INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 13h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 13h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 13h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h

🔐 Cybersecurity Glossary

Over 265 professional cybersecurity terms in English & Arabic — your comprehensive reference for the cybersecurity world

265 terms 16 categories 47 frameworks
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
40 terms
🚨 Chain of Custody
سلسلة الحفظ
The documented chronological history of the handling and transfer of digital evidence.
🏛 Chief Information Security Officer CISO
مسؤول أمن المعلومات الرئيسي
Senior executive responsible for establishing and maintaining the enterprise cybersecurity vision, strategy, and program to ensure information assets and technologies are adequately protected.
Cloud Access Security Broker CASB
وسيط أمن الوصول السحابي
A security policy enforcement point placed between cloud service consumers and providers to enforce enterprise security policies.
🇸🇦 Cloud Cybersecurity Controls CSCC
ضوابط الأمن السيبراني للحوسبة السحابية
NCA's controls specifically designed for securing cloud computing services used by Saudi entities.
Cloud Security Posture Management CSPM
إدارة الوضع الأمني السحابي
Automated tools that continuously monitor cloud infrastructure for gaps in security policy enforcement.
Cloud Workload Protection Platform CWPP
منصة حماية أعباء العمل السحابية
A security solution focused on protecting workloads across cloud, on-premises, and hybrid environments.
💻 Code Review
مراجعة الشفرة البرمجية
A systematic examination of source code to find and fix mistakes overlooked in initial development.
Common Vulnerabilities and Exposures CVE
الثغرات والتعرضات الشائعة
A publicly disclosed list of cybersecurity vulnerabilities, each assigned a unique identifier for tracking and reference.
Common Vulnerability Scoring System CVSS
نظام تسجيل الثغرات المشترك
An open framework for communicating the characteristics and severity of software vulnerabilities using a numerical score from 0 to 10.
🇸🇦 Communications, Space & Technology Commission CST
هيئة الاتصالات والفضاء والتقنية
The Saudi regulatory body overseeing the ICT sector including telecommunications security requirements.
Compensating Control
الضابط التعويضي
An alternative security measure employed when the primary control cannot be implemented.
🚨 Computer Security Incident Response Team CSIRT
فريق الاستجابة لحوادث أمن الحاسب
A team of IT security experts responsible for managing and responding to cybersecurity incidents.
§ Consent
الموافقة
A freely given, specific, informed, and unambiguous indication of the data subject's agreement to the processing of their personal data.
Container Security
أمن الحاويات
The practice of securing containerized applications and their infrastructure from development through production.
🚨 Containment
الاحتواء
The phase of incident response focused on limiting the scope and damage of a security incident.
Continuous Authentication CA
المصادقة المستمرة
A Zero Trust security mechanism that continuously validates user identity and device trustworthiness throughout a session, rather than only at initial login. It monitors behavioral patterns, device posture, location, and contextual factors in real-time to detect anomalies and dynamically adjust access privileges or terminate sessions when risk levels change.
Continuous Compliance
الامتثال المستمر
An automated approach to maintaining compliance with regulations and standards through continuous monitoring and assessment.
Control Objective
هدف الضابط الرقابي
A statement of the desired result or purpose to be achieved by implementing a security control.
Corrective Action
الإجراء التصحيحي
An action taken to eliminate the cause of a detected nonconformity to prevent recurrence.
Credential Stuffing
حشو بيانات الاعتماد
An automated attack that uses stolen username/password pairs from data breaches to attempt logins on other services.
Crisis Management
إدارة الأزمات
The overall coordination of an organization's response to a crisis that threatens the organization or its stakeholders.
🇸🇦 Critical National Infrastructure CNI
البنى التحتية الوطنية الحساسة
Systems and assets vital to Saudi Arabia's national security, economy, or public health that require enhanced cybersecurity protection.
§ Cross-Border Data Transfer
نقل البيانات عبر الحدود
The transfer of personal data from one country to another, subject to legal restrictions and adequacy requirements.
Cross-Border Data Transfer Compliance CBDT
الامتثال لنقل البيانات عبر الحدود
The regulatory requirements under PDPL for transferring personal data outside Saudi Arabia, requiring data controllers to ensure adequate protection levels in the receiving country, obtain necessary approvals, implement appropriate safeguards such as standard contractual clauses, and maintain accountability for data protection throughout the transfer process.
Cross-Site Scripting XSS
البرمجة عبر المواقع
A web security vulnerability that allows attackers to inject client-side scripts into web pages viewed by other users.
Cryptojacking
التعدين الخبيث
The unauthorized use of someone else's computing resources to mine cryptocurrency.
Cyber Incident Notification CIN
الإخطار بالحوادث السيبرانية
The mandatory process of reporting cybersecurity incidents to relevant regulatory authorities, affected parties, and stakeholders within specified timeframes, including details about the nature, scope, and impact of the incident as required by applicable regulations.
Cyber Incident Reporting
الإبلاغ عن الحوادث السيبرانية
The mandatory or voluntary process of notifying relevant authorities, stakeholders, and affected parties about cybersecurity incidents within specified timeframes. In Saudi Arabia, this includes reporting to NCA for critical infrastructure and SAMA for financial institutions.
Cyber Insurance
التأمين السيبراني
Insurance products designed to help organizations mitigate financial losses from cybersecurity incidents and data breaches.
🇸🇦 Cyber Resilience
المرونة السيبرانية
An organization's ability to continuously deliver intended outcomes despite adverse cyber events, as required by NCA.
🛡 Cyber Threat Intelligence Platform TIP
منصة استخبارات التهديدات السيبرانية
A technology platform that aggregates, correlates, and analyzes threat data from multiple sources to provide actionable intelligence.
Cybersecurity Asset Management CAM
إدارة أصول الأمن السيبراني
An NCA ECC control domain requiring organizations to maintain a comprehensive inventory of all information assets, including hardware, software, data, and network components, with proper classification, ownership assignment, and lifecycle management to ensure adequate protection measures.
Cybersecurity Defense CD
الدفاع السيبراني
The second domain of the NCA ECC framework that encompasses technical and operational controls for protecting information systems, networks, and data, including access control, network security, encryption, vulnerability management, and security monitoring capabilities.
🏛 Cybersecurity Framework CSF
إطار الأمن السيبراني
A structured set of guidelines and best practices designed to help organizations manage and reduce cybersecurity risk.
Cybersecurity Governance CG
حوكمة الأمن السيبراني
The first domain of the NCA ECC framework that establishes requirements for organizational leadership, cybersecurity strategy, policies, risk management, and compliance programs to ensure effective oversight and accountability for cybersecurity across the organization.
Cybersecurity Governance Domain SAMA CSF Domain 1
مجال حوكمة الأمن السيبراني
The first domain of SAMA CSF that requires financial institutions to establish comprehensive cybersecurity governance structures, including board-level oversight, cybersecurity strategy, risk management frameworks, policies and procedures, and organizational roles and responsibilities for managing cybersecurity risks.
Cybersecurity Incident Response and Management CIRM
الاستجابة والإدارة لحوادث الأمن السيبراني
An NCA ECC control domain requiring organizations to establish formal capabilities for detecting, analyzing, containing, eradicating, and recovering from cybersecurity incidents, including mandatory reporting to NCA within specified timeframes for incidents affecting critical systems or sensitive data.
🇸🇦 Cybersecurity Maturity Assessment
تقييم نضج الأمن السيبراني
NCA's periodic assessment of government entities' cybersecurity maturity against ECC controls.
Cybersecurity Maturity Level CML
مستوى نضج الأمن السيبراني
A classification system within the NCA ECC framework that categorizes organizations into different maturity levels (Basic, Intermediate, Advanced) based on their criticality and risk profile, determining the depth and rigor of cybersecurity controls they must implement.
Cybersecurity Resilience and Business Continuity SAMA CSF Domain 3
المرونة السيبرانية واستمرارية الأعمال
The third domain of SAMA CSF requiring financial institutions to develop and maintain capabilities to withstand, respond to, and recover from cybersecurity incidents, including incident response plans, business continuity and disaster recovery programs, backup strategies, and regular testing exercises to ensure operational resilience.
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.