Encyclopedia of Cybersecurity

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Ze Zo

Zero Trust Model

The Zero Trust Model is a cybersecurity framework and approach to network security that emphasizes the principle of “never trust, always verify.” In a Zero Trust Model, organizations assume that threats may already exist both inside and outside their network perimeter and adopt a proactive approach to security that requires continuous verification of trust for […]

Zero Trust Model Read More »

Zero-Day Attack

A zero-day attack, also known as a zero-day exploit, refers to a cyberattack that targets a previously unknown vulnerability or security flaw in software, hardware, or firmware. The term “zero-day” originates from the fact that the attack occurs on “day zero” of the discovery of the vulnerability, meaning that developers and security researchers have had

Zero-Day Attack Read More »

Zero-Knowledge Proof

Zero-Knowledge Proof (ZKP) is a cryptographic protocol that allows one party, called the prover, to prove to another party, called the verifier, that a statement is true without revealing any additional information beyond the validity of the statement itself. In other words, a zero-knowledge proof allows the prover to demonstrate knowledge of a secret or

Zero-Knowledge Proof Read More »

Zombie Computer

A Zombie Computer, also known as a zombie, is a computer system that has been compromised by malware and is under the control of a malicious actor or botmaster without the knowledge or consent of the legitimate owner. Zombies are typically part of a larger network of compromised computers, known as a botnet, which is

Zombie Computer Read More »

Scroll to Top