Dataset Viewer
cybersecurity
stringlengths 4
48
|
|---|
phishing
|
malware
|
ransomware
|
zero-day
|
exploit
|
vulnerability
|
threat actor
|
social engineering
|
DDoS
|
endpoint security
|
firewall
|
encryption
|
authentication
|
penetration testing
|
threat intelligence
|
compliance
|
zero trust
|
multi-factor authentication (MFA)
|
incident response
|
patch management
|
rootkit
|
spyware
|
adware
|
trojan
|
worm
|
virus
|
botnet
|
brute force attack
|
man-in-the-middle (MitM) attack
|
SQL injection
|
cross-site scripting (XSS)
|
denial of service (DoS)
|
distributed denial of service (DDoS)
|
VPN (Virtual Private Network)
|
intrusion detection system (IDS)
|
intrusion prevention system (IPS)
|
security operations center (SOC)
|
ethical hacking
|
black hat hacker
|
white hat hacker
|
cybercrime
|
cyber espionage
|
data breach
|
data loss prevention (DLP)
|
cloud security
|
mobile security
|
internet of things (IoT) security
|
application security
|
network security
|
security information and event management (SIEM)
|
AI in cybersecurity
|
blockchain security
|
risk assessment
|
access control
|
cryptography
|
decryption
|
dark web
|
cyber resilience
|
business continuity plan (BCP)
|
disaster recovery
|
security architecture
|
threat hunting
|
malvertising
|
keylogger
|
shadow IT
|
supply chain attack
|
ransomware-as-a-service (RaaS)
|
phishing simulation
|
advanced persistent threat (APT)
|
vishing
|
smishing
|
quishing
|
deepfake
|
endpoint detection and response (EDR)
|
security awareness training
|
remote access
|
secure web gateway (SWG)
|
DNS tunneling
|
buffer overflow
|
evil twin
|
identity and access management (IAM)
|
payload
|
cyber warfare
|
digital forensics
|
passwordless authentication
|
quantum computing security
|
regulatory compliance
|
GDPR
|
NIST framework
|
ISO/IEC 27001
|
data integrity
|
CIA triad
|
cyber kill chain
|
attack vector
|
threat modeling
|
software development security (SDLC)
|
secure coding
|
perimeter security
|
endpoint hardening
|
threat intelligence platform (TIP)
|
End of preview. Expand
in Data Studio
A list of common cybersecurity keywords. Intended use: "For training and evaluating NLP models for cybersecurity research."
- Downloads last month
- 11
Size of downloaded dataset files:
1.9 kB
Size of the auto-converted Parquet files:
2.6 kB
Number of rows:
103