0-9
A
- Abandonware
- Abnormal data
- Abstraction
- Abstract data type (ADT)
- Abstract method
- AC
- Account harvesting
- Account hijacking
- Account hijacking
- Accumulator
- Action
- Active learning
- Actuator
- AdaBoost
- Adaptive design
- ADC
- Address bar
- Address bar spoofing
- Address bus
- Address Resolution Protocol (ARP)
- Add-in
- Advanced Encryption Standard (AES)
- Advanced Persistent Threat (APT)
- Advanced Research Projects Agency Network (ARPANET)
- Adversarial examples
- Adversarial training
- Adware
- Ad blocker
- Ad fraud
- Ad rotator
- Affective computing
- AFRINIC
- Agent architecture
- Agent-based model (ABM)
- Aggregate function
- Agile software development
- Air gap
- Algorithm
- Algorithmic efficiency
- Algorithm design
- AlphaFold
- ALU
- Always-On
- Amazon Redshift
- Amazon Web Services (AWS)
- American Standard Code for Information Interchange (ASCII)
- Analog
- Android
- Android app
- AND Logic Gate
- Annoybot
- Annoyware
- Anomaly detection
- Anonymization
- Anonymizer
- Anonymous
- Antivirus
- Anti-ransomware
- Anti-virus (AV) killer
- Apache Hadoop
- Apache Hive
- Apache Pig
- Apache Spark
- APNIC
- Applet
- Application
- Application Programming Interface (API)
- Application security
- Application software
- ARIN
- Arithmetic and Logic Unit
- ARQ
- Array
- Array data structure
- Artifact
- Artificial Intelligence (AI)
- ASCII
- Assembly language
- Assertion
- Assignment
- Association rule learning
- Associative array
- Astroturfing
- Asymmetric cryptography
- Asymmetric encryption
- Asynchronous data transmission
- Attack vector
- Attention mechanism
- Attribute
- Attribution
- Augmented reality (AR)
- Authentication
- Authentication
- Autoencoders
- Autoencoders
- Automata theory
- Automata theory
- Automated reasoning
- Automated reasoning
- Automatic Repeat ReQuests
- Automatic Repeat ReQuests
- Autonomous system
- Autonomous system
- Autoregressive Integrated Moving Average (ARIMA)
- Autoregressive Integrated Moving Average (ARIMA)
- Auto-regressive models
- Auto-regressive models
B
- Backdoor
- Backdoor
- Back-translation
- Back-translation
- Bad sector
- Bad sector
- Bagging
- Bagging
- Bait advertising
- Bait advertising
- Ban
- Bandwidth
- Bandwidth throttling
- Banking trojan
- Barcode
- Bayesian networks
- Bayesian optimization
- Bayesian programming
- Behavior
- Behavioral biometrics
- Benchmark
- BERT
- BERTology
- Best, worst and average case
- Bias and Variance
- Bidirectional LSTM
- Big data
- Big data analytics
- Big O notation
- Big-game hunting (BGH)
- Binary
- Binary number
- Binary search algorithm
- Binary tree
- Biohacking
- Bioinformatics
- Biometrics
- BIOS
- Bit
- Bitcoin
- Bit rate (R)
- Blacklist
- Black friday
- Blended threat
- BLEU score
- Bloatware
- Block cipher
- Bluejacking
- Bluesnarfing
- Bluetooth
- Blue Screen of Death (BSoD)
- Blu-Ray
- BMP file format
- Boolean algebra
- Boolean data type
- Boolean expression
- Boot
- Booting
- Bootkit
- Boot sector
- Boot sector virus
- Bot
- Botnet
- Bot herder
- Boundary data
- Breadcrumbs
- Bricking
- Bring Your Own Device (BYOD)
- Browlock
- Browser Helper Object (BHO)
- Brute force attack
- Buffer
- Buffer overflow
- Bug bounty
- Bundler
- Bundleware
- Burn
- Bus
- Business continuity management (BCM)
- Business email compromise (BEC)
- Business process compromise (BPC)
- Byte
C
- Cache
- Callback
- CapsNet
- Cardinality (SQL)
- Cascading Stylesheets (CSS)
- CatBoost
- Categorical data
- CD
- Central Processing Unit (CPU)
- Central Tendency
- Character
- Character-based language models
- Checksum
- Check Digit
- Children’s Online Privacy Protection Act (COPPA)
- Chi-squared test
- Chrome browser
- Cipher
- Ciphertext
- CIR
- Class
- Class-based programming
- Cleanroom software engineering
- Clickbait
- Clickjacking
- Clickstream analysis
- Click fraud
- Client
- Client-server network
- Closure
- Cloud computing
- Cloud hosting
- Cloud Jupyter
- Cloud native
- Cloud notebook
- Cloud phishing
- Cloud security
- Clustering
- Cobalt strike
- CodeBERT
- Code library
- Coding
- Coding theory
- Cognitive science
- Cohort analysis
- Cold boot
- Collaborative filtering
- Collection
- Collinearity in regression analysis
- Columnstore indexes in SQL
- Column based database
- Comcast
- Command line interface
- Command & control (C&C)
- Comma separated values
- Comma-separated values (CSV)
- Compact disc
- Companion virus
- Compiler
- Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA)
- Complex data
- Composite key
- Compression
- Compromised
- Computability theory
- Computation
- Computational biology
- Computational chemistry
- Computational complexity theory
- Computational model
- Computational neuroscience
- Computational physics
- Computational science
- Computational steering
- Computer
- Computer architecture
- Computer data storage
- Computer ethics
- Computer graphics
- Computer network
- Computer program
- Computer programming
- Computer science
- Computer science (CS)
- Computer scientist
- Computer security
- Computer vision
- Computer-Aided Design (CAD)
- Computing
- Concatenation
- Concept keyboard
- Concurrency
- Conditional
- Confidence interval
- Confusion matrix
- Consistency check
- Constant
- Consumer fraud protection
- Container
- Content-Based Filtering
- Context Vectors
- Contingency Table
- Continuation-passing style (CPS)
- Continuous applications
- Continuous data
- Continuous intelligence
- Control bus
- Control flow
- Control system
- Convolutional Neural Networks (CNN)
- Cookie
- Cookies
- Copyright
- Coreference resolution
- Correlation analysis
- Correlation database
- Cosine similarity
- CPU
- Crack
- Cracking
- Creative Commons (CC)
- Credential stuffing
- Crimeware
- Cron
- Cross-site scripting (XSS)
- Cross-Validation
- Crypter
- Cryptocurrency
- Cryptocurrency mining
- Cryptography
- Cryptojacking
- CSV
- Current instruction register
- Customer data hub
- Customer Relationship Management (CRM)
- CVE identifier
- Cyberbullying
- Cybercrime
- Cybersecurity
- Cyberspace
- Cyber espionage
- Cyber liability insurance
- Cyber Monday
- CycleGAN
D
- Daemon
- DALL-E
- DALL-E 2
- Dashboard
- Dask
- Database
- Database index
- Database management system
- Database partitioning
- Database sharding
- Database transaction
- Dataframes
- Dataiku
- Data aggregation
- Data analysis platform
- Data breach
- Data bus
- Data center
- Data center proxy
- Data corruption
- Data encryption
- Data exfiltration
- Data fabric
- Data field
- Data fusion
- Data governance
- Data imputation
- Data integration
- Data lake
- Data Loss Prevention (DLP)
- Data mapping
- Data matching
- Data mesh
- Data mining
- Data munging
- Data normalization
- Data partitioning
- Data pipelines
- Data preprocessing
- Data Privacy Day (DPD)
- Data processed
- Data product
- Data protection
- Data protection act
- Data science
- Data science ethics
- Data scraping
- Data standardization
- Data structure
- Data transformation
- Data type
- Data visualization
- Data warehouse
- Data wrangling
- DAZN
- DBMS
- DDoS attack
- Debugging
- Decimal
- Declaration
- Decryptor
- Dedicated server
- Deepfake
- Deep learning
- Definition
- Defragmentation
- Denary
- Denoising autoencoders
- Dependency parsing
- Descriptive statistics
- Destruction Of Service (DeOS)
- Device control
- Device driver
- Dialer
- Dialogue interface
- Dictionary attack
- Differential privacy
- Digital camera
- Digital certificate
- Digital data
- Digital footprint
- Digital Signal Processing (DSP)
- Digital versatile disc
- Dimensionality reduction
- Discrete data
- Discrete Event Simulation (DES)
- Disk storage
- Distributed computing
- Distributed Denial of Service (DDoS)
- Divide and conquer algorithm
- DNA sequence
- DNS
- DNS filtering
- DNS over HTTPS (DoH)
- DNS over TLS (DoT)
- Docker
- Documentation
- Document Object Model (DOM)
- Domain
- Domain administrator privileges
- Domain Name System Security Extensions (DNSSEC)
- Domain Name System (DNS)
- DOS attack
- Double entry
- Double-precision floating-point format
- Download
- Downloader
- Dox
- DPA
- DPI (Deep Packet Inspection)
- DRAM
- Drive-by download
- Drive-by mining
- Dropper
- Drop-down box
- DVD
- DVD-RAM
- Dwell time
E
- Echo check
- Edge analytics
- Edge browser
- Edge device
- Electronic sports (eSports)
- ELMo
- ELT
- Embedded analytics
- Encryption
- Endpoint Detection and Response (EDR)
- Endpoint security
- End-user
- Enterprise data hub
- Enterprise Resource Planning (ERP)
- Entity
- Entity embeddings
- Entity linking
- Erroneous data
- EternalBlue
- EternalChampion
- EternalRomance
- Ethernet
- ETL
- ETL (Extract, Transform, Load)
- Event
- Event-driven architecture
- Event-driven programming
- Evolutionary algorithms
- Evolutionary computing
- Exception handling
- Executable
- Executable and Link Format (ELF)
- Executable module
- Execution
- Execution plan (SQL)
- Existence detection
- Exploit
- Exploit kit
- Exponential smoothing
- Expression
- Extended Validation SSL Certificate (EV SSL)
- External library
- Extreme data
F
- F1 score
- Family
- FastAPI
- Fast AI
- Fault-tolerant computer system
- Fear, uncertainty, and doubt (FUD)
- Feasibility study
- Feature engineering
- Feature extraction
- Feature importance
- Feature scaling
- Feature selection
- Fetch execute cycle
- Few-shot learning
- Field
- Filename extension
- File format
- File type
- File-based attack
- File-based database
- Filter (software)
- Fine-tuning
- Fingerprinting
- Firewall
- Firewalls
- Firmware
- Flash memory
- Flask
- Flat file database
- Floating point arithmetic
- Flowcharts
- Flux
- Foothold expansion
- Foreign key
- Formal methods
- Formal verification
- Format check
- For loop
- Foundation models
- Framework
- Fraud
- Freeware
- Free software
- Frequently Asked Questions (FAQ)
- Full duplex
- Functional programming
- Function as a Service (FaaS)
G
- Game theory
- Garbage in, garbage out (GIGO)
- Gaussian mixture models
- Gaussian processes
- GB
- General Data Protection Regulation (GDPR)
- Generative Adversarial Networks (GANs)
- Generative AI
- Genomics
- Gensim
- Geo proxing
- Ghostealth.com
- Gigabyte
- Globally unique identifier (GUID)
- Global variable
- GPU
- Gradient boosting
- Gradient descent
- Graphical User Interface (GUI)
- Graphics Interchange Format
- Graph neural networks
- Graph theory
- Graymail
- Greyware
- Grid search
- Griefing
- GUI
H
- Hacker
- Hacking
- Hacktivism
- Hacktivist
- Half duplex
- Hamiltonian Monte Carlo
- Handle
- Hard Disk Drive (HDD)
- Hard problem
- Hash function
- Hash table
- Hash value
- Heap
- Heapsort
- Heap spray
- Heap spraying
- Heartbleed
- HermeticWiper
- Heterogeneous graph neural networks
- Heuristic analysis
- Hexadecimal
- Hibernation
- Hidden Markov models
- Hierarchical Bayesian models
- High level languages
- Hijacker
- Hoax
- Homograph
- Homograph attacks
- Host
- Hosted Jupyter
- Hosted notebooks
- Hosting
- Host Intrusion Prevention System (HIPS)
- Host-based solution
- HTML
- HTTP
- HTTPS proxy
- HTTP proxy
- Hugging Face
- Human-Computer Interaction (HCI)
- Human-in-the-Loop
- Hybrid OLAP (HOLAP)
- Hybrid recommender systems
- Hyperlink
- Hyperparameter tuning
- Hypertext Markup Language (HTML)
- Hyper-Text Transfer Protocol Secure (HTTPS)
- Hyper-Text Transfer Protocol (HTTP)
I
- IDE
- Identifier
- Identity and Access Management (IAM)
- Identity theft
- IFTTT
- Image processing
- Imbalanced data
- Imperative programming
- Incident scope
- Incremental build model
- Independent component analysis
- Indexing strategies in SQL
- Indicator of Attack (IOA)
- Indicator of Compromise (IOC)
- Infection vector
- Information architecture
- Information retrieval
- Information space analysis
- Information Technology (IT)
- Information visualization
- Inheritance
- Initial access brokers (IABs)
- Injection attacks
- Input device
- Input mask
- Input/Output (I/O)
- Insertion sort
- Instruction cycle
- Integer
- Integrated Development Environment (IDE)
- Integration testing
- Intellectual Property (IP)
- Intelligent agent
- Interactive whiteboard
- Interface
- Internal documentation
- Internationalized domain names (IDN)
- Internet
- Internet bot
- Internet of Things (IoT)
- Internet Protocol version 4 (IPv6)
- Internet Protocol version 6 (IPv4)
- Internet Protocol (IP)
- Internet Service Provider (ISP)
- Internet streams
- Interpretability in machine learning
- Interpreter
- Interrupt
- Interrupt handler
- Intranet
- Intrusion Prevention System (IPS)
- Invariant
- Inverse reinforcement learning
- iOS
- IPsec
- IPv4
- IPv6
- IPv6 proxy
- IPv4 proxy
- IP address
- Isolation Forest
- Iteration
J
K
L
- Label encoding
- Label smoothing
- LACNIC
- LAN
- Large language models
- Latency
- Latent dirichlet allocation
- Latent semantic analysis
- Lateral movement
- Layered Service Provider (LSP)
- LCD screen
- LED screen
- Lemmatization
- Length check
- Library routine
- Library (computing)
- LightGBM
- Linear discriminant analysis
- Linear regression
- Linear search
- Link
- Linked list
- Linker
- Link prediction
- Linux
- List
- Loader
- Localhost
- Local administrator privileges
- Local Area Network (LAN)
- Logic error
- Logic programming
- Logistic regression
- Long Short-Term Memory (LSTM)
- Lossless compression
- Lossy compression
- Loss functions
- Low level languages
- Low-code app
M
- Machine code
- Machine Learning (ML)
- Machine Vision (MV)
- Machine-to-Machine (M2M)
- MacOS
- Macro
- Macro virus
- MAC address
- Madware
- Magecart
- Magnetic storage
- Mail bomb
- Malicious/Destructive payload
- Malspam
- Malvertising
- Malware
- Managed Detection and Response (MDR)
- Managed Service Provider (MSP)
- Many-to-many
- Many-to-one
- Man-in-the-Browser (MitB)
- Man-in-the-Middle (MitM)
- MapReduce
- MAR
- Markov Chain Monte Carlo (MCMC)
- Masked language models
- Master Boot Record (MBR)
- Mathematical logic
- Matrix
- Max pooling
- MDR
- Mean shift clustering
- Memory
- Memory address register
- Memory data register
- Memory dump
- Memory resident
- Merge sort
- Metadata
- Metaflow
- Meta-learning
- Method
- Methodology
- Metropolitan Area Network (MAN)
- Microphone
- Middelware
- MIDI
- Miner
- Mitigation
- MITRE ATT&CK framework
- Mixed reality
- MLflow
- MLOps platforms
- MLOps (Machine Learning Operations)
- Mobile proxy
- Mobile responsive
- Mobile security
- Model drift
- Model evaluation
- Model monitoring
- Modem
- Money mule
- Mouse
- Mozilla Firefox browser
- MP4
- MP3
- Multilabel classification
- Multilayer Perceptron (MLP)
- Multimedia Messaging Service (MMS)
- Multimodal learning
- Multimodal pre-training
- Multiplatform
- Multitask learning
- Multi-Dimensional OLAP (MOLAP)
- Multi-Factor Authentication (MFA)
- Multi-table join
- Multi-tenancy
- Mumblehard malware
N
- Naive bayes
- Named Entity Recognition (NER)
- NAND logic gate
- National Cyber Security Centre (NCSC)
- National Institute of Standards and Technology (NIST)
- National Security Agency (NSA)
- Natural Language Generation (NLG)
- Natural Language Processing (NLP)
- NAT (Network Address Translation)
- Near-Field Communication (NFC)
- Network
- Network interface card
- Network perimeter
- Network segmentation
- Net neutrality
- Neural networks
- NewTab
- Next Generation Antivirus (NGAV)
- NIC
- Nmap
- Node
- Nominal data
- Non-negative Matrix Factorization (NMF)
- Non-Volatile
- Normalization
- Normalization in Data Preprocessing
- Normal data
- NOR logic gate
- NoSQL
- NOT logic gate
- Number theory
- Numerical analysis
- Numerical method
- NumPy
- N-grams
O
- Obfuscation
- Object
- Object code
- Object detection
- Object recognition
- Object-Oriented Analysis and Design (OOAD)
- Object-Oriented Programming (OOP)
- ODBC connection
- OLAP database
- One-hot encoding
- One-shot learning
- One-to-one
- OpenAI Five
- OpenSSL
- Open source
- Open Systems Interconnection (OSI)
- Open-Source Software (OSS)
- Operating System (OS)
- Operational AI
- Opera browser
- Opportunistic attack
- Optical fiber
- Optical storage
- Optimization algorithms
- Ordinal data
- Ordinal regression
- OR logic gate
- OS
- Outlier detection
- Output device
- Out-of-distribution detection
- Overfitting in machine learning
P
- Packer
- Packet switching
- PageRank
- Pair programming
- PAN
- Pandas
- Pandas profiling
- Parallel computing
- Parallel data transmission
- Parameter
- Paraphrasing
- Parity check
- Parquet
- Part-of-Speech (POS) tagging
- Passcode
- Passphrase
- Password
- Password cracking
- Password cracking application
- Password guessing
- Password manager
- Patch management software
- Payload
- PayPal
- PC
- Peer-to-Peer Network
- Peer-to-Peer (P2P)
- Penetration testing
- Peopleware
- Perceptron
- Peripheral
- Personally Identifiable Data
- Personally Identifiable Information (PII)
- Personal area network
- Personal Identification Number (PIN)
- Pharma
- Pharming
- Phishing
- Phishing attack
- Phishing kit
- Phreaking
- Pivot table
- Plagiarism
- Plaintext
- Platform
- Plotly
- Plugin
- Pointer
- Point-of-Sale (PoS) malware
- Polymorphism
- Polynomial regression
- Portable device
- Portable Executable (PE) file header
- Port Finder
- Postcondition
- PowerShell
- Power user
- PPTP
- Precision
- Precondition
- Predictive analytics
- Preinstalled software
- Presence check
- Pre-trained language models
- Primary key
- Primary storage
- Primitive data type
- Priority queue
- Private proxy
- Privilege escalation
- Procedural programming
- Procedure
- Professional Service Automation (PSA)
- Programming language
- Programming language implementation
- Programming language theory
- Program counter
- Program lifecycle phase
- Progressive Web Apps (PWAs)
- Prolog
- Proof of concept
- Prophet
- Protector
- Protocol
- Proxifier
- Proximal policy optimization
- Proxy
- Proxy list
- Proxy server
- Proxy servers
- Proxy service
- Pseudocode
- Public proxy
- PUM
- Punycode
- PUP
- Pyro
- PySpark
- Python
- PyTorch
- PyTorch Lightning
- P-value
Q
R
- Radix
- RAM scraping
- Random Access Memory (RAM)
- Random forests
- Random sample
- Range check
- Ransomware
- Ransomware-as-a-service
- RAR
- Raw data
- Ray
- RDBMS
- Recall
- Recon
- Record
- Recursion
- Recursive Common Table Expressions (CTEs)
- Redundancy
- Reference
- Reference counting
- Referential integrity
- Register
- Regression
- Regression testing
- Regularization (L1, L2)
- Regularized greedy forest
- Relational database
- Relational OLAP
- Reliability engineering
- Remediation
- Remote access
- Remote Administration Tool (RAT)
- Remote Code Execution (RCE) attack
- Remote Desktop Protocol (RDP)
- Remote Monitoring and Management (RMM)
- Remote user
- Requirements analysis
- Residential proxy
- Responsive design
- Retrovirus
- RIPE
- Riskware
- Robocall
- Robotics
- ROM
- Rootkit
- Round-off error
- Router
- Routing table
- RunPE technique
- Run time
- Run time error
- R programming language
- R-squared
S
- S3 bucket
- SaaS
- Safe mode
- Sampling techniques
- Sandbox solution
- Scala
- Scam
- Scanner
- Schema
- Scikit-learn
- Screenlocker
- Screen scraper
- Script kiddie
- Search algorithm
- Search neutrality
- Seasonal Decomposition of a Time Series (STL)
- Secondary storage
- Secure Sockets Layer (SSL)
- Security Information and Event Management (SIEM)
- Security Orchestration, Automation and Response (SOAR)
- Seed
- Selection sort
- Selection statement
- Self-supervised learning
- Semantics
- Semantic Parsing
- Semantic role labeling
- Semi-structured data
- Semi-supervised learning
- Sensor
- Sentiment analysis
- SEO
- Sequence
- Sequence transduction
- Sequence-to-Sequence models (Seq2Seq)
- Serializability
- Serialization
- Serial data transmission
- SERP
- Server
- Serverless
- Server Message Block (SMB)
- Server-side scripting
- Service layer
- Service-level agreement (SLA)
- Set
- Sextortion
- Shadowsocks
- Shared hosting
- Shared proxy
- Shareware
- Shimming
- SIEM
- Signature
- Similarity metrics
- SIMjacking
- Simplex
- Singleton variable
- Skimming
- Smart home
- Smart TV
- SMOTE
- SMS phishing (Smishing)
- Snowflake
- SOC
- Social engineering
- Social networks
- SOCKS
- SOCKS4
- SOCKS5
- SOCKS5 proxy
- SOCKS proxy
- Software
- Software agent
- Software construction
- Software delivery layer
- Software deployment
- Software design
- Software development
- Software Development Kit (SDK)
- Software development process
- Software engineering
- Software maintenance
- Software prototyping
- Software requirements specification
- Software testing
- Software vulnerability
- Software-as-a-Service
- Soft computing
- Solid state
- Solid State Drive (SSD)
- Sorting algorithm
- Source code
- spaCy
- Spam
- Spambot
- Spear phishing
- Spiral model
- Spyware
- SQL
- SQL injection
- SRAM
- SSD
- SSL certificate
- Stack
- Stalkerware
- State
- Statement
- Steganography
- Stemming in Natural Language Processing
- Stochastic gradient descent
- Stopword removal
- Storage
- Stream
- Stream cipher
- String
- Structured storage
- Subroutine
- Supply-chain attack
- Suspicious activity
- Symbian malware
- Symbolic computation
- Symmetric encryption
- Synchronous data transmission
- Syntax
- Syntax error
- System console
- System on a Chip (SoC)
- System optimizer
T
- Table
- Table view
- TabNet
- Tab separated values
- Targeted attack
- TCP
- Teacher forcing
- Technical documentation
- Telegram
- Tensorflow
- Term Frequency-Inverse Document Frequency (TF-IDF)
- Text generation
- Text summarization
- Text-to-Image synthesis
- The United States Computer Emergency Readiness Team (US-CERT)
- Third party
- Third party patch management
- Third-generation programming language
- Threat actor
- Threat detection and response
- Threat hunting
- Threat intelligence
- Threat modeling
- Time series decomposition
- Time series forecasting
- Time series snalysis
- TLD
- Token
- Tokenization in natural language processing
- Tokenization strategies
- Topic Modeling
- Topic modeling algorithms (LDA, NMF, PLSA)
- Top-down and bottom-up design
- Torrent
- Torrent client
- Tor browser
- Touchscreen
- Trackball
- Trackware
- Training and test sets in machine learning
- Transfer learning
- Transformers in natural language processing
- Transformer-XL
- Translator
- Transport Layer Security (TLS)
- Trans-border data flow
- Trax library
- Tree
- Trojan
- Trolling
- Troubleshooting
- Truth table
- Turing test
- Type check
- Type theory
- Typosquatting
- T-test
U
- Ubiquitous computing (Ubicomp)
- Ubuntu
- UDP
- Underfitting
- Unicode
- Unicode Transformation Format (UTF)
- Uniform Resource Locator (URL)
- Universal authentication
- Universal Serial Bus (USB)
- UNIX
- Unstructured data
- Unsupervised learning
- Uplift modeling
- Upload
- Urban legend
- URL
- USB attack
- USB boot
- Usenet
- User
- User agent
- User interface
- User interface design
- User interface (UI)
V
- Validation
- Vapnik-Chervonenkis (VC) dimension
- Vaporware
- Variable
- Variant
- Variational autoencoders
- Vector quantization
- Vector Quantized Generative Adversarial Network (VQGAN)
- Verification
- Version control
- Version control systems (Git, SVN)
- Virgin proxy
- Virtual Machine (VM)
- Virtual memory
- Virtual Private Network (VPN)
- Virtual Private Server (VPS)
- Virtual Reality (VR)
- Virus
- Virus hoax
- Vishing
- Visual check
- Visual spoofing
- ViT (Vision Transformer)
- VLAN
- VM-aware
- Voice authentication
- Voice over Internet Protocol (VoIP)
- Voice phishing (Vishing)
- Voice Synthesis
- Volatile
- Volume-based pricing software
- Vulnerabilities
- V-model
W
- Walled garden
- WAN
- WAP
- Warez
- Warm boot
- Warm standby
- WASP
- Waterfall model
- Watering hole attack
- Waveform audio file format
- Wayback Machine
- Wearable computer
- Wearable device
- Web
- Webhooks
- Weblink
- Website
- Website defacement
- Website monitoring
- Website spoofing
- Web application security
- Web browser
- Web cache
- Web crawler
- Web inject
- Web scraping
- Web server
- Web skimmer
- Web-enabled
- Weighted ensemble
- Wetware
- Whack-a-mole
- Whaling
- Whitelist
- White hat hacker
- White Screen of Death (WSoD)
- White space padding
- Whoer
- WHOIS
- Wide and deep learning
- Wide Area Network (WAN)
- Windows
- Windows Sockets API (Winsock)
- WireGuard
- Wireless
- Wiretap trojan
- Wi-Fi
- WLAN
- Word embeddings (Word2Vec, GloVe, FastText)
- World Wide Web (WWW)
- Worm
- WoT
- WPA
- WPA2
- WPAN
- WPA-PSK
- Write protection
- WYSIWYG