INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Government and Critical Infrastructure CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 9h Global malware Financial Services / Cryptocurrency CRITICAL 10h Global insider Cloud Computing and SaaS HIGH 11h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 11h Global ransomware Corporate/Enterprise CRITICAL 12h Global ransomware Retail/E-commerce HIGH 13h Global vulnerability Software Development and AI/ML Services CRITICAL 14h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 16h Global phishing Enterprise/Information Technology HIGH 17h Global vulnerability Government and Critical Infrastructure CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 9h Global malware Financial Services / Cryptocurrency CRITICAL 10h Global insider Cloud Computing and SaaS HIGH 11h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 11h Global ransomware Corporate/Enterprise CRITICAL 12h Global ransomware Retail/E-commerce HIGH 13h Global vulnerability Software Development and AI/ML Services CRITICAL 14h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 16h Global phishing Enterprise/Information Technology HIGH 17h Global vulnerability Government and Critical Infrastructure CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 9h Global malware Financial Services / Cryptocurrency CRITICAL 10h Global insider Cloud Computing and SaaS HIGH 11h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 11h Global ransomware Corporate/Enterprise CRITICAL 12h Global ransomware Retail/E-commerce HIGH 13h Global vulnerability Software Development and AI/ML Services CRITICAL 14h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 16h Global phishing Enterprise/Information Technology HIGH 17h

🔐 Cybersecurity Glossary

Over 264 professional cybersecurity terms in English & Arabic — your comprehensive reference for the cybersecurity world

264 terms 15 categories 46 frameworks
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
⭐ Featured Terms
264 terms
🏛 Acceptable Use Policy AUP
سياسة الاستخدام المقبول
A document that outlines the rules and guidelines for using an organization's information technology resources.
🔑 Access Control List ACL
قائمة التحكم بالوصول
A list of permissions attached to a system resource that specifies which users or system processes are granted access.
🔐 Advanced Encryption Standard AES
معيار التشفير المتقدم
A symmetric block cipher chosen by the US government to protect classified information, using key sizes of 128, 192, or 256 bits.
Advanced Persistent Threat APT
التهديد المتقدم المستمر
A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.
§ Anonymization
إخفاء الهوية
The process of removing personally identifiable information from data so individuals cannot be identified.
💻 API Security
أمن واجهات البرمجة
The practice of protecting Application Programming Interfaces from attacks and misuse.
🛡 Attack Simulation BAS
محاكاة الهجوم
Breach and Attack Simulation — automated tools that continuously test security controls by simulating real-world attacks.
Attack Surface
سطح الهجوم
The total sum of all vulnerabilities and entry points that an attacker could potentially exploit.
Audit Trail
مسار التدقيق
A chronological record of system activities that provides documentary evidence of the sequence of activities that have affected operations, procedures, or events.
🔒 Backup Encryption
تشفير النسخ الاحتياطي
The practice of encrypting backup data to protect it from unauthorized access if backup media is lost or stolen.
🔑 Biometric Authentication
المصادقة البيومترية
Authentication method using unique biological characteristics such as fingerprints, facial recognition, or iris patterns.
🛡 Blue Team
الفريق الأزرق
A group of security professionals responsible for defending against simulated and real attacks.
🏛 Board Cybersecurity Oversight
إشراف المجلس على الأمن السيبراني
The responsibility of the board of directors to oversee the organization's cybersecurity strategy and risk management.
Brute Force Attack
هجوم القوة الغاشمة
An attack method that uses trial and error to guess passwords, login credentials, or encryption keys.
💻 Bug Bounty
مكافأة اكتشاف الثغرات
A program offered by organizations that rewards security researchers for responsibly reporting vulnerabilities.
Business Continuity Plan BCP
خطة استمرارية الأعمال
A documented plan that outlines how an organization will continue operating during and after a disruptive event.
Business Email Compromise BEC
اختراق البريد الإلكتروني للأعمال
A sophisticated scam targeting organizations that regularly perform wire transfers, exploiting compromised executive email accounts.
🏛 Business Email Compromise Prevention BEC Prevention
منع اختراق البريد الإلكتروني للأعمال
A strategic security approach combining technical controls, user awareness training, and governance policies to prevent sophisticated email fraud attacks targeting organizations. This includes implementing verification procedures for financial transactions, executive impersonation detection, and incident response protocols.
Business Impact Analysis BIA
تحليل تأثير الأعمال
A process that identifies and evaluates the potential effects of disruption to critical business operations.
🚨 Chain of Custody
سلسلة الحفظ
The documented chronological history of the handling and transfer of digital evidence.
🏛 Chief Information Security Officer CISO
مسؤول أمن المعلومات الرئيسي
Senior executive responsible for establishing and maintaining the enterprise cybersecurity vision, strategy, and program to ensure information assets and technologies are adequately protected.
Cloud Access Security Broker CASB
وسيط أمن الوصول السحابي
A security policy enforcement point placed between cloud service consumers and providers to enforce enterprise security policies.
🇸🇦 Cloud Cybersecurity Controls CSCC
ضوابط الأمن السيبراني للحوسبة السحابية
NCA's controls specifically designed for securing cloud computing services used by Saudi entities.
Cloud Security Posture Management CSPM
إدارة الوضع الأمني السحابي
Automated tools that continuously monitor cloud infrastructure for gaps in security policy enforcement.
Cloud Workload Protection Platform CWPP
منصة حماية أعباء العمل السحابية
A security solution focused on protecting workloads across cloud, on-premises, and hybrid environments.
💻 Code Review
مراجعة الشفرة البرمجية
A systematic examination of source code to find and fix mistakes overlooked in initial development.
Common Vulnerabilities and Exposures CVE
الثغرات والتعرضات الشائعة
A publicly disclosed list of cybersecurity vulnerabilities, each assigned a unique identifier for tracking and reference.
Common Vulnerability Scoring System CVSS
نظام تسجيل الثغرات المشترك
An open framework for communicating the characteristics and severity of software vulnerabilities using a numerical score from 0 to 10.
🇸🇦 Communications, Space & Technology Commission CST
هيئة الاتصالات والفضاء والتقنية
The Saudi regulatory body overseeing the ICT sector including telecommunications security requirements.
Compensating Control
الضابط التعويضي
An alternative security measure employed when the primary control cannot be implemented.
🚨 Computer Security Incident Response Team CSIRT
فريق الاستجابة لحوادث أمن الحاسب
A team of IT security experts responsible for managing and responding to cybersecurity incidents.
§ Consent
الموافقة
A freely given, specific, informed, and unambiguous indication of the data subject's agreement to the processing of their personal data.
Container Security
أمن الحاويات
The practice of securing containerized applications and their infrastructure from development through production.
🚨 Containment
الاحتواء
The phase of incident response focused on limiting the scope and damage of a security incident.
Continuous Authentication CA
المصادقة المستمرة
A Zero Trust security mechanism that continuously validates user identity and device trustworthiness throughout a session, rather than only at initial login. It monitors behavioral patterns, device posture, location, and contextual factors in real-time to detect anomalies and dynamically adjust access privileges or terminate sessions when risk levels change.
Continuous Compliance
الامتثال المستمر
An automated approach to maintaining compliance with regulations and standards through continuous monitoring and assessment.
Control Objective
هدف الضابط الرقابي
A statement of the desired result or purpose to be achieved by implementing a security control.
Corrective Action
الإجراء التصحيحي
An action taken to eliminate the cause of a detected nonconformity to prevent recurrence.
Credential Stuffing
حشو بيانات الاعتماد
An automated attack that uses stolen username/password pairs from data breaches to attempt logins on other services.
Crisis Management
إدارة الأزمات
The overall coordination of an organization's response to a crisis that threatens the organization or its stakeholders.
🇸🇦 Critical National Infrastructure CNI
البنى التحتية الوطنية الحساسة
Systems and assets vital to Saudi Arabia's national security, economy, or public health that require enhanced cybersecurity protection.
§ Cross-Border Data Transfer
نقل البيانات عبر الحدود
The transfer of personal data from one country to another, subject to legal restrictions and adequacy requirements.
Cross-Border Data Transfer Compliance CBDT
الامتثال لنقل البيانات عبر الحدود
The regulatory requirements under PDPL for transferring personal data outside Saudi Arabia, requiring data controllers to ensure adequate protection levels in the receiving country, obtain necessary approvals, implement appropriate safeguards such as standard contractual clauses, and maintain accountability for data protection throughout the transfer process.
Cross-Site Scripting XSS
البرمجة عبر المواقع
A web security vulnerability that allows attackers to inject client-side scripts into web pages viewed by other users.
Cryptojacking
التعدين الخبيث
The unauthorized use of someone else's computing resources to mine cryptocurrency.
Cyber Incident Notification CIN
الإخطار بالحوادث السيبرانية
The mandatory process of reporting cybersecurity incidents to relevant regulatory authorities, affected parties, and stakeholders within specified timeframes, including details about the nature, scope, and impact of the incident as required by applicable regulations.
Cyber Incident Reporting
الإبلاغ عن الحوادث السيبرانية
The mandatory or voluntary process of notifying relevant authorities, stakeholders, and affected parties about cybersecurity incidents within specified timeframes. In Saudi Arabia, this includes reporting to NCA for critical infrastructure and SAMA for financial institutions.
Cyber Insurance
التأمين السيبراني
Insurance products designed to help organizations mitigate financial losses from cybersecurity incidents and data breaches.
🇸🇦 Cyber Resilience
المرونة السيبرانية
An organization's ability to continuously deliver intended outcomes despite adverse cyber events, as required by NCA.
🛡 Cyber Threat Intelligence Platform TIP
منصة استخبارات التهديدات السيبرانية
A technology platform that aggregates, correlates, and analyzes threat data from multiple sources to provide actionable intelligence.
Cybersecurity Asset Management CAM
إدارة أصول الأمن السيبراني
An NCA ECC control domain requiring organizations to maintain a comprehensive inventory of all information assets, including hardware, software, data, and network components, with proper classification, ownership assignment, and lifecycle management to ensure adequate protection measures.
Cybersecurity Defense CD
الدفاع السيبراني
The second domain of the NCA ECC framework that encompasses technical and operational controls for protecting information systems, networks, and data, including access control, network security, encryption, vulnerability management, and security monitoring capabilities.
🏛 Cybersecurity Framework CSF
إطار الأمن السيبراني
A structured set of guidelines and best practices designed to help organizations manage and reduce cybersecurity risk.
Cybersecurity Governance CG
حوكمة الأمن السيبراني
The first domain of the NCA ECC framework that establishes requirements for organizational leadership, cybersecurity strategy, policies, risk management, and compliance programs to ensure effective oversight and accountability for cybersecurity across the organization.
Cybersecurity Governance Domain SAMA CSF Domain 1
مجال حوكمة الأمن السيبراني
The first domain of SAMA CSF that requires financial institutions to establish comprehensive cybersecurity governance structures, including board-level oversight, cybersecurity strategy, risk management frameworks, policies and procedures, and organizational roles and responsibilities for managing cybersecurity risks.
Cybersecurity Incident Response and Management CIRM
الاستجابة والإدارة لحوادث الأمن السيبراني
An NCA ECC control domain requiring organizations to establish formal capabilities for detecting, analyzing, containing, eradicating, and recovering from cybersecurity incidents, including mandatory reporting to NCA within specified timeframes for incidents affecting critical systems or sensitive data.
🇸🇦 Cybersecurity Maturity Assessment
تقييم نضج الأمن السيبراني
NCA's periodic assessment of government entities' cybersecurity maturity against ECC controls.
Cybersecurity Maturity Level CML
مستوى نضج الأمن السيبراني
A classification system within the NCA ECC framework that categorizes organizations into different maturity levels (Basic, Intermediate, Advanced) based on their criticality and risk profile, determining the depth and rigor of cybersecurity controls they must implement.
Cybersecurity Resilience and Business Continuity SAMA CSF Domain 3
المرونة السيبرانية واستمرارية الأعمال
The third domain of SAMA CSF requiring financial institutions to develop and maintain capabilities to withstand, respond to, and recover from cybersecurity incidents, including incident response plans, business continuity and disaster recovery programs, backup strategies, and regular testing exercises to ensure operational resilience.
🔒 Data at Rest
البيانات المخزنة
Data that is stored in databases, file systems, or other storage systems and is not actively being transmitted or processed.
§ Data Breach
انتهاك البيانات
A security incident in which sensitive, protected, or confidential data is accessed, disclosed, or stolen by an unauthorized party.
🔒 Data Classification
تصنيف البيانات
The process of organizing data by relevant categories so that it can be protected and used more efficiently according to its sensitivity level.
§ Data Controller
المتحكم بالبيانات
The entity that determines the purposes and means of processing personal data.
🔒 Data in Transit
البيانات أثناء النقل
Data that is actively moving from one location to another, such as across the internet or through a private network.
🔒 Data Lifecycle Management DLM
إدارة دورة حياة البيانات
A policy-based approach to managing the flow of data through its lifecycle from creation and storage to deletion.
🔒 Data Loss Prevention DLP
منع فقدان البيانات
A set of tools and processes to ensure sensitive data is not lost, misused, or accessed by unauthorized users.
🔒 Data Masking
إخفاء البيانات
The process of hiding specific data within a database to ensure that sensitive data is not exposed to unauthorized personnel.
§ Data Portability
نقل البيانات
The right of data subjects to receive their personal data in a structured, commonly used, machine-readable format.
🏛 Data Privacy Impact Assessment DPIA
تقييم أثر خصوصية البيانات
A systematic process to identify and minimize privacy risks associated with processing personal data, particularly when implementing new technologies or systems. This assessment evaluates potential impacts on individuals' privacy rights and determines appropriate safeguards and mitigation measures.
§ Data Processor
معالج البيانات
An entity that processes personal data on behalf of the data controller.
§ Data Protection Impact Assessment DPIA
تقييم أثر حماية البيانات
A process to identify and minimize the data protection risks of a project or system.
§ Data Protection Officer DPO
مسؤول حماية البيانات
A designated person responsible for overseeing data protection strategy and compliance within an organization.
🔒 Data Sovereignty
سيادة البيانات
The concept that data is subject to the laws and governance structures within the nation where it is collected or processed.
Data Subject Rights DSR
حقوق صاحب البيانات
Rights granted to individuals under PDPL including the right to access, rectify, erase, restrict processing, data portability, and object to processing of their personal data, which organizations must facilitate and respond to within specified timeframes.
Deepfake
التزييف العميق
AI-generated synthetic media used to impersonate individuals through manipulated audio, video, or images.
🏛 Defense in Depth DiD
الدفاع المتعمق
A cybersecurity strategy that uses multiple layers of security controls to protect information assets, so if one layer fails, another is in place.
🌐 Demilitarized Zone DMZ
المنطقة منزوعة السلاح
A perimeter network segment that sits between the internal network and the external network to provide an additional layer of security.
💻 DevSecOps
تطوير الأمن والعمليات
The practice of integrating security testing and protection at every stage of the software development lifecycle.
🚨 Digital Forensics DFIR
التحقيق الجنائي الرقمي
The process of collecting, preserving, and analyzing electronic evidence for investigating cybersecurity incidents.
Digital Forensics and Incident Analysis DFIR
التحليل الجنائي الرقمي وتحليل الحوادث
The systematic collection, preservation, analysis, and documentation of digital evidence from security incidents to determine the root cause, scope of compromise, attack vectors, and support legal proceedings or regulatory reporting.
🚨 Digital Forensics and Incident Response DFIR
الطب الجنائي الرقمي والاستجابة للحوادث
Combination of digital forensics (evidence collection and analysis) and incident response (containment, eradication, recovery) disciplines. DFIR is required by SAMA CSF TM domain and Saudi CERT recommends DFIR-trained personnel for regulated entities.
Digital Forensics and Incident Response (DFIR) DFIR
الطب الشرعي الرقمي والاستجابة للحوادث
The combined practice of collecting, preserving, analyzing, and presenting digital evidence from cybersecurity incidents while simultaneously containing and remediating the threat. It ensures evidence integrity for potential legal proceedings while enabling rapid recovery and lessons learned documentation.
🔐 Digital Signature
التوقيع الرقمي
A mathematical scheme for verifying the authenticity and integrity of digital messages or documents.
🔑 Directory Service
خدمة الدليل
A centralized database that stores and manages user identities, credentials, and access permissions (e.g., Active Directory, LDAP).
Disaster Recovery Plan DRP
خطة التعافي من الكوارث
A documented process for recovering IT infrastructure and systems following a natural or man-made disaster.
Distributed Denial of Service DDoS
هجوم حجب الخدمة الموزع
An attack that overwhelms a target system with traffic from multiple sources, making it unavailable to legitimate users.
🌐 Domain Name System Security Extensions DNSSEC
امتدادات أمن نظام أسماء النطاقات
A suite of extensions to DNS that adds security by enabling DNS responses to be validated as authentic.
🏛 Domain-based Message Authentication DMARC
مصادقة الرسائل المستندة إلى النطاق
An email authentication protocol that builds on SPF and DKIM to provide domain owners with protection against unauthorized use of their domain in email attacks. DMARC enables senders to specify how receiving mail servers should handle messages that fail authentication checks and provides reporting mechanisms for monitoring.
🏛 Due Diligence
العناية الواجبة
The practice of performing adequate research and assessment before making decisions about security investments, partnerships, or vendor engagements.
💻 Dynamic Application Security Testing DAST
اختبار أمان التطبيقات الديناميكي
A security testing method that tests an application in its running state to find vulnerabilities from an external perspective.
ECC Compliance Assessment ECC-CA
تقييم الامتثال للضوابط الأساسية
A mandatory periodic evaluation process conducted by organizations subject to NCA ECC requirements to measure their adherence to the prescribed cybersecurity controls. The assessment involves self-evaluation, documentation review, technical testing, and may include third-party audits. Organizations must submit compliance reports to the NCA demonstrating implementation status, identified gaps, and remediation plans, with assessments typically required annually or following significant system changes.
ECC Cybersecurity Maturity Level ECC ML
مستوى نضج الأمن السيبراني للضوابط الأساسية
A classification system within the NCA ECC framework that defines three progressive maturity levels for implementing cybersecurity controls based on organizational risk profile and criticality. Level 1 represents basic cybersecurity practices, Level 2 indicates intermediate security measures, and Level 3 denotes advanced security capabilities. Organizations must achieve the maturity level appropriate to their classification as determined by NCA.
ECC Cybersecurity Maturity Model ECC-CMM
نموذج نضج الأمن السيبراني للضوابط الأساسية
A structured assessment methodology within the NCA ECC framework that measures an organization's cybersecurity maturity across five levels: Level 1 (Initial), Level 2 (Developing), Level 3 (Defined), Level 4 (Managed), and Level 5 (Optimized). Organizations are required to achieve specific maturity levels based on their classification and criticality, with higher-risk entities expected to reach higher maturity levels.
🔐 Elliptic Curve Cryptography ECC
تشفير المنحنى الإهليلجي
An approach to public-key cryptography based on the algebraic structure of elliptic curves, offering equivalent security with smaller key sizes.
🏛 Email Data Loss Prevention Email DLP
منع فقدان البيانات عبر البريد الإلكتروني
A security strategy and technology that monitors, detects, and blocks sensitive information from being transmitted via email in violation of organizational policies or regulatory requirements. Email DLP helps prevent accidental or intentional data breaches by enforcing content inspection and policy-based controls.
🏛 Email Encryption Policy
سياسة تشفير البريد الإلكتروني
A governance framework that defines requirements and procedures for encrypting email communications to protect sensitive information in transit and at rest. This policy establishes standards for encryption methods, key management, and compliance with data protection regulations such as PDPL.
🏛 Email Gateway Security EGS
أمن بوابة البريد الإلكتروني
A security solution that filters and monitors incoming and outgoing email traffic to detect and block malicious content, spam, and phishing attempts. It acts as a protective barrier between an organization's email infrastructure and external threats, enforcing security policies and compliance requirements.
🏛 Email Incident Response Plan
خطة الاستجابة لحوادث البريد الإلكتروني
A documented procedure that outlines the steps to be taken when an email security incident occurs, including detection, containment, investigation, remediation, and reporting. This plan is essential for minimizing damage from email-based attacks and ensuring compliance with regulatory notification requirements.
🏛 Email Retention Policy
سياسة الاحتفاظ بالبريد الإلكتروني
A governance document that defines how long email messages must be retained, archived, and eventually deleted based on regulatory requirements, legal obligations, and business needs. This policy ensures compliance with data protection laws while managing storage resources effectively.
🏛 Email Security Awareness Training
التدريب على التوعية بأمن البريد الإلكتروني
A structured program designed to educate employees about email-based threats such as phishing, malware, and social engineering attacks. This training is a critical component of security governance, helping organizations build a human firewall and reduce the risk of successful email attacks.
Encryption
التشفير
The process of converting plaintext data into ciphertext using cryptographic algorithms and keys to protect confidentiality and prevent unauthorized access to sensitive information during storage or transmission.
Encryption Key Management EKM
إدارة مفاتيح التشفير
The administration of cryptographic keys throughout their lifecycle, including generation, distribution, storage, rotation, backup, and destruction, ensuring secure key handling practices to maintain the effectiveness of encryption systems.
End-to-End Encryption E2EE
التشفير الشامل من طرف إلى طرف
A security method where data is encrypted on the sender's device and only decrypted on the recipient's device, ensuring that no intermediary parties, including service providers, can access the plaintext content during transmission.
🛡 Endpoint Detection and Response EDR
كشف نقاط النهاية والاستجابة
A cybersecurity technology that continuously monitors endpoints to detect and respond to cyber threats.
🚨 Eradication
الاستئصال
The phase of incident response where the root cause and artifacts of the security incident are removed from the environment.
🇸🇦 Essential Cybersecurity Controls ECC
الضوابط الأساسية للأمن السيبراني
NCA's baseline cybersecurity controls that all Saudi government and critical infrastructure entities must implement.
Evidence Collection
جمع الأدلة
The systematic gathering of proof that security controls are implemented and effective to satisfy compliance requirements.
🛡 Extended Detection and Response XDR
الكشف والاستجابة الموسعة
A unified security solution that integrates multiple security products into a cohesive system for improved threat detection and response.
Failover
التحول التلقائي
The automatic switching to a standby system, server, or network upon the failure or abnormal termination of the primary.
FAIR Model FAIR
نموذج FAIR
Factor Analysis of Information Risk — a quantitative risk analysis methodology for information security and operational risk.
🔑 FIDO2 FIDO2
معيار FIDO2
An open authentication standard that enables passwordless login using public key cryptography and biometrics.
Fileless Malware
البرمجيات الخبيثة بدون ملفات
Malicious code that operates entirely in memory without writing files to disk, making it harder to detect by traditional antivirus.
🌐 Firewall FW
الجدار الناري
A network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules.
Gap Analysis
تحليل الفجوات
An assessment that compares an organization's current security posture against a desired standard or framework to identify areas needing improvement.
🏛 Governance, Risk and Compliance GRC
الحوكمة والمخاطر والامتثال
Integrated framework for managing an organization's governance policies, enterprise risk management, and regulatory compliance. GRC platforms automate control assessment, risk tracking, and audit management across multiple frameworks simultaneously.
🔐 Hardware Security Module HSM
وحدة أمن الأجهزة
A dedicated hardware device for managing and safeguarding digital keys and performing cryptographic operations.
🔐 Hash Function
دالة التجزئة
A mathematical function that converts an input of arbitrary length into a fixed-size output, commonly used for data integrity verification.
🔐 Homomorphic Encryption
التشفير المتماثل الشكل
A form of encryption that allows computations to be performed on encrypted data without first decrypting it.
Hot Site
الموقع الساخن
A fully equipped duplicate computing facility that can be activated immediately in case of a disaster.
Identity and Access Management (IAM) IAM
إدارة الهوية والوصول
A framework of policies, processes, and technologies that enables organizations to manage digital identities and control user access to critical information and systems. IAM ensures that the right individuals access the right resources at the right times for the right reasons.
🔑 Identity Provider IdP
مزود الهوية
A system that creates, maintains, and manages identity information for users while providing authentication services.
Incident Containment
احتواء الحادث
The process of limiting the scope and impact of a security incident by isolating affected systems, preventing lateral movement of threats, and stopping the incident from spreading to other parts of the network or organization.
Incident Notification and Reporting
الإخطار والإبلاغ عن الحوادث
The mandatory process of informing relevant stakeholders, regulatory authorities, and affected parties about security incidents within specified timeframes, including details about the nature, impact, and remediation measures of the incident.
🚨 Incident Response Plan IRP
خطة الاستجابة للحوادث
A documented plan that outlines the procedures and responsibilities for detecting, responding to, and recovering from cybersecurity incidents.
Incident Response Plan (IRP) IRP
خطة الاستجابة للحوادث
A documented, structured approach with detailed procedures for detecting, responding to, and recovering from cybersecurity incidents. It defines roles, responsibilities, communication protocols, and step-by-step actions to minimize damage and restore normal operations efficiently.
Incident Response Team (IRT) IRT
فريق الاستجابة للحوادث
A designated group of trained professionals responsible for managing and coordinating responses to cybersecurity incidents. The team typically includes technical experts, legal advisors, communications specialists, and management representatives who work together to contain, investigate, and remediate security breaches.
Indicators of Attack IoA
مؤشرات الهجوم
Proactive indicators that identify attacker behavior patterns in real-time, before damage occurs.
🚨 Indicators of Compromise IoC
مؤشرات الاختراق
Forensic artifacts that identify potentially malicious activity on a system or network.
🔒 Information Rights Management IRM
إدارة حقوق المعلومات
Technology that controls access to documents, emails, and files beyond the boundaries of the organization's network.
🏛 Information Security Management System ISMS
نظام إدارة أمن المعلومات
A systematic approach consisting of policies, processes, and systems to manage sensitive information so that it remains secure, encompassing people, processes, and IT systems.
Infrastructure as Code IaC
البنية التحتية كشفرة
Managing and provisioning computing infrastructure through machine-readable configuration files rather than manual processes.
🏛 Inherent Risk
المخاطر الذاتية
The level of risk existing before any controls are applied. Used in risk assessments to establish baseline risk level before evaluating the effectiveness of existing controls to arrive at residual risk.
Insider Threat
التهديد الداخلي
A security risk that originates from within the organization, typically from current or former employees or business associates.
Internal Audit IA
التدقيق الداخلي
An independent assessment conducted within the organization to evaluate and improve the effectiveness of risk management, control, and governance.
🌐 Intrusion Detection System IDS
نظام كشف التسلل
A system that monitors network or system activities for malicious activities or policy violations and produces alerts.
🌐 Intrusion Prevention System IPS
نظام منع التسلل
A network security tool that monitors traffic for threats and automatically takes action to prevent them.
🔐 Key Management
إدارة المفاتيح
The administration of cryptographic keys in a cryptosystem, including generation, exchange, storage, use, and replacement of keys.
Key Risk Indicator KRI
مؤشر المخاطر الرئيسي
A metric used to provide an early signal of increasing risk exposures in various areas of the organization.
🔑 Least Privilege
أقل الصلاحيات
The principle that users should be given the minimum levels of access needed to perform their job functions.
🛡 Log Correlation
ارتباط السجلات
The process of analyzing logs from multiple sources to identify patterns, anomalies, and potential security incidents.
Malware
البرمجيات الخبيثة
Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Man-in-the-Middle Attack MITM
هجوم الوسيط
An attack where the attacker secretly relays and possibly alters communications between two parties who believe they are directly communicating.
🛡 Managed Detection and Response MDR
الكشف والاستجابة المدارة
An outsourced cybersecurity service that provides threat monitoring, detection, and response capabilities.
🏛 Maturity Model CMM
نموذج النضج
A framework for assessing the current state and improvement path of an organization's cybersecurity capabilities across defined levels.
Maximum Tolerable Downtime MTD
أقصى وقت تعطل مقبول
The maximum period of time that a business process can be disrupted without causing unacceptable consequences.
🚨 Mean Time to Detect MTTD
متوسط وقت الكشف
The average time it takes to discover a security incident from its initial occurrence.
Mean Time to Detect (MTTD) MTTD
متوسط الوقت للكشف
A key performance indicator that measures the average time it takes for a SOC team to discover a security incident or breach from the moment it occurs. MTTD is critical for assessing the effectiveness of security monitoring capabilities and detection controls, with lower values indicating more mature security operations.
🚨 Mean Time to Respond MTTR
متوسط وقت الاستجابة
The average time it takes to contain and remediate a security incident after detection.
Micro-Segmentation MS
التجزئة الدقيقة
A Zero Trust security technique that divides networks into small, isolated segments to contain breaches and limit lateral movement. Each segment has its own access controls and security policies, allowing organizations to define granular security perimeters around critical assets and enforce strict traffic inspection between segments.
🌐 Microsegmentation
التجزئة الدقيقة
A security technique that divides a network into isolated segments down to the individual workload level.
MITRE ATT&CK
إطار MITRE ATT&CK
A globally-accessible knowledge base of adversary tactics and techniques based on real-world observations of cyberattacks.
Multi-Cloud Security
أمن السحابة المتعددة
Security strategy and controls for organizations using services from multiple cloud service providers simultaneously.
🔑 Multi-Factor Authentication MFA
المصادقة متعددة العوامل
An authentication method requiring two or more verification factors: something you know, something you have, or something you are.
🇸🇦 National Cryptographic Standards
المعايير الوطنية للتشفير
NCA requirements for cryptographic algorithms and key lengths used by government and critical infrastructure entities.
🇸🇦 National Cybersecurity Authority NCA
الهيئة الوطنية للأمن السيبراني
The Saudi government entity responsible for cybersecurity regulation, setting national cybersecurity policies, standards, and controls.
🇸🇦 National Data Management Office NDMO
مكتب إدارة البيانات الوطنية
The Saudi entity under SDAIA responsible for national data governance policies and data classification standards.
🏛 NCA Cloud Cybersecurity Controls NCA CCC
ضوابط الأمن السيبراني السحابية
Specialized NCA framework governing cloud computing security for Saudi government and critical infrastructure entities. Contains 76 controls covering cloud provider selection, data residency (data must remain in KSA), shared responsibility, and cloud incident response.
🏛 NCA Cybersecurity Resilience Requirements NCA CSCC
متطلبات مرونة الأمن السيبراني
NCA framework establishing cybersecurity resilience requirements for critical national infrastructure, focusing on continuity of essential services during cyber incidents.
🏛 NCA Essential Cybersecurity Controls NCA ECC
الضوابط الأساسية للأمن السيبراني
Mandatory cybersecurity controls issued by the National Cybersecurity Authority of Saudi Arabia, applicable to government entities and critical national infrastructure operators. The 2024 version contains 114 controls across 7 domains.
🌐 Network Access Control NAC
التحكم بالوصول للشبكة
A security approach that attempts to unify endpoint security and network access enforcement.
🌐 Network Segmentation
تجزئة الشبكة
The practice of splitting a network into sub-networks to improve security and performance.
🔑 OAuth 2.0 OAuth
بروتوكول OAuth 2.0
An authorization framework that enables applications to obtain limited access to user accounts via delegation tokens.
💻 OWASP Top 10
أوواسب أعلى 10
A standard awareness document listing the ten most critical web application security risks, updated periodically.
🔑 Passwordless Authentication
المصادقة بدون كلمة مرور
Authentication methods that verify user identity without traditional passwords, using biometrics, tokens, or cryptographic keys.
🛡 Patch Management
إدارة التحديثات الأمنية
The process of distributing and applying updates to software to fix vulnerabilities and improve security.
💻 Penetration Testing Pentest
اختبار الاختراق
An authorized simulated cyberattack on a computer system to evaluate its security and identify vulnerabilities.
§ Personal Data PII
البيانات الشخصية
Any data that relates to an identified or identifiable natural person.
🏛 Personal Data Protection Law PDPL
نظام حماية البيانات الشخصية
Saudi Arabia's data protection law enacted by Royal Decree in September 2021 and enforced from September 2023. Governs collection, processing, storage, and transfer of personal data, requiring consent, DPO appointment, and 72-hour breach notification to SDAIA.
🇸🇦 Personal Data Protection Law PDPL
نظام حماية البيانات الشخصية
Saudi Arabia's comprehensive data protection law issued by Royal Decree M/19, administered by SDAIA.
Personal Data Protection Law (PDPL) Compliance PDPL
الامتثال لنظام حماية البيانات الشخصية
The adherence to Saudi Arabia's Personal Data Protection Law, which establishes requirements for the collection, processing, storage, and transfer of personal data to protect individuals' privacy rights and ensure data controllers and processors implement appropriate technical and organizational measures.
Phishing
التصيد الاحتيالي
A social engineering attack that uses deceptive emails, websites, or messages to trick individuals into revealing sensitive information.
🚨 Playbook
دليل الإجراءات
A predefined set of actions and procedures for responding to a specific type of security incident.
🔐 Post-Quantum Cryptography PQC
التشفير ما بعد الكم
Cryptographic algorithms designed to be secure against attacks from both classical and quantum computers.
§ Privacy by Design PbD
الخصوصية حسب التصميم
An approach where privacy and data protection are embedded into the design of systems and business practices from the outset.
Privacy Impact Assessment PIA
تقييم أثر الخصوصية
A systematic process to identify and evaluate potential privacy risks associated with data processing activities, particularly when implementing new technologies, systems, or processes that handle personal data. Under PDPL and SAMA CSF requirements, organizations must conduct PIAs before processing high-risk personal data to ensure compliance and implement appropriate safeguards.
🔑 Privileged Access Management PAM
إدارة الوصول المميز
A set of cybersecurity strategies and technologies for exerting control over elevated access and permissions for users, accounts, and systems.
Privileged Access Management (PAM) PAM
إدارة الوصول المميز
A subset of IAM that focuses on managing and monitoring accounts with elevated privileges, such as system administrators and database administrators. PAM solutions control, monitor, and secure privileged credentials to prevent unauthorized access to critical systems and sensitive data.
§ Pseudonymization
الترميز المستعار
Processing personal data so it can no longer be attributed to a specific data subject without the use of additional information.
🔐 Public Key Infrastructure PKI
البنية التحتية للمفتاح العام
A framework of encryption and cybersecurity that protects communications between servers and clients using digital certificates.
🛡 Purple Team
الفريق البنفسجي
A collaborative approach combining Red Team and Blue Team exercises to improve security effectiveness.
🏛 RACI Matrix RACI
مصفوفة المسؤوليات
A responsibility assignment matrix defining who is Responsible, Accountable, Consulted, and Informed for each task.
Ransomware
برامج الفدية
Malicious software that encrypts victim's files and demands payment for the decryption key.
Recovery Point Objective RPO
هدف نقطة الاستعادة
The maximum acceptable amount of data loss measured in time, determining the frequency of data backups.
Recovery Time Objective RTO
هدف وقت الاستعادة
The maximum acceptable time that a system, application, or function can be offline after a disaster before business impact becomes unacceptable.
Recovery Time Objective (RTO) RTO
الهدف الزمني للتعافي
The maximum acceptable length of time that a business process, application, or system can be down after a disaster or disruption before the organization experiences unacceptable consequences, used to prioritize recovery efforts and allocate resources.
🛡 Red Team
الفريق الأحمر
A group of security professionals authorized to simulate real-world attacks to test an organization's defenses.
Remediation
المعالجة
The process of addressing and resolving identified security findings, vulnerabilities, or compliance gaps.
Residual Risk
المخاطر المتبقية
The risk that remains after security controls have been applied.
🔒 Right to be Forgotten
حق النسيان
The right of individuals to have their personal data erased when it is no longer necessary for the purpose it was collected.
🏛 Right to Erasure
حق المحو
Data subject right under PDPL to request deletion of their personal data held by an organization under specific circumstances, including withdrawal of consent or when data is no longer necessary for the original purpose.
Risk Appetite
قبول المخاطر
The amount and type of risk that an organization is willing to accept in pursuit of its objectives.
Risk Assessment RA
تقييم المخاطر
The process of identifying, analyzing, and evaluating risks to determine their likelihood and potential impact on the organization.
Risk Quantification
التقدير الكمي للمخاطر
The process of assigning monetary values to potential losses from cybersecurity risks using statistical methods.
Risk Register
سجل المخاطر
A documented repository of identified risks, their analysis, and planned response actions.
Risk Treatment
معالجة المخاطر
The process of selecting and implementing measures to modify risk, including avoidance, mitigation, transfer, or acceptance.
🔑 Role-Based Access Control RBAC
التحكم بالوصول القائم على الدور
A method of restricting system access to authorized users based on their role within the organization.
Role-Based Access Control (RBAC) RBAC
التحكم في الوصول المبني على الأدوار
An access control method within IAM that assigns system permissions to users based on their organizational roles rather than individual identities. RBAC simplifies access management by grouping permissions into roles, ensuring users only have access necessary to perform their job functions in accordance with the principle of least privilege.
🔐 RSA RSA
خوارزمية RSA
An asymmetric cryptographic algorithm widely used for secure data transmission using a public and private key pair.
💻 Runtime Application Self-Protection RASP
الحماية الذاتية لتطبيقات وقت التشغيل
A security technology that is built into an application to detect and prevent real-time attacks.
🇸🇦 SAMA Cybersecurity Framework SAMA CSF
إطار ساما للأمن السيبراني
The cybersecurity framework issued by SAMA for all financial institutions operating under its supervision in Saudi Arabia.
🏛 SAMA Cybersecurity Framework SAMA CSF
إطار الأمن السيبراني لساما
Mandatory cybersecurity framework issued by the Saudi Arabian Monetary Authority for all regulated financial institutions. Version 2.0 contains 251 sub-controls across 12 domains covering governance, risk, IAM, operations, and business continuity.
🔑 SAML SAML
لغة توكيد أمن التأليف
Security Assertion Markup Language — an XML-based standard for exchanging authentication and authorization data between parties.
🇸🇦 Saudi Arabian Monetary Authority SAMA
البنك المركزي السعودي
The central bank of Saudi Arabia responsible for regulating and supervising the financial sector including its cybersecurity requirements.
🇸🇦 Saudi Data & AI Authority SDAIA
هيئة البيانات والذكاء الاصطناعي
The Saudi government entity responsible for data governance and AI strategy, administering the PDPL.
🇸🇦 Saudi Vision 2030 Digital Transformation
التحول الرقمي لرؤية 2030
The digital transformation component of Saudi Vision 2030 that drives cybersecurity requirements across all sectors.
Scope
النطاق
The boundaries of a compliance assessment defining which systems, processes, and locations are included in the evaluation.
🌐 Secure Access Service Edge SASE
حافة خدمة الوصول الآمن
A cloud architecture model that combines network security functions with WAN capabilities to support dynamic secure access.
🌐 Secure DNS
نظام أسماء النطاقات الآمن
DNS configurations and protocols that protect against DNS hijacking, spoofing, and cache poisoning attacks.
🌐 Secure Email Gateway SEG
بوابة البريد الإلكتروني الآمنة
A solution that monitors emails sent and received to prevent unwanted email including spam, phishing, and malware.
💻 Secure Software Development Lifecycle SSDLC
دورة حياة تطوير البرمجيات الآمنة
An approach to software development that integrates security activities at every phase of the development lifecycle.
🏛 Security Architecture
البنية الأمنية
A unified security design that addresses the necessities and potential risks involved in a certain scenario and specifies when and where to apply security controls.
Security as a Service SECaaS
الأمن كخدمة
A business model in which a service provider integrates security services into a corporate infrastructure on a subscription basis.
🛡 Security Awareness Training SAT
التدريب على التوعية الأمنية
An educational program designed to reduce human cybersecurity risks by teaching employees to recognize and respond to threats.
🏛 Security Baseline
خط الأساس الأمني
A minimum set of security controls required for a system or organization to operate safely.
🏛 Security Governance
حوكمة الأمن
The set of responsibilities exercised by the board and executive management to provide strategic direction and oversight of cybersecurity.
🏛 Security Governance Framework SGF
إطار حوكمة الأمن السيبراني
A comprehensive structure of policies, procedures, and controls that establishes accountability and oversight for cybersecurity activities across an organization. It defines roles, responsibilities, and decision-making processes to ensure security objectives align with business goals and regulatory requirements.
Security Incident and Event Management (SIEM) SIEM
إدارة الحوادث والأحداث الأمنية
A comprehensive security solution that provides real-time analysis of security alerts and events generated by network hardware and applications. It collects, aggregates, correlates, and analyzes log data to detect threats, support compliance reporting, and enable rapid incident response.
🛡 Security Information and Event Management SIEM
إدارة معلومات وأحداث الأمن
A solution that provides real-time analysis of security alerts generated by applications and network hardware through centralized log collection and correlation.
Security Information and Event Management (SIEM) SIEM
إدارة معلومات وأحداث الأمن السيبراني
A comprehensive solution that provides real-time analysis of security alerts generated by applications and network hardware. SIEM systems collect, aggregate, and analyze log data from across an organization's IT infrastructure to identify security threats, ensure compliance, and support incident investigation and forensics.
🏛 Security Metrics KPI
مقاييس الأمن
Quantifiable measurements used to track and evaluate the effectiveness of an organization's security program.
🚨 Security Operations Center SOC
مركز عمليات الأمن
A centralized unit that deals with security issues on an organizational and technical level, providing 24/7 monitoring and threat detection.
Security Operations Center (SOC) SOC
مركز العمليات الأمنية
A centralized unit that deals with security issues on an organizational and technical level, responsible for continuous monitoring, detection, analysis, and response to cybersecurity incidents using a combination of technology solutions and human expertise.
🛡 Security Orchestration, Automation and Response SOAR
تنسيق وأتمتة واستجابة الأمن
A stack of compatible tools that allows organizations to collect security data and automate responses to low-level threats.
🏛 Security Policy
السياسة الأمنية
A formal document that defines the rules, guidelines, and practices for managing and protecting an organization's information assets.
🛡 Security Rating
التصنيف الأمني
An objective, quantifiable measure of an organization's cybersecurity posture generated by independent security rating platforms.
🏛 Security Steering Committee
لجنة توجيه الأمن
A cross-functional leadership body responsible for providing strategic direction and oversight of the cybersecurity program.
🏛 Sender Policy Framework SPF
إطار سياسة المرسل
An email authentication protocol that allows domain owners to specify which mail servers are authorized to send emails on behalf of their domain. SPF helps prevent email spoofing by enabling receiving servers to verify that incoming mail from a domain comes from an authorized IP address.
Serverless Security
أمن الحوسبة بدون خادم
Security practices and controls specific to serverless computing architectures like AWS Lambda, Azure Functions.
Shared Responsibility Model
نموذج المسؤولية المشتركة
A framework that delineates the security responsibilities of the cloud service provider versus the customer.
🔑 Single Sign-On SSO
تسجيل الدخول الموحد
An authentication scheme that allows a user to log in with a single ID to gain access to multiple related but independent systems.
Social Engineering SE
الهندسة الاجتماعية
The psychological manipulation of people into performing actions or divulging confidential information.
💻 Software Composition Analysis SCA
تحليل تركيب البرمجيات
A process of identifying open-source software components and their known vulnerabilities in application codebases.
🌐 Software-Defined Networking SDN
الشبكات المعرّفة بالبرمجيات
An approach to networking that uses software-based controllers to direct traffic on the network and communicate with hardware infrastructure.
Spear Phishing
التصيد الموجه
A targeted phishing attack directed at specific individuals or organizations using personalized information to increase credibility.
SQL Injection SQLi
حقن SQL
A code injection technique used to attack data-driven applications by inserting malicious SQL statements into entry fields.
🌐 SSL/TLS Certificate SSL
شهادة SSL/TLS
A digital certificate that authenticates a website identity and enables encrypted connections between a web server and browser.
Statement of Applicability SoA
بيان التطبيق
A document that lists all ISO 27001 Annex A controls and indicates whether each is applicable, implemented, or excluded with justification.
💻 Static Application Security Testing SAST
اختبار أمان التطبيقات الثابت
A security testing method that analyzes source code, bytecode, or binary code for vulnerabilities without executing the program.
Supply Chain Attack
هجوم سلسلة التوريد
An attack that targets the less-secure elements in a supply chain to compromise the final target.
Tabletop Exercise TTX
تمرين الطاولة
A discussion-based exercise where key personnel walk through a simulated scenario to test plans and identify gaps.
Third-Party and Cloud Computing Cybersecurity TPCCC
الأمن السيبراني للأطراف الثالثة والحوسبة السحابية
The fifth domain of the NCA ECC framework that establishes requirements for managing cybersecurity risks associated with third-party service providers, vendors, and cloud service providers, including due diligence, contractual security requirements, and ongoing monitoring of external parties.
Third-Party Audit
تدقيق الطرف الثالث
An independent assessment conducted by an external qualified auditor to verify compliance with standards or regulations.
Third-Party Cybersecurity Management SAMA CSF Domain 4
إدارة الأمن السيبراني للأطراف الثالثة
The fourth domain of SAMA CSF that mandates financial institutions to implement comprehensive third-party risk management programs, including vendor due diligence, contractual security requirements, continuous monitoring of third-party security posture, and incident notification obligations for service providers handling sensitive financial data.
Third-Party Cybersecurity Risk Management TPCRM
إدارة مخاطر الأمن السيبراني للأطراف الثالثة
An NCA ECC control domain mandating organizations to assess, monitor, and manage cybersecurity risks associated with vendors, suppliers, service providers, and other external parties that have access to organizational systems or data, including contractual security requirements and ongoing compliance verification.
Third-Party Risk Management TPRM
إدارة مخاطر الأطراف الثالثة
The process of analyzing and controlling risks presented by third parties to an organization's data and operations.
Threat
التهديد
Any circumstance or event with the potential to adversely impact organizational operations through unauthorized access, destruction, disclosure, or modification of information.
Threat Actor TA
الجهة الفاعلة للتهديد
An individual, group, or entity that conducts or has the intent to conduct malicious cyber activities against an organization's information systems or data. Threat actors are categorized by motivation (financial, political, espionage), capability (nation-state, organized crime, hacktivists), and targeting patterns.
🛡 Threat Hunting
مطاردة التهديدات
The proactive practice of searching through networks and datasets to detect threats that evade existing security solutions.
🛡 Threat Intelligence TI
استخبارات التهديدات
Evidence-based knowledge about existing or emerging threats that helps organizations make informed security decisions.
🚨 Threat Intelligence Sharing
مشاركة استخبارات التهديدات
The exchange of cyber threat information between organizations, government entities, and security communities using standards like STIX/TAXII.
Threat Modeling
نمذجة التهديدات
A structured approach for identifying and prioritizing potential threats to a system and determining countermeasures.
🔒 Tokenization
الترميز
The process of replacing sensitive data with unique identification symbols that retain all essential information without compromising security.
🔐 Transport Layer Security TLS
أمن طبقة النقل
A cryptographic protocol designed to provide communications security over a computer network, used to secure web traffic.
🏛 Virtual CISO vCISO
مسؤول أمن المعلومات الافتراضي
Fractional or part-time CISO service providing experienced cybersecurity executive leadership to organizations that cannot justify a full-time hire. Ideal for Saudi SMEs, startups, and organizations bridging a CISO vacancy while achieving SAMA or NCA compliance.
🌐 Virtual Private Network VPN
الشبكة الافتراضية الخاصة
A technology that creates an encrypted connection over a less secure network, providing secure remote access to organizational resources.
Vulnerability Vuln
الثغرة الأمنية
A weakness in a system, application, or process that could be exploited by a threat to gain unauthorized access or cause harm.
🛡 Vulnerability Assessment VA
تقييم الثغرات
A systematic review of security weaknesses in an information system to identify, quantify, and prioritize vulnerabilities.
Vulnerability Management VM
إدارة الثغرات الأمنية
A systematic approach to identifying, evaluating, treating, and reporting security vulnerabilities in systems and software, including continuous monitoring and remediation processes to reduce organizational risk exposure.
Watering Hole Attack
هجوم حفرة الماء
An attack strategy where the threat actor infects websites frequently visited by the target group to compromise their systems.
🌐 Web Application Firewall WAF
جدار حماية تطبيقات الويب
A security solution that filters, monitors, and blocks HTTP/HTTPS traffic to and from a web application.
🔑 Zero Trust ZT
الثقة المعدومة
A security model based on the principle of never trust, always verify, requiring strict identity verification for every person and device attempting to access resources.
🌐 Zero Trust Architecture ZTA
بنية الثقة الصفرية
Security model based on the principle "never trust, always verify" — every user, device, and application must be continuously authenticated regardless of network location. Key pillars: strong identity, device validation, least-privilege access, microsegmentation, and continuous monitoring.
Zero Trust Network Access ZTNA
الوصول الشبكي بدون ثقة
A security framework that eliminates implicit trust and requires continuous verification of every user and device attempting to access network resources, regardless of their location. ZTNA operates on the principle of 'never trust, always verify' and implements least-privilege access controls with micro-segmentation.
Zero-Day Vulnerability 0-Day
ثغرة يوم الصفر
A software security vulnerability that is unknown to the vendor and for which no patch or fix is available.
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.