INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 12h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 13h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 12h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 13h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 12h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 13h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h

🔐 Cybersecurity Glossary

Over 265 professional cybersecurity terms in English & Arabic — your comprehensive reference for the cybersecurity world

265 terms 16 categories 47 frameworks
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
40 terms
🏛 SAMA Cybersecurity Framework SAMA CSF
إطار الأمن السيبراني لساما
Mandatory cybersecurity framework issued by the Saudi Arabian Monetary Authority for all regulated financial institutions. Version 2.0 contains 251 sub-controls across 12 domains covering governance, risk, IAM, operations, and business continuity.
🇸🇦 SAMA Cybersecurity Framework SAMA CSF
إطار ساما للأمن السيبراني
The cybersecurity framework issued by SAMA for all financial institutions operating under its supervision in Saudi Arabia.
🔑 SAML SAML
لغة توكيد أمن التأليف
Security Assertion Markup Language — an XML-based standard for exchanging authentication and authorization data between parties.
🇸🇦 Saudi Arabian Monetary Authority SAMA
البنك المركزي السعودي
The central bank of Saudi Arabia responsible for regulating and supervising the financial sector including its cybersecurity requirements.
🇸🇦 Saudi Data & AI Authority SDAIA
هيئة البيانات والذكاء الاصطناعي
The Saudi government entity responsible for data governance and AI strategy, administering the PDPL.
🇸🇦 Saudi Vision 2030 Digital Transformation
التحول الرقمي لرؤية 2030
The digital transformation component of Saudi Vision 2030 that drives cybersecurity requirements across all sectors.
Scope
النطاق
The boundaries of a compliance assessment defining which systems, processes, and locations are included in the evaluation.
🌐 Secure Access Service Edge SASE
حافة خدمة الوصول الآمن
A cloud architecture model that combines network security functions with WAN capabilities to support dynamic secure access.
🌐 Secure DNS
نظام أسماء النطاقات الآمن
DNS configurations and protocols that protect against DNS hijacking, spoofing, and cache poisoning attacks.
🌐 Secure Email Gateway SEG
بوابة البريد الإلكتروني الآمنة
A solution that monitors emails sent and received to prevent unwanted email including spam, phishing, and malware.
💻 Secure Software Development Lifecycle SSDLC
دورة حياة تطوير البرمجيات الآمنة
An approach to software development that integrates security activities at every phase of the development lifecycle.
🏛 Security Architecture
البنية الأمنية
A unified security design that addresses the necessities and potential risks involved in a certain scenario and specifies when and where to apply security controls.
Security as a Service SECaaS
الأمن كخدمة
A business model in which a service provider integrates security services into a corporate infrastructure on a subscription basis.
🛡 Security Awareness Training SAT
التدريب على التوعية الأمنية
An educational program designed to reduce human cybersecurity risks by teaching employees to recognize and respond to threats.
🏛 Security Baseline
خط الأساس الأمني
A minimum set of security controls required for a system or organization to operate safely.
🏛 Security Governance
حوكمة الأمن
The set of responsibilities exercised by the board and executive management to provide strategic direction and oversight of cybersecurity.
🏛 Security Governance Framework SGF
إطار حوكمة الأمن السيبراني
A comprehensive structure of policies, procedures, and controls that establishes accountability and oversight for cybersecurity activities across an organization. It defines roles, responsibilities, and decision-making processes to ensure security objectives align with business goals and regulatory requirements.
Security Incident and Event Management (SIEM) SIEM
إدارة الحوادث والأحداث الأمنية
A comprehensive security solution that provides real-time analysis of security alerts and events generated by network hardware and applications. It collects, aggregates, correlates, and analyzes log data to detect threats, support compliance reporting, and enable rapid incident response.
🛡 Security Information and Event Management SIEM
إدارة معلومات وأحداث الأمن
A solution that provides real-time analysis of security alerts generated by applications and network hardware through centralized log collection and correlation.
Security Information and Event Management (SIEM) SIEM
إدارة معلومات وأحداث الأمن السيبراني
A comprehensive solution that provides real-time analysis of security alerts generated by applications and network hardware. SIEM systems collect, aggregate, and analyze log data from across an organization's IT infrastructure to identify security threats, ensure compliance, and support incident investigation and forensics.
🏛 Security Metrics KPI
مقاييس الأمن
Quantifiable measurements used to track and evaluate the effectiveness of an organization's security program.
🚨 Security Operations Center SOC
مركز عمليات الأمن
A centralized unit that deals with security issues on an organizational and technical level, providing 24/7 monitoring and threat detection.
Security Operations Center (SOC) SOC
مركز العمليات الأمنية
A centralized unit that deals with security issues on an organizational and technical level, responsible for continuous monitoring, detection, analysis, and response to cybersecurity incidents using a combination of technology solutions and human expertise.
🛡 Security Orchestration, Automation and Response SOAR
تنسيق وأتمتة واستجابة الأمن
A stack of compatible tools that allows organizations to collect security data and automate responses to low-level threats.
🏛 Security Policy
السياسة الأمنية
A formal document that defines the rules, guidelines, and practices for managing and protecting an organization's information assets.
🛡 Security Rating
التصنيف الأمني
An objective, quantifiable measure of an organization's cybersecurity posture generated by independent security rating platforms.
🏛 Security Steering Committee
لجنة توجيه الأمن
A cross-functional leadership body responsible for providing strategic direction and oversight of the cybersecurity program.
🏛 Sender Policy Framework SPF
إطار سياسة المرسل
An email authentication protocol that allows domain owners to specify which mail servers are authorized to send emails on behalf of their domain. SPF helps prevent email spoofing by enabling receiving servers to verify that incoming mail from a domain comes from an authorized IP address.
Serverless Security
أمن الحوسبة بدون خادم
Security practices and controls specific to serverless computing architectures like AWS Lambda, Azure Functions.
Shared Responsibility Model
نموذج المسؤولية المشتركة
A framework that delineates the security responsibilities of the cloud service provider versus the customer.
🔑 Single Sign-On SSO
تسجيل الدخول الموحد
An authentication scheme that allows a user to log in with a single ID to gain access to multiple related but independent systems.
Social Engineering SE
الهندسة الاجتماعية
The psychological manipulation of people into performing actions or divulging confidential information.
💻 Software Composition Analysis SCA
تحليل تركيب البرمجيات
A process of identifying open-source software components and their known vulnerabilities in application codebases.
🌐 Software-Defined Networking SDN
الشبكات المعرّفة بالبرمجيات
An approach to networking that uses software-based controllers to direct traffic on the network and communicate with hardware infrastructure.
Spear Phishing
التصيد الموجه
A targeted phishing attack directed at specific individuals or organizations using personalized information to increase credibility.
SQL Injection SQLi
حقن SQL
A code injection technique used to attack data-driven applications by inserting malicious SQL statements into entry fields.
🌐 SSL/TLS Certificate SSL
شهادة SSL/TLS
A digital certificate that authenticates a website identity and enables encrypted connections between a web server and browser.
Statement of Applicability SoA
بيان التطبيق
A document that lists all ISO 27001 Annex A controls and indicates whether each is applicable, implemented, or excluded with justification.
💻 Static Application Security Testing SAST
اختبار أمان التطبيقات الثابت
A security testing method that analyzes source code, bytecode, or binary code for vulnerabilities without executing the program.
Supply Chain Attack
هجوم سلسلة التوريد
An attack that targets the less-secure elements in a supply chain to compromise the final target.
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.