antivirus software in Cyber Law Analysis
  • APEC in Cyber Law Analysis
  • Application security in Cyber Law Analysis
  • asset in Cyber Law Analysis
  • asymmetric cryptography in Cyber Law Analysis
  • attack in Cyber Law Analysis
  • attack method in Cyber Law Analysis
  • attack mode in Cyber Law Analysis
  • attack path in Cyber Law Analysis
  • attack pattern in Cyber Law Analysis
  • attack signature in Cyber Law Analysis
  • attack surface in Cyber Law Analysis
  • attacker in Cyber Law Analysis
  • authenticate in Cyber Law Analysis
  • authentication in Cyber Law Analysis
  • authenticity in Cyber Law Analysis
  • authorization in Cyber Law Analysis
  • availability in Cyber Law Analysis

B

  • back door in Cyber Law Analysis
  • Bad Faith and Domain Name Infringement in Cyber Law Analysis
  • behavior monitoring in Cyber Law Analysis
  • biometrics in Cyber Law Analysis
  • black hat in Cyber Law Analysis
  • Blockchain technology in Cyber Law Analysis
  • blocklist in Cyber Law Analysis
  • blue Team in Cyber Law Analysis
  • bot herder in Cyber Law Analysis
  • bot in Cyber Law Analysis
  • bot master in Cyber Law Analysis
  • botnet in Cyber Law Analysis
  • Botnets in Cyber Law Analysis
  • bug in Cyber Law Analysis
  • build security in in Cyber Law Analysis
  • bypass in Cyber Law Analysis

C

  • capability in Cyber Law Analysis
  • Certifying Authority in Cyber Law Analysis
  • cipher in Cyber Law Analysis
  • ciphertext in Cyber Law Analysis
  • cloud computing in Cyber Law Analysis
  • Cloud security in Cyber Law Analysis
  • COE’s Convention in Cyber Law Analysis
  • collect & operate in Cyber Law Analysis
  • collection operations in Cyber Law Analysis
  • Computer crime in Cyber Law Analysis
  • Computer emergency response team (CERT) in Cyber Law Analysis
  • computer forensics in Cyber Law Analysis
  • computer network defense analysis in Cyber Law Analysis
  • computer network defense in Cyber Law Analysis
  • computer network defense infrastructure support in Cyber Law Analysis
  • computer security incident in Cyber Law Analysis
  • confidentiality in Cyber Law Analysis
  • consequence in Cyber Law Analysis
  • Consumer Protection in Cyber Law Analysis
  • continuity of operations plan in Cyber Law Analysis
  • Controller in Cyber Law Analysis
  • countermeasure in Cyber Law Analysis
  • cracker in Cyber Law Analysis
  • cracking in Cyber Law Analysis
  • critical infrastructure and key resources in Cyber Law Analysis
  • critical infrastructure in Cyber Law Analysis
  • cryptanalysis in Cyber Law Analysis
  • crypto keys in Cyber Law Analysis
  • cryptographic algorithm in Cyber Law Analysis
  • cryptography in Cyber Law Analysis
  • cryptology in Cyber Law Analysis
  • customer service and technical support in Cyber Law Analysis
  • Cyber Appellate Tribunal in Cyber Law Analysis
  • Cyber Crime Basics in Cyber Law Analysis
  • Cyber Crimes in Cyber Law Analysis
  • Cyber deterrence in Cyber Law Analysis
  • cyber ecosystem in Cyber Law Analysis
  • Cyber espionage in Cyber Law Analysis
  • Cyber espionage laws in Cyber Law Analysis
  • Cyber ethics in Cyber Law Analysis
  • cyber exercise in Cyber Law Analysis
  • Cyber extortion in Cyber Law Analysis
  • Cyber fraud in Cyber Law Analysis
  • Cyber Frauds in Cyber Law Analysis
  • Cyber harassment in Cyber Law Analysis
  • cyber incident in Cyber Law Analysis
  • Cyber incident response in Cyber Law Analysis
  • cyber incident response plan in Cyber Law Analysis
  • cyber infrastructure in Cyber Law Analysis
  • Cyber insurance claims in Cyber Law Analysis
  • Cyber insurance in Cyber Law Analysis
  • Cyber insurance policy in Cyber Law Analysis
  • Cyber intelligence in Cyber Law Analysis
  • Cyber law in Cyber Law Analysis
  • Cyber law litigation in Cyber Law Analysis
  • Cyber laws and regulations in Cyber Law Analysis
  • cyber operations in Cyber Law Analysis
  • cyber operations planning in Cyber Law Analysis
  • Cyber physical systems security in Cyber Law Analysis
  • Cyber risk assessment in Cyber Law Analysis
  • Cyber risk management in Cyber Law Analysis
  • Cyber sovereignty in Cyber Law Analysis
  • Cyber squatting in Cyber Law Analysis
  • cyber threat intelligence (CTI) in Cyber Law Analysis
  • Cyber trolling in Cyber Law Analysis
  • Cyber vigilantes in Cyber Law Analysis
  • Cyber warfare policy in Cyber Law Analysis
  • Cyber weapons in Cyber Law Analysis
  • Cyberattacks in Cyber Law Analysis
  • Cyberbullying in Cyber Law Analysis
  • Cybercrime in Cyber Law Analysis
  • Cybercrime laws in Cyber Law Analysis
  • Cybersecurity breach in Cyber Law Analysis
  • Cybersecurity culture in Cyber Law Analysis
  • Cybersecurity education in Cyber Law Analysis
  • Cybersecurity frameworks in Cyber Law Analysis
  • Cybersecurity governance in Cyber Law Analysis
  • Cybersecurity in Cyber Law Analysis
  • Cybersecurity incident in Cyber Law Analysis
  • Cybersecurity law enforcement in Cyber Law Analysis
  • Cybersecurity laws in Cyber Law Analysis
  • Cybersecurity operations center (SOC) in Cyber Law Analysis
  • Cybersecurity policy in Cyber Law Analysis
  • Cybersecurity risk assessment in Cyber Law Analysis
  • Cybersecurity standards in Cyber Law Analysis
  • Cybersecurity threat assessment in Cyber Law Analysis
  • Cybersecurity workforce in Cyber Law Analysis
  • Cyberspace Squatting in Cyber Law Analysis
  • Cyberstalking in Cyber Law Analysis
  • Cyberterrorism in Cyber Law Analysis
  • Cyberwarfare in Cyber Law Analysis

D

  • Dark web in Cyber Law Analysis
  • data administration in Cyber Law Analysis
  • data aggregation in Cyber Law Analysis
  • data breach in Cyber Law Analysis
  • Data breach response plan in Cyber Law Analysis
  • data integrity in Cyber Law Analysis
  • data leakage in Cyber Law Analysis
  • data loss in Cyber Law Analysis
  • data loss prevention in Cyber Law Analysis
  • data mining in Cyber Law Analysis
  • Data protection in Cyber Law Analysis
  • Data retention laws in Cyber Law Analysis
  • data spill in Cyber Law Analysis
  • data theft in Cyber Law Analysis
  • decipher in Cyber Law Analysis
  • decode in Cyber Law Analysis
  • decrypt in Cyber Law Analysis
  • decryption in Cyber Law Analysis
  • denial of service (DoS) in Cyber Law Analysis
  • denial of service in Cyber Law Analysis
  • Denial-of-service attacks in Cyber Law Analysis
  • designed-in security in Cyber Law Analysis
  • Digital citizenship in Cyber Law Analysis
  • Digital currency regulation in Cyber Law Analysis
  • Digital evidence in Cyber Law Analysis
  • Digital forensics in Cyber Law Analysis
  • Digital rights management in Cyber Law Analysis
  • Digital security in Cyber Law Analysis
  • Digital signature in Cyber Law Analysis
  • Dispute Resolution in Cyber Law Analysis
  • disruption in Cyber Law Analysis
  • distributed denial of service in Cyber Law Analysis
  • Distributed denial-of-service (DDoS) attacks in Cyber Law Analysis
  • Domain name disputes in Cyber Law Analysis
  • domain name in Cyber Law Analysis
  • dumpster diving in Cyber Law Analysis
  • dynamic attack surface in Cyber Law Analysis

E

  • E-Commerce in Cyber Law Analysis
  • E-discovery in Cyber Law Analysis
  • education and training in Cyber Law Analysis
  • Electronic Cheques Laws in Cyber Law Analysis
  • Electronic commerce law in Cyber Law Analysis
  • Electronic funds transfer fraud in Cyber Law Analysis
  • Electronic Signature Certificate issuance in Cyber Law Analysis
  • electronic signature in Cyber Law Analysis
  • Electronic signatures in Cyber Law Analysis
  • email in Cyber Law Analysis
  • Email privacy in Cyber Law Analysis
  • Email spoofing in Cyber Law Analysis
  • encipher in Cyber Law Analysis
  • encode in Cyber Law Analysis
  • encrypt in Cyber Law Analysis
  • Encryption in Cyber Law Analysis
  • Encryption key management in Cyber Law Analysis
  • End-to-end encryption in Cyber Law Analysis
  • enterprise risk management in Cyber Law Analysis
  • event in Cyber Law Analysis
  • exfiltration in Cyber Law Analysis
  • exploit in Cyber Law Analysis
  • exploitation analysis in Cyber Law Analysis
  • exposure in Cyber Law Analysis

F

  • failure in Cyber Law Analysis
  • Firewall in Cyber Law Analysis
  • Firewall policy in Cyber Law Analysis
  • forensics in Cyber Law Analysis
  • Fraudulent online reviews in Cyber Law Analysis

G

  • Geolocation tracking in Cyber Law Analysis
  • Geotagging privacy in Cyber Law Analysis
  • Global privacy laws in Cyber Law Analysis

H

  • hacker in Cyber Law Analysis
  • Hacking in Cyber Law Analysis
  • Hacktivism in Cyber Law Analysis
  • Hardware security in Cyber Law Analysis
  • hash value in Cyber Law Analysis
  • hashing in Cyber Law Analysis
  • hazard in Cyber Law Analysis
  • high risk application in Cyber Law Analysis
  • hijacking in Cyber Law Analysis
  • host in Cyber Law Analysis
  • Hypertext Markup Language (HTML) in Cyber Law Analysis

I

  • ICANN in Cyber Law Analysis
  • ict supply chain threat in Cyber Law Analysis
  • identity and access management in Cyber Law Analysis
  • Identity theft in Cyber Law Analysis
  • impact in Cyber Law Analysis
  • incident in Cyber Law Analysis
  • incident management in Cyber Law Analysis
  • incident response in Cyber Law Analysis
  • Incident response plan in Cyber Law Analysis
  • Indian Evidence Act in Cyber Law Analysis
  • indicator in Cyber Law Analysis
  • industrial control system in Cyber Law Analysis
  • information and communication(s) technology in Cyber Law Analysis
  • information assurance compliance in Cyber Law Analysis
  • Information assurance in Cyber Law Analysis
  • Information privacy law in Cyber Law Analysis
  • Information security governance in Cyber Law Analysis
  • Information security in Cyber Law Analysis
  • information security policy in Cyber Law Analysis
  • information sharing in Cyber Law Analysis
  • information system resilience in Cyber Law Analysis
  • information systems security operations in Cyber Law Analysis
  • information technology in Cyber Law Analysis
  • Infringement of Copyright in Cyber Law Analysis
  • inside( r) threat in Cyber Law Analysis
  • integrated risk management in Cyber Law Analysis
  • integrity in Cyber Law Analysis
  • Intellectual property law in Cyber Law Analysis
  • intent in Cyber Law Analysis
  • International Cyberspace Laws in Cyber Law Analysis
  • Internet censorship in Cyber Law Analysis
  • Internet governance in Cyber Law Analysis
  • Internet in Cyber Law Analysis
  • Internet law in Cyber Law Analysis
  • Internet of Things (IoT) security in Cyber Law Analysis
  • Internet of Things security regulation in Cyber Law Analysis
  • Internet Relay Chat (IRC) in Cyber Law Analysis
  • Internet service provider (ISP) in Cyber Law Analysis
  • Internet service provider liability in Cyber Law Analysis
  • interoperability in Cyber Law Analysis
  • intranet in Cyber Law Analysis
  • intrusion detection in Cyber Law Analysis
  • intrusion in Cyber Law Analysis
  • investigate in Cyber Law Analysis
  • investigation in Cyber Law Analysis
  • IP spoofing in Cyber Law Analysis
  • IPR Protection in Cyber Law Analysis
  • IT Act in Cyber Law Analysis
  • it asset in Cyber Law Analysis

J

  • Jurisdiction in cyberspace in Cyber Law Analysis

K

  • keystroke monitoring in Cyber Law Analysis
  • knowledge management in Cyber Law Analysis

L

  • leapfrog attack in Cyber Law Analysis
  • legal advice and advocacy in Cyber Law Analysis
  • letterbomb in Cyber Law Analysis
  • License To Issue Digital Signature in Cyber Law Analysis
  • Linking, Hyper linking and Framing in Cyber Law Analysis

M

  • machine learning and evolution in Cyber Law Analysis
  • macro virus in Cyber Law Analysis
  • malicious applet in Cyber Law Analysis
  • malicious code in Cyber Law Analysis
  • malicious logic in Cyber Law Analysis
  • Malvertising in Cyber Law Analysis
  • Malware in Cyber Law Analysis
  • mitigation in Cyber Law Analysis
  • Mobile banking security in Cyber Law Analysis
  • Mobile device management in Cyber Law Analysis
  • Mobile device security in Cyber Law Analysis
  • moving target defense in Cyber Law Analysis

N

  • Network access control (NAC) in Cyber Law Analysis
  • network resilience in Cyber Law Analysis
  • Network security in Cyber Law Analysis
  • network services in Cyber Law Analysis
  • Networking in Cyber Law Analysis
  • non-repudiation in Cyber Law Analysis

O

  • object in Cyber Law Analysis
  • Obscenity and Pornography in Cyber Law Analysis
  • OECD in Cyber Law Analysis
  • one-time password in Cyber Law Analysis
  • Online child protection in Cyber Law Analysis
  • Online Contracts in Cyber Law Analysis
  • Online dispute resolution in Cyber Law Analysis
  • Online fraud in Cyber Law Analysis
  • Online gambling regulation in Cyber Law Analysis
  • Online music piracy in Cyber Law Analysis
  • Online privacy in Cyber Law Analysis
  • Online reputation in Cyber Law Analysis
  • Online reputation management in Cyber Law Analysis
  • operate & maintain in Cyber Law Analysis
  • operational exercise in Cyber Law Analysis
  • operations technology in Cyber Law Analysis
  • outside( r) threat in Cyber Law Analysis
  • oversight & development in Cyber Law Analysis

P

  • packet in Cyber Law Analysis
  • packet sniffer in Cyber Law Analysis
  • passive attack in Cyber Law Analysis
  • password in Cyber Law Analysis
  • Password policies in Cyber Law Analysis
  • password sniffing in Cyber Law Analysis
  • Payment System in Cyber Law Analysis
  • pen register in Cyber Law Analysis
  • pen test in Cyber Law Analysis
  • penetration in Cyber Law Analysis
  • Penetration testing in Cyber Law Analysis
  • personal identifying information / personally identifiable information in Cyber Law Analysis
  • Phishing in Cyber Law Analysis
  • phracker in Cyber Law Analysis
  • phreaker in Cyber Law Analysis
  • piggyback in Cyber Law Analysis
  • piracy in Cyber Law Analysis
  • plaintext in Cyber Law Analysis
  • Power of the Police in Cyber Law Analysis
  • precursor in Cyber Law Analysis
  • preparedness in Cyber Law Analysis
  • Pretty Good Privacy (PGP) in Cyber Law Analysis
  • privacy in Cyber Law Analysis
  • Privacy-enhancing technologies in Cyber Law Analysis
  • private key in Cyber Law Analysis
  • probe in Cyber Law Analysis
  • protect & defend in Cyber Law Analysis
  • public key cryptography in Cyber Law Analysis
  • public key encryption in Cyber Law Analysis
  • public key in Cyber Law Analysis
  • public key infrastructure in Cyber Law Analysis
  • Public-key infrastructure (PKI) in Cyber Law Analysis

R

  • Ransomware in Cyber Law Analysis
  • recovery in Cyber Law Analysis
  • red team exercise in Cyber Law Analysis
  • red team in Cyber Law Analysis
  • redundancy in Cyber Law Analysis
  • Renewal and Suspension of The CA License in Cyber Law Analysis
  • resilience in Cyber Law Analysis
  • response in Cyber Law Analysis
  • response plan in Cyber Law Analysis
  • risk analysis in Cyber Law Analysis
  • risk assessment in Cyber Law Analysis
  • risk in Cyber Law Analysis
  • risk management in Cyber Law Analysis
  • risk mitigation in Cyber Law Analysis
  • risk-based data management in Cyber Law Analysis
  • rootkit in Cyber Law Analysis

S

  • secret key in Cyber Law Analysis
  • securely provision in Cyber Law Analysis
  • security automation in Cyber Law Analysis
  • Security Guidelines For CA in Cyber Law Analysis
  • security incident in Cyber Law Analysis
  • Security information and event management (SIEM) in Cyber Law Analysis
  • security policy in Cyber Law Analysis
  • security program management in Cyber Law Analysis
  • signature in Cyber Law Analysis
  • situational awareness in Cyber Law Analysis
  • smart card in Cyber Law Analysis
  • sniffer in Cyber Law Analysis
  • Social engineering in Cyber Law Analysis
  • Social media law in Cyber Law Analysis
  • software assurance and security engineering in Cyber Law Analysis
  • software assurance in Cyber Law Analysis
  • spam in Cyber Law Analysis
  • Spamming in Cyber Law Analysis
  • spillage in Cyber Law Analysis
  • spoofing in Cyber Law Analysis
  • Spyware in Cyber Law Analysis
  • strategic planning and policy development in Cyber Law Analysis
  • subject in Cyber Law Analysis
  • supervisory control and data acquisition in Cyber Law Analysis
  • supply chain in Cyber Law Analysis
  • supply chain risk management in Cyber Law Analysis
  • symmetric cryptography in Cyber Law Analysis
  • symmetric encryption algorithm in Cyber Law Analysis
  • symmetric key in Cyber Law Analysis
  • system administration in Cyber Law Analysis
  • system integrity in Cyber Law Analysis
  • systems development in Cyber Law Analysis
  • systems requirements planning in Cyber Law Analysis
  • systems security analysis in Cyber Law Analysis
  • systems security architecture in Cyber Law Analysis

T

  • tabletop exercise in Cyber Law Analysis
  • tailored trustworthy space in Cyber Law Analysis
  • targets in Cyber Law Analysis
  • Taxation in Cyber Law Analysis
  • technology research and development in Cyber Law Analysis
  • Terrorism in Cyber Law Analysis
  • test and evaluation in Cyber Law Analysis
  • The Liabilities of an ISP in Cyber Law Analysis
  • threat actor in Cyber Law Analysis
  • threat agent in Cyber Law Analysis
  • threat analysis in Cyber Law Analysis
  • threat assessment in Cyber Law Analysis
  • threat in Cyber Law Analysis
  • ticket in Cyber Law Analysis
  • traffic light protocol in Cyber Law Analysis
  • trap and trace device in Cyber Law Analysis
  • trojan horse in Cyber Law Analysis
  • Two-factor authentication (2FA) in Cyber Law Analysis

U

  • unauthorized access in Cyber Law Analysis
  • UNCITRAL in Cyber Law Analysis

V

  • virus in Cyber Law Analysis
  • vulnerability assessment and management in Cyber Law Analysis
  • vulnerability in Cyber Law Analysis

W

  • war dialer in Cyber Law Analysis
  • warez in Cyber Law Analysis
  • weakness in Cyber Law Analysis
  • Web Hosting in Cyber Law Analysis
  • Website in Cyber Law Analysis
  • Website privacy policy in Cyber Law Analysis
  • white hat in Cyber Law Analysis
  • white team in Cyber Law Analysis
  • WIPO in Cyber Law Analysis
  • Wireless network security in Cyber Law Analysis
  • wiretapping in Cyber Law Analysis
  • work factor in Cyber Law Analysis
  • worm in Cyber Law Analysis
  • WTO in Cyber Law Analysis

Z

  • Zero-day exploits in Cyber Law Analysis
Human Rights Law Glossary
Criminal Procedure Code Glossary

Get industry recognized certification – Contact us

keyboard_arrow_up