- Zero-day exploit A cyber-attack that occurs on the same day a vulnerability is discovered in software. On that day, the software developers have "zero days" to fix the problem before the exploit can be used. Attackers exploiting a zero-day vulnerability can cause significant harm because there's often no defense against the attack, as the vulnerability is not yet known to the software developer or the wider community.
- Zero-Defect The ultimate goal of creating systems, software, or procedures that have no defects or flaws, particularly those that could be exploited to compromise security. Achieving a zero-defect state would theoretically mean that all potential vulnerabilities have been identified and resolved. However, the complexity of modern systems and software often makes this goal difficult to achieve in practice.
- Zero fill A process of overwriting all data on a storage device with zeroes in order to permanently erase the data. It is used to securely delete sensitive data and prevent it from being recovered. Examples of zero fill include wiping a hard drive, formatting a USB drive, and using a secure erase utility.
- Zero-knowledge proof A mathematical proof that allows one party to prove to another party that they know a certain piece of information without revealing the information itself. It is used in cryptography and secure communication protocols to verify the authenticity of a user or device without exposing sensitive information. Examples of zero-knowledge proofs include the Schnorr signature algorithm and the Fiat-Shamir heuristic.
- Zero-trust architecture A security model that assumes no user or device can be trusted by default, regardless of its location (inside or outside the network) or whether it has previously been verified. Instead, every request for access to resources must be authenticated and authorized. This approach minimizes the potential for unauthorized access and reduces the attack surface by limiting access to only what is needed for a specific task, even if a user's credentials or device has been compromised.
- ZigBee protocol A wireless communication standard for low-power, low-data-rate devices such as sensors, switches, and other smart home devices. It is commonly used in home automation systems and other IoT applications. Examples of its use include connecting a smart thermostat to a home automation system or controlling lights and appliances with a smart home app.
- Zone A logical grouping of network resources that share a common security policy or trust level. It is used to segment a network into smaller, more manageable units and to enforce security policies on specific groups of resources. Examples of zones include DMZ, trusted zone, and untrusted zone.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.