Cybersecurity, AI & Cryptography Glossary

This glossary compiles key terminology across cybersecurity, cryptography, quantum computing, privacy-preserving machine learning (PPML), and generative AI (GenAI). It is intended as a practical reference.

Cornami’s breakthrough architecture enables real-time execution of advanced encryption methods—including Fully Homomorphic Encryption (FHE)—allowing computations on encrypted data without first decrypting it. Cornami systems support both encrypted and plaintext large language models (LLMs), and are optimized for next-generation privacy-preserving AI. This glossary reflects the foundational and applied concepts behind these technologies.

3-DES: 3-DES (Triple Data Encryption Standard) is a symmetric-key block cipher that applies the DES algorithm three times on the plaintext. It uses a 56-bit key, resulting in a 168-bit key length.

Advanced Encryption Standard (AES): AES is a widely used symmetric-key encryption algorithm that was selected by the National Institute of Standards and Technology (NIST) in 2001 to replace the Data Encryption Standard (DES). It uses variable-length keys and operates on fixed-size blocks of data, providing strong encryption security.

Advanced Persistent Threat (APT): APT is a type of cyber attack that targets specific organizations or individuals to gain unauthorized access to sensitive information or disrupt operations. APTs are typically carried out by skilled and persistent attackers who use advanced techniques to evade detection and maintain long-term access to the target system.

Advanced Threat Protection (ATP): ATP refers to a set of security solutions that leverage advanced technologies such as artificial intelligence and machine learning to detect and respond to advanced threats such as APTs, zero-day exploits, and other targeted attacks.

Adware: Adware is a type of software that displays unwanted advertisements to the user, often in the form of pop-up windows or banners. Adware may be installed on a user’s device without their knowledge or consent and can negatively impact system performance.

Algorithm: An algorithm is a set of rules or procedures that define how a problem is solved or a task is performed. In the context of cybersecurity and cryptography, algorithms are used to encrypt and decrypt data, generate keys, and perform other security-related functions.

Allowlist: An allowlist is a list of trusted entities or applications that are permitted to access a particular resource or perform a specific action. This is in contrast to a denylist, which specifies entities or applications that are not allowed to access a resource or perform an action.

Anti-Botnet: Anti-botnet refers to security measures designed to detect, prevent, and mitigate the impact of botnet attacks. Botnets are networks of compromised devices that can be used to launch distributed denial-of-service (DDoS) attacks, steal data, and perform other malicious activities.

Anti-Malware: Anti-malware refers to security software designed to detect and remove malware such as viruses, worms, Trojans, and other malicious software. Anti-malware solutions typically use a combination of signature-based and behavioral analysis techniques to identify and neutralize threats.

Anti-Phishing: A set of techniques and tools designed to prevent phishing attacks, which are fraudulent attempts to obtain sensitive information from individuals, such as usernames, passwords, and credit card details, by posing as a trustworthy entity.

Anti-Virus: Software that is designed to detect and remove malicious software, also known as malware, from computer systems. This includes viruses, worms, trojan horses, and other types of malware.

APT attack: An Advanced Persistent Threat (APT) attack is a sophisticated cyber attack that targets a specific organization or individual with the goal of stealing sensitive information. APT attacks involve multiple stages and are typically carried out over an extended period of time by skilled attackers who use a variety of techniques to evade detection.

Attack: An attack is any action that is intended to cause harm or damage to a computer system or network. Attacks can take many forms, including malware infections, denial of service attacks, and social engineering attacks.

Attack Vector: An attack vector is a path or method that an attacker uses to gain unauthorized access to a computer system or network. Attack vectors can include email attachments, phishing links, and software vulnerabilities.

Authentication: The process of verifying the identity of a user or system. Authentication mechanisms typically involve the use of usernames and passwords, digital certificates, or biometric data.

Backdoor: A backdoor is a hidden or undocumented method of bypassing normal authentication procedures to gain access to a computer system or network. Backdoors can be installed by attackers or by system administrators for legitimate purposes.

Banker Trojan: A type of Trojan horse malware that is specifically designed to steal financial information, such as banking credentials, credit card numbers, and other sensitive data.

Bell Inequality: A concept in quantum physics used to test the predictions of quantum mechanics against classical mechanics and to demonstrate the non-local nature of entangled particles.

Bit: The basic unit of classical information, representing either a 0 or a 1.

Blacklist: A list of entities that are considered to be malicious or undesirable, such as IP addresses, domains, or email addresses. Blacklists are commonly used by anti-spam and anti-malware software to filter out unwanted traffic.

Blind Signature Scheme: A cryptographic protocol that allows a user to sign a message without revealing its contents to a third party. Blind signature schemes are used in a variety of applications, including electronic voting and anonymous digital cash systems.

Bloch Sphere: A visual representation of the state space of a single qubit, used to depict qubit states geometrically.

Block Cipher: A type of encryption algorithm that operates on a fixed-length group of bits (i.e., block) of plaintext and transforms it into a block of ciphertext of the same length.

Blocklist: A list of IP addresses, URLs, or domain names that are known to be sources of spam, malware, or other security threats and are blocked from accessing a network or system.

Blowfish: A symmetric block cipher that operates on 64-bit blocks of data and uses a variable-length key of up to 448 bits.

Botnet: A network of computers that are infected with malware and controlled by a remote attacker, usually for malicious purposes such as launching DDoS attacks or stealing sensitive information.

Brute Force Attack: A trial-and-error method of cracking a password or encryption key by systematically trying every possible combination until the correct one is found.

Business Continuity Plan (BCP): A documented plan that outlines procedures and protocols to ensure that essential business functions can continue in the event of a disruption, such as a natural disaster or cyber attack.

Business Disruption: Any event or situation that causes a temporary or permanent interruption of normal business operations, such as a power outage or cyber attack.

Bring Your Own Cloud (BYOC): A practice where employees use their personal cloud storage accounts (e.g., Google Drive or Dropbox) to store and share company data.

Bring Your Own License (BYOL): A practice where employees use their personal software licenses for business purposes, such as using their personal Microsoft Office license for work-related tasks.

CAPTCHA: A type of challenge-response test that is used to determine whether the user is human or automated software (i.e., a bot). It typically involves visually identifying distorted letters or numbers and entering them into a form to prove that the user is not a bot.

Certificate: A digital certificate is a digital file that contains information about the identity of the certificate owner and is used to establish trust between two parties in electronic transactions. It is typically used to verify the identity of a website or software publisher.

ChaCha20: A symmetric encryption algorithm designed to provide strong encryption while being very fast on modern hardware. It is often used in internet security protocols such as HTTPS and VPNs.

Classical Computer: A traditional computer that uses bits and binary logic to perform calculations.

Clientless: Refers to software or applications that can be accessed through a web browser without requiring the installation of a client software or application.

Clipper: A controversial encryption system developed by the U.S. government in the 1990s that was designed to allow law enforcement agencies to access encrypted communications. The system was never widely adopted due to concerns about privacy and security.

COTS (Commercial off-the Shelf): Refers to software or hardware that is readily available and can be purchased from a third-party vendor, rather than being developed in-house.

Coherence: The time over which a qubit maintains its quantum state without significant decoherence or error.

Critical Infrastructure: Refers to the systems and assets that are essential to the functioning of a society and the economy, including transportation systems, communication networks, energy grids, and water supplies.

CRYPTEN: A framework for secure machine learning that provides a library of cryptographic primitives and tools to protect data privacy and integrity in machine learning systems.

CRYPTFLOW: A tool for securing machine learning pipelines that provides end-to-end encryption and integrity checks for data and model parameters.

Cryptography: The practice of securing communications and information by transforming it into an unreadable format using various encryption techniques and algorithms.

Cryptojacking: The unauthorized use of a computer’s processing power to mine cryptocurrency, often accomplished through malware or browser-based attacks.

Cyber Threat Hunting: The process of proactively searching for and identifying potential cyber threats or attacks that may have gone undetected by traditional security measures.

Cyberbullying: The use of electronic communication to harass, intimidate, or harm individuals or groups, often through social media, text messages, or other online platforms.

Cybersecurity: The practice of protecting computer systems, networks, and digital information from theft, damage, or unauthorized access.

Dark Web: A part of the internet that is intentionally hidden and can only be accessed with specific software, configurations, or authorization. It is often associated with illegal activities, such as cybercrime, drug trade, and illicit content.

Data Breach: The unauthorized access, acquisition, or disclosure of sensitive or confidential information by an individual, group, or organization.

Data Integrity: The assurance that data remains complete, accurate, and consistent throughout its lifecycle, from creation to deletion.

Data Loss Prevention (DLP): A set of technologies and strategies used to prevent data loss or leakage by monitoring, detecting, and blocking sensitive data in transit or at rest.

Data Minimization: A privacy principle that limits the collection and retention of personal data to only what is necessary for a specific purpose.

Data Theft: The act of stealing or intentionally taking sensitive or confidential data without proper authorization or consent.

DDoS (Distributed Denial of Service): A type of cyber-attack that floods a targeted system, network, or website with excessive traffic or requests to overwhelm its resources and disrupt its normal operations.

Decoherence: The loss of quantum coherence in which a quantum system transitions into a classical state due to interaction with its environment.

Decryption: The process of converting encrypted data back into its original, readable form using a secret key or password.

Deny list: A list of items, such as IP addresses, domains, or URLs, that are explicitly blocked or prohibited from accessing a network, system, or application.

Differential Privacy: A privacy framework that allows the collection, analysis, and sharing of data while minimizing the disclosure of personally identifiable information of individuals.

Digital Fingerprint: A unique and unalterable digital representation of a file, document, or data that is generated using a mathematical algorithm. It helps to ensure the integrity and authenticity of the data.

Digital Forensics: The process of collecting, analyzing, and preserving electronic data in order to investigate and provide evidence for a cybercrime or a security incident.

Digital Signature: A cryptographic technique that uses a digital key to sign a document, message, or data. It provides authenticity, integrity, and non-repudiation of the data.

Distributed Key: A cryptographic key that is distributed among multiple parties or locations to enhance security and prevent unauthorized access or tampering.

DiVincenzo Criteria: A list of requirements proposed by physicist David DiVincenzo for building a viable quantum computer, including scalability, qubit initialization, and decoherence management.

Domain: A group of devices, computers, or systems that share a common name and are connected to the same network or managed by the same organization.

Domain Name Systems (DNS) Exfiltration: A technique used by cybercriminals to steal data by using the DNS protocol to send stolen data outside an organization’s network.

Drive-By Download Attack: A type of cyber-attack in which malware is automatically downloaded and installed on a user’s device without their knowledge or consent, typically by visiting a malicious website.

Elliptic curve cryptography: A type of public-key cryptography that uses the mathematical properties of elliptic curves to generate public and private keys and to encrypt and decrypt data.

Endpoint Protection: A cybersecurity solution that protects endpoints, such as laptops, desktops, mobile devices, and servers, from cyber threats and attacks.

Ensemble Privacy-Preserving Techniques: A set of cryptographic and algorithmic methods that combine multiple privacy-preserving models or mechanisms to enhance overall security and accuracy in machine learning tasks.

Entanglement: A quantum phenomenon where two or more particles become correlated in such a way that the state of one particle instantly influences the state of the other, regardless of distance.

Entropy: A measure of uncertainty or disorder; in quantum systems, it represents the amount of information or randomness in a quantum state.

Expiration Date: A date or time after which a cryptographic key or digital certificate is no longer valid or trusted.

Explainable AI (XAI): Techniques that make AI model decisions interpretable and understandable to humans.

Exploit: A piece of software, code, or technique used by cybercriminals to take advantage of vulnerabilities or weaknesses in a computer system, software, or application.

Fast Identity Online (FIDO): An authentication standard that allows users to securely authenticate online services and applications using biometric data or hardware security tokens.

Federated Learning: A distributed machine learning approach that trains algorithms collaboratively across decentralized devices or servers holding local data samples, without exchanging them.

Fidelity: A measure of how accurately a quantum state or operation preserves the expected quantum information or behavior.

Fileless Malware: A type of malware that resides only in the computer’s memory rather than on the hard drive, making it difficult to detect and remove.

Firewall: A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

Forgery: The act of creating a fraudulent document or object with the intention of deceiving someone. In the context of cybersecurity, forgery can refer to falsifying digital signatures, certificates, or other types of authentication credentials.

Format-Preserving Encryption (FPE): A type of encryption that preserves the format of the original data while still rendering it unreadable to unauthorized users.

Fully Homomorphic Encryption: An advanced form of encryption that allows computations to be performed on ciphertext without first decrypting it.

Generative AI: A class of AI systems capable of generating text, images, code, audio, and other content. These models learn from large datasets and use statistical techniques to generate outputs that resemble training data.

Greylist: A method of email filtering that temporarily delays the delivery of messages from senders that are not explicitly whitelisted or blacklisted to allow further inspection.

Hacker: A term used to describe someone who attempts to gain unauthorized access to computer systems or networks, often with malicious intent.

Hacker, Black Hat: A hacker who uses their skills for illegal or malicious purposes, such as stealing data, spreading malware, or conducting cyber-attacks.

Hacker, White Hat: A hacker who uses their skills for ethical purposes, such as identifying vulnerabilities in systems and networks to help improve security.

Homomorphic Encryption: An encryption scheme that allows data to remain encrypted while computations are performed on it.

Honeypot: A decoy system or network set up to detect, deflect, or study attempted unauthorized access, attacks, or malicious activity.

Identity: The set of characteristics and attributes that define an individual or entity and distinguish them from others. In cybersecurity, identity refers to the authentication and authorization of users, devices, and other entities accessing a system or network.

Identity and Access Management (IAM): The policies, procedures, and technologies used to manage digital identities and control access to systems, networks, and applications.

In-line Network Device: A device placed directly in the path of network traffic that processes or filters that traffic in real-time. Examples include firewalls, intrusion prevention systems, and load balancers.

Indicators of Compromise (IOC): Artifacts or anomalies in a system or network that suggest the presence or activity of a threat actor. Examples include unusual traffic patterns, file hashes, or IP addresses.

Insider Threat: A security risk originating from within the organization, often involving employees or contractors who misuse their access to systems or data.

Interference: A quantum effect where the probability amplitudes of quantum states combine, leading to amplification or cancellation of outcomes.

Inference Attack: An attack where an adversary deduces sensitive information by analyzing patterns in a model’s outputs or query responses.

Intrusion Prevention System (IPS): A security system that monitors network traffic in real-time to identify and prevent potential malicious activity.

IoT (Internet of Things): A network of physical devices embedded with sensors, software, and other technologies to collect and exchange data via the internet.

Key: A piece of information used in encryption and decryption algorithms to transform plaintext into ciphertext and vice versa.

Key Schedule: The process used in cryptographic algorithms to generate a series of subkeys from a single key.

Key Space: The total number of possible keys in a given cryptographic algorithm, often used as a measure of the algorithm’s strength.

Keylogger: Malicious software that records keystrokes to steal information such as usernames, passwords, and financial details.

Large Language Model (LLM): An AI model trained on vast amounts of textual data to understand and generate human-like language. LLMs are foundational to many generative AI applications, such as chatbots and content generation tools.

Life Cycle: The stages of development and maintenance that a software or hardware product goes through, from initial conception to retirement.

Malvertising: The use of online advertising to distribute malware, by injecting malicious code into legitimate ad networks and using them to deliver malware to unsuspecting users.

Man in the Middle Attack: A type of cyberattack in which a hacker intercepts communications between two parties in order to eavesdrop or manipulate the data being transmitted.

MITRE ATT&CK™ Framework: A comprehensive knowledge base of cyberattack tactics and techniques used by cybersecurity professionals to identify, categorize, and respond to various types of cyber threats.

Measurement: The process in quantum computing where a qubit collapses from a superposition into one of its basis states (typically 0 or 1).

ML Privacy Meter: A tool for assessing and quantifying the privacy risks and vulnerabilities in machine learning models, such as the risk of data leakage or model inversion.

Model Inversion Attack: A technique where an attacker uses access to a machine learning model to infer details about its training data.

Multi-party Computation: A subfield of cryptography where multiple parties jointly compute a function over their inputs while keeping those inputs private from each other.

Network-based (cyber) Security: Security practices and technologies focused on protecting computer networks from unauthorized access, misuse, or theft.

No-cloning Theorem: A fundamental principle in quantum mechanics that states it is impossible to create an identical copy of an arbitrary unknown quantum state.

One Time Password: A temporary password valid for a single login session or transaction, used to enhance security in online systems.

Packet sniffing: The practice of intercepting and analyzing data packets as they pass over a computer network to gather sensitive information.

Parental Controls: Software or device settings that allow parents to monitor and restrict their children’s online activity or access to content.

Password: A secret word or code used to gain access to a computer system or online account, helping to authenticate the user’s identity.

Pen Testing: Short for penetration testing, this is the practice of simulating cyberattacks on systems to discover vulnerabilities before real attackers do.

Personal Identifiable Information (PII): Any information that can be used to identify an individual, such as name, SSN, driver’s license, or biometric data.

Phishing: A type of cyberattack where a malicious actor tricks users into revealing sensitive information by pretending to be a trustworthy entity.

PII: Acronym for Personal Identifiable Information, referring to data that can identify a specific individual.

PIN: Short for Personal Identification Number, a numeric code used to authenticate identity and grant system access.

Plain Text: Unencrypted information that is readable by humans and machines without the need for decryption.

Privacy-Preserving Machine Learning (PPML): A field of study that enables machine learning on sensitive data while ensuring the privacy of the underlying information using techniques like federated learning, homomorphic encryption, and differential privacy.

Privacy-Preserving Training: Training methods that protect data privacy during model development. These methods may include secure computation, encryption, or local differential privacy techniques.

Process Hollowing: A technique used by malware to inject malicious code into the memory of a legitimate process, effectively disguising the malicious process as benign.

Post Quantum Cryptography: Cryptographic methods designed to be secure against potential attacks from quantum computers.

PYSYFT: An open-source Python library for secure and privacy-preserving machine learning, enabling operations on encrypted data and federated learning through PyTorch integration.

Quantum Advantage: The point at which a quantum computer performs a specific task more efficiently than any classical computer could.

Quantum Algorithm: A step-by-step computational procedure that runs on a quantum computer, exploiting quantum mechanics to solve problems faster than classical algorithms.

Quantum Circuit: A model for quantum computation where a computation is a sequence of quantum gates applied to qubits.

Quantum Computer: A computational device that uses qubits and quantum mechanical principles like entanglement and superposition to perform calculations.

Quantum Computing: A type of computing based on quantum mechanics, where quantum bits (qubits) can exist in multiple states simultaneously.

Quantum Cryptanalysis: The study and use of quantum algorithms to break or weaken classical cryptographic systems, such as RSA or ECC, which are vulnerable to quantum attacks like Shor’s algorithm.

Quantum Dot: A nanoscale semiconductor that can trap electrons or holes in three dimensions, often used to implement qubits in quantum systems.

Quantum Internet: A proposed global network that uses quantum signals and entanglement for ultra-secure communication and distributed quantum computing.

Quantum Key Distribution (QKD): A secure communication method that uses quantum mechanics to distribute encryption keys. QKD allows two parties to detect any third-party attempts to gain knowledge of the key.

Quantum Measurements: Operations that extract classical information from a quantum system, typically resulting in the collapse of superposed states.

Quantum Safe Cryptography: Cryptographic algorithms that are believed to be secure against attacks from quantum computers.

Quantum Supremacy: The theoretical point at which a quantum computer can solve a problem that classical computers practically cannot solve in a reasonable time.

Qubit: The basic unit of quantum information, representing both 0 and 1 simultaneously via superposition.

Random Number Generator: A program or device that generates a sequence of numbers that are statistically random and unpredictable, often used in cryptography for generating encryption keys.

Ransomware: A type of malware that encrypts the victim’s data and demands payment in exchange for the decryption key.

Remote Desktop Protocol (RDP): A proprietary protocol developed by Microsoft that allows a user to access and control a computer remotely over a network connection.

Reusable Password: A password that is used for multiple accounts or systems, increasing the risk of security breaches.

Risktool: A software tool that may pose a risk to a system, often due to its dual-use nature—legitimate function with potential for misuse.

Rootkit: Malicious software designed to enable unauthorized access to a computer system while actively hiding its presence.

RSA Encryption: A public-key encryption algorithm based on the difficulty of factoring large prime numbers. Widely used for secure data transmission.

Running Time: The amount of time it takes for an algorithm or computer program to execute.

Salt: A random value added to input data (like a password) before hashing to ensure uniqueness and prevent dictionary attacks.

Sandbox(ing): A security mechanism for separating running programs to test or execute code in a controlled environment without affecting the host system.

Scareware: Malicious software that uses fear-based tactics to trick users into buying unnecessary or harmful security software.

SECaaS: Security as a Service — the delivery of security solutions via cloud-based services.

Secret Key: A key used in symmetric encryption, where the same key is used to both encrypt and decrypt data.

Security Incident Response: The process of identifying, managing, recording, and analyzing security threats or incidents in real time.

Security Operations Center (SOC): A centralized team that monitors, detects, and responds to cybersecurity incidents.

Security Perimeter: The boundary within which a network or system enforces its security policies and access controls.

Server: A computer system or program that provides services, data, or resources to other computers over a network.

Session Key: A temporary encryption key used for the duration of a single communication session.

Shadow Model: A replica of a target machine learning model built by an attacker to study its behavior and launch privacy attacks.

SIEM (Security Information and Event Management): A system that collects, monitors, and analyzes security-related data in real time for threat detection and compliance.

SIM Swapping: A form of identity theft where an attacker convinces a telecom provider to switch a victim’s phone number to a SIM card they control.

SKIPJACK: A symmetric-key block cipher developed by the NSA with an 80-bit key, used in the Clipper chip project.

Sniffing: The act of monitoring and capturing data packets as they travel across a network.

SNOW: A family of stream ciphers optimized for high-speed encryption, particularly in constrained devices like mobile phones.

SOAR (Security Orchestration, Automation and Response): A technology platform that enables security teams to automatically respond to low-level incidents and integrate security tools.

Social Engineering: The manipulation of individuals into divulging confidential or personal information for fraudulent purposes.

Spam: Unsolicited and often irrelevant or inappropriate messages sent over the internet, typically to large numbers of users.

Spear Phishing: A phishing attack tailored to a specific individual or organization, often based on personal details gathered beforehand.

Splitting: A cryptographic technique that divides plaintext into smaller blocks that are then encrypted and recombined.

Spoofing: The act of disguising a communication from an unknown source as being from a known, trusted source.

Spyware: Software that gathers user information through the user’s Internet connection without their knowledge, often for advertising purposes.

Superposition: The ability of a quantum system to exist in multiple states at once until it is measured.

Symmetric Cipher: A cryptographic algorithm that uses the same key for both encryption and decryption.

TensorFlow Privacy: A library developed by Google for training machine learning models with differential privacy, integrated into TensorFlow workflows.

The Advanced Encryption Standard (AES): A widely used symmetric block cipher established by NIST to replace DES, using 128-bit blocks and key sizes of 128, 192, or 256 bits.

Threat Assessment: The process of identifying and evaluating potential security threats to determine their impact and likelihood.

Threat Hunting: The proactive search for cyber threats that are lurking undetected in a network.

Threat Intelligence: Information about existing or emerging cyber threats used to prepare, prevent, and identify cybersecurity threats.

Transmission Control Protocol: One of the main protocols in the Internet protocol suite, enabling reliable, ordered, and error-checked data delivery.

Transport Mode: An IPsec mode that encrypts only the payload and ESP trailer, not the IP header.

Trapped Ion: A technology for building qubits using ions held in place by electromagnetic fields and manipulated by lasers.

Triple Data Encryption Standard (DES): An enhancement of DES that applies the encryption algorithm three times to each data block for added security.

Tunnel Mode: An IPsec mode where both the payload and the original IP header are encrypted.

Two-factor Authentication (2FA): A security process that requires users to provide two different authentication factors to verify themselves.

Twofish: A symmetric key block cipher known for its speed and flexibility, one of the AES finalists.

Vernam Cipher: A symmetric stream cipher that uses a random key that is as long as the message; theoretically unbreakable when used properly.

Virus: Malicious software that replicates itself and spreads to other systems, often attaching to legitimate files.

VPN (Virtual Private Network): A secure connection method used to add privacy and security to private and public networks, like the Internet.

Vulnerability: A flaw or weakness in a system that can be exploited to compromise its security.

WAF (Web Application Firewall): A firewall that filters, monitors, and blocks HTTP traffic to and from a web application to prevent attacks.

Whitelist: A list of trusted entities approved for access or privileges, often used in contrast to blacklists.

Wide Area Network: A telecommunications network that extends over a large geographic area for the purpose of computer networking.

Zero Knowledge Proofs: A cryptographic method that allows one party to prove to another party that they know a value without revealing the value itself.

Zero-day Exploit: An attack that exploits a previously unknown vulnerability in software or hardware.

Zero-Touch Provisioning (ZTP): A deployment method that allows network devices to be provisioned automatically without manual intervention.

Zero Trust: A security model that assumes no implicit trust and requires continuous verification of users and devices inside and outside the network.

zk-SNARK: Short for Zero-Knowledge Succinct Non-Interactive Argument of Knowledge. A cryptographic proof system that enables one party to prove possession of specific knowledge without revealing it, used in privacy-focused blockchains and AI audit trails.

Scroll to Top