INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 13h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 13h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 13h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h

🔐 Cybersecurity Glossary

Over 265 professional cybersecurity terms in English & Arabic — your comprehensive reference for the cybersecurity world

265 terms 16 categories 47 frameworks
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
31 terms
🔒 Data at Rest
البيانات المخزنة
Data that is stored in databases, file systems, or other storage systems and is not actively being transmitted or processed.
§ Data Breach
انتهاك البيانات
A security incident in which sensitive, protected, or confidential data is accessed, disclosed, or stolen by an unauthorized party.
🔒 Data Classification
تصنيف البيانات
The process of organizing data by relevant categories so that it can be protected and used more efficiently according to its sensitivity level.
§ Data Controller
المتحكم بالبيانات
The entity that determines the purposes and means of processing personal data.
🔒 Data in Transit
البيانات أثناء النقل
Data that is actively moving from one location to another, such as across the internet or through a private network.
🔒 Data Lifecycle Management DLM
إدارة دورة حياة البيانات
A policy-based approach to managing the flow of data through its lifecycle from creation and storage to deletion.
🔒 Data Loss Prevention DLP
منع فقدان البيانات
A set of tools and processes to ensure sensitive data is not lost, misused, or accessed by unauthorized users.
🔒 Data Masking
إخفاء البيانات
The process of hiding specific data within a database to ensure that sensitive data is not exposed to unauthorized personnel.
§ Data Portability
نقل البيانات
The right of data subjects to receive their personal data in a structured, commonly used, machine-readable format.
🏛 Data Privacy Impact Assessment DPIA
تقييم أثر خصوصية البيانات
A systematic process to identify and minimize privacy risks associated with processing personal data, particularly when implementing new technologies or systems. This assessment evaluates potential impacts on individuals' privacy rights and determines appropriate safeguards and mitigation measures.
§ Data Processor
معالج البيانات
An entity that processes personal data on behalf of the data controller.
§ Data Protection Impact Assessment DPIA
تقييم أثر حماية البيانات
A process to identify and minimize the data protection risks of a project or system.
§ Data Protection Officer DPO
مسؤول حماية البيانات
A designated person responsible for overseeing data protection strategy and compliance within an organization.
🔒 Data Sovereignty
سيادة البيانات
The concept that data is subject to the laws and governance structures within the nation where it is collected or processed.
Data Subject Rights DSR
حقوق صاحب البيانات
Rights granted to individuals under PDPL including the right to access, rectify, erase, restrict processing, data portability, and object to processing of their personal data, which organizations must facilitate and respond to within specified timeframes.
Deepfake
التزييف العميق
AI-generated synthetic media used to impersonate individuals through manipulated audio, video, or images.
🏛 Defense in Depth DiD
الدفاع المتعمق
A cybersecurity strategy that uses multiple layers of security controls to protect information assets, so if one layer fails, another is in place.
🌐 Demilitarized Zone DMZ
المنطقة منزوعة السلاح
A perimeter network segment that sits between the internal network and the external network to provide an additional layer of security.
💻 DevSecOps
تطوير الأمن والعمليات
The practice of integrating security testing and protection at every stage of the software development lifecycle.
🚨 Digital Forensics DFIR
التحقيق الجنائي الرقمي
The process of collecting, preserving, and analyzing electronic evidence for investigating cybersecurity incidents.
Digital Forensics and Incident Analysis DFIR
التحليل الجنائي الرقمي وتحليل الحوادث
The systematic collection, preservation, analysis, and documentation of digital evidence from security incidents to determine the root cause, scope of compromise, attack vectors, and support legal proceedings or regulatory reporting.
🚨 Digital Forensics and Incident Response DFIR
الطب الجنائي الرقمي والاستجابة للحوادث
Combination of digital forensics (evidence collection and analysis) and incident response (containment, eradication, recovery) disciplines. DFIR is required by SAMA CSF TM domain and Saudi CERT recommends DFIR-trained personnel for regulated entities.
Digital Forensics and Incident Response (DFIR) DFIR
الطب الشرعي الرقمي والاستجابة للحوادث
The combined practice of collecting, preserving, analyzing, and presenting digital evidence from cybersecurity incidents while simultaneously containing and remediating the threat. It ensures evidence integrity for potential legal proceedings while enabling rapid recovery and lessons learned documentation.
🔐 Digital Signature
التوقيع الرقمي
A mathematical scheme for verifying the authenticity and integrity of digital messages or documents.
🔑 Directory Service
خدمة الدليل
A centralized database that stores and manages user identities, credentials, and access permissions (e.g., Active Directory, LDAP).
Disaster Recovery Plan DRP
خطة التعافي من الكوارث
A documented process for recovering IT infrastructure and systems following a natural or man-made disaster.
Distributed Denial of Service DDoS
هجوم حجب الخدمة الموزع
An attack that overwhelms a target system with traffic from multiple sources, making it unavailable to legitimate users.
🌐 Domain Name System Security Extensions DNSSEC
امتدادات أمن نظام أسماء النطاقات
A suite of extensions to DNS that adds security by enabling DNS responses to be validated as authentic.
🏛 Domain-based Message Authentication DMARC
مصادقة الرسائل المستندة إلى النطاق
An email authentication protocol that builds on SPF and DKIM to provide domain owners with protection against unauthorized use of their domain in email attacks. DMARC enables senders to specify how receiving mail servers should handle messages that fail authentication checks and provides reporting mechanisms for monitoring.
🏛 Due Diligence
العناية الواجبة
The practice of performing adequate research and assessment before making decisions about security investments, partnerships, or vendor engagements.
💻 Dynamic Application Security Testing DAST
اختبار أمان التطبيقات الديناميكي
A security testing method that tests an application in its running state to find vulnerabilities from an external perspective.
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.