INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 12h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 13h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 12h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 13h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 12h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 13h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h

🔐 Cybersecurity Glossary

Over 265 professional cybersecurity terms in English & Arabic — your comprehensive reference for the cybersecurity world

265 terms 16 categories 47 frameworks
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
17 terms
Identity and Access Management (IAM) IAM
إدارة الهوية والوصول
A framework of policies, processes, and technologies that enables organizations to manage digital identities and control user access to critical information and systems. IAM ensures that the right individuals access the right resources at the right times for the right reasons.
🔑 Identity Provider IdP
مزود الهوية
A system that creates, maintains, and manages identity information for users while providing authentication services.
Incident Containment
احتواء الحادث
The process of limiting the scope and impact of a security incident by isolating affected systems, preventing lateral movement of threats, and stopping the incident from spreading to other parts of the network or organization.
Incident Notification and Reporting
الإخطار والإبلاغ عن الحوادث
The mandatory process of informing relevant stakeholders, regulatory authorities, and affected parties about security incidents within specified timeframes, including details about the nature, impact, and remediation measures of the incident.
🚨 Incident Response Plan IRP
خطة الاستجابة للحوادث
A documented plan that outlines the procedures and responsibilities for detecting, responding to, and recovering from cybersecurity incidents.
Incident Response Plan (IRP) IRP
خطة الاستجابة للحوادث
A documented, structured approach with detailed procedures for detecting, responding to, and recovering from cybersecurity incidents. It defines roles, responsibilities, communication protocols, and step-by-step actions to minimize damage and restore normal operations efficiently.
Incident Response Team (IRT) IRT
فريق الاستجابة للحوادث
A designated group of trained professionals responsible for managing and coordinating responses to cybersecurity incidents. The team typically includes technical experts, legal advisors, communications specialists, and management representatives who work together to contain, investigate, and remediate security breaches.
Indicators of Attack IoA
مؤشرات الهجوم
Proactive indicators that identify attacker behavior patterns in real-time, before damage occurs.
🚨 Indicators of Compromise IoC
مؤشرات الاختراق
Forensic artifacts that identify potentially malicious activity on a system or network.
🔒 Information Rights Management IRM
إدارة حقوق المعلومات
Technology that controls access to documents, emails, and files beyond the boundaries of the organization's network.
🏛 Information Security Management System ISMS
نظام إدارة أمن المعلومات
A systematic approach consisting of policies, processes, and systems to manage sensitive information so that it remains secure, encompassing people, processes, and IT systems.
Infrastructure as Code IaC
البنية التحتية كشفرة
Managing and provisioning computing infrastructure through machine-readable configuration files rather than manual processes.
🏛 Inherent Risk
المخاطر الذاتية
The level of risk existing before any controls are applied. Used in risk assessments to establish baseline risk level before evaluating the effectiveness of existing controls to arrive at residual risk.
Insider Threat
التهديد الداخلي
A security risk that originates from within the organization, typically from current or former employees or business associates.
Internal Audit IA
التدقيق الداخلي
An independent assessment conducted within the organization to evaluate and improve the effectiveness of risk management, control, and governance.
🌐 Intrusion Detection System IDS
نظام كشف التسلل
A system that monitors network or system activities for malicious activities or policy violations and produces alerts.
🌐 Intrusion Prevention System IPS
نظام منع التسلل
A network security tool that monitors traffic for threats and automatically takes action to prevent them.
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.