Glossary
Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
vishing, voice phishing
The use of manipulative, phone-based tactics to get victims to reveal private information that can be used for digital theft.
vulnerability assessment (VA)
A rapid automated review of network devices, servers and systems to identify key vulnerabilities and configuration issues that an attacker may be able to take advantage of.
vulnerability assessment and penetration test (VAPT)
A security testing to identify security vulnerabilities in an application, network, endpoint, and cloud. Vulnerability Assessment scans the digital assets and notifies organizations about pre-existing flaws. Penetration test exploits the vulnerabilities in the system & determines the security gaps.
Vulnerability Management (VM)
The process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and the software that runs on them.