Skip to main content
LCFLuxembourg Cybersecurity Factory

Cybersecurity Glossary

Key terms and definitions used across the Luxembourg cybersecurity ecosystem and the LCF portal.

53 terms found

A

APT (Advanced Persistent Threat)

Threats

A prolonged and targeted cyber attack in which an intruder gains access to a network and remains undetected for an extended period to steal data.

Attack Surface

General

The total number of points (attack vectors) where an unauthorised user can try to enter or extract data from a system.

Authentication

Identity

The process of verifying the identity of a user, device, or system before granting access to resources.

Authorisation

Identity

The process of determining what permissions an authenticated user has and what resources they can access.

B

Blue Team

Operations

A group of security professionals responsible for defending an organisation's information systems against cyber attacks.

C

CERT (Computer Emergency Response Team)

Operations

A team of experts that handles computer security incidents. Luxembourg has CIRCL (Computer Incident Response Center Luxembourg).

CIA Triad

General

The three pillars of information security: Confidentiality (data is private), Integrity (data is accurate), and Availability (data is accessible when needed).

CIRCL

Luxembourg

Computer Incident Response Center Luxembourg — the national CERT providing incident response, threat intelligence, and security services.

CSIRT (Computer Security Incident Response Team)

Operations

A team providing services and support to prevent, handle, and respond to computer security incidents.

CVE (Common Vulnerabilities and Exposures)

Standards

A standardised list of publicly disclosed cybersecurity vulnerabilities, each identified by a unique ID (e.g. CVE-2024-1234).

Cyber Commons Office

LCF

An LCF engine that provides shared cybersecurity services and resources for the Luxembourg ecosystem.

Cyber Resilience

General

An organisation's ability to continuously deliver intended outcomes despite adverse cyber events. Goes beyond prevention to include detection, response, and recovery.

D

Data Breach

Threats

An incident in which sensitive, protected, or confidential data is accessed, disclosed, or stolen by an unauthorised individual.

Data Space

LCF

An LCF engine providing a secure, governed environment for sharing cybersecurity-relevant data sets among trusted participants.

DDoS (Distributed Denial of Service)

Threats

An attack that overwhelms a target system with traffic from multiple sources, making it unavailable to legitimate users.

Digital Forensics

Operations

The collection, preservation, analysis, and presentation of digital evidence related to cyber incidents or crimes.

DORA (Digital Operational Resilience Act)

Regulation

An EU regulation that establishes ICT risk management, incident reporting, and resilience testing requirements for financial entities.

E

Encryption

Cryptography

The process of converting plaintext data into an unreadable format (ciphertext) using an algorithm and key, ensuring only authorised parties can read it.

Endpoint Detection and Response (EDR)

Tools

Security solutions that monitor endpoint devices (laptops, servers) for suspicious activity and provide automated response capabilities.

ENISA

Standards

European Union Agency for Cybersecurity — provides expertise and guidance on cybersecurity across EU member states.

F

Firewall

Tools

A network security device or software that monitors and filters incoming and outgoing network traffic based on predefined security rules.

G

GDPR (General Data Protection Regulation)

Regulation

EU regulation on data protection and privacy that governs how personal data of individuals within the EU is collected, stored, and processed.

H

Hash Function

Cryptography

A mathematical function that converts input data into a fixed-size string of characters. Used for password storage, data integrity verification, and digital signatures.

I

Incident Response

Operations

The systematic approach to addressing and managing the aftermath of a security breach or cyber attack, with the goal of limiting damage and reducing recovery time.

IoC (Indicator of Compromise)

Threats

Forensic artefacts that indicate a system has been breached, such as unusual network traffic, suspicious files, or unexpected system changes.

ISO 27001

Standards

An international standard for information security management systems (ISMS), providing a framework for establishing, implementing, and continually improving information security.

L

LCF (Luxembourg Cybersecurity Factory)

LCF

A collaborative platform by the Luxembourg House of Cybersecurity (LHC) that provides shared services, data spaces, and innovation labs for the cybersecurity ecosystem.

LHC (Luxembourg House of Cybersecurity)

Luxembourg

The national agency driving cybersecurity development in Luxembourg through awareness, competence building, and ecosystem support.

M

Malware

Threats

Malicious software designed to damage, disrupt, or gain unauthorised access to computer systems. Includes viruses, worms, trojans, ransomware, and spyware.

MFA (Multi-Factor Authentication)

Identity

A security method requiring two or more verification factors (something you know, have, or are) to access a resource.

MISP

Luxembourg

Malware Information Sharing Platform — an open-source threat intelligence platform developed by CIRCL for sharing, storing, and correlating IoCs and threat data.

MITRE ATT&CK

Standards

A knowledge base of adversary tactics, techniques, and procedures (TTPs) based on real-world observations, used for threat modelling and security assessments.

N

NC3 (National Cybersecurity Competence Centre)

Luxembourg

Luxembourg's national centre for cybersecurity competence, coordinating research, innovation, and capacity building.

NIS2 Directive

Regulation

EU directive establishing cybersecurity risk management and reporting obligations for essential and important entities across member states.

NIST Cybersecurity Framework

Standards

A set of guidelines and best practices published by the US National Institute of Standards and Technology to help organisations manage cybersecurity risk.

O

OSINT (Open Source Intelligence)

Operations

Intelligence gathered from publicly available sources such as websites, social media, public records, and news outlets for security analysis.

P

Penetration Testing

Operations

Authorised simulated attacks on a computer system to evaluate its security posture and identify vulnerabilities before malicious actors can exploit them.

Phishing

Threats

A social engineering attack that uses deceptive emails, messages, or websites to trick users into revealing sensitive information or installing malware.

Post-Quantum Cryptography

Cryptography

Cryptographic algorithms designed to be secure against attacks by both classical and quantum computers. A key research area of the LCF Quantum Lab.

Q

Quantum Key Distribution (QKD)

Cryptography

A method of secure communication that uses quantum mechanics principles to create and distribute encryption keys, ensuring any eavesdropping is detectable.

Quantum Lab

LCF

An LCF engine dedicated to post-quantum cryptography research and quantum-safe security experimentation.

R

Ransomware

Threats

Malware that encrypts a victim's files and demands payment (ransom) for the decryption key to restore access.

Red Team

Operations

Security professionals who simulate real-world adversaries to test an organisation's detection and response capabilities.

Risk Assessment

General

The process of identifying, analysing, and evaluating cybersecurity risks to determine their likelihood and potential impact on an organisation.

S

SIEM (Security Information and Event Management)

Tools

A system that aggregates and analyses security data from across an organisation's IT infrastructure to detect threats and support incident response.

SOC (Security Operations Centre)

Operations

A centralised facility where a team of security analysts monitors, detects, analyses, and responds to cybersecurity incidents around the clock.

Social Engineering

Threats

Psychological manipulation techniques used to deceive people into divulging confidential information or performing actions that compromise security.

Supply Chain Attack

Threats

An attack that targets less-secure elements in a supply chain (e.g. third-party software, hardware components) to compromise a primary target.

T

Threat Intelligence

Operations

Evidence-based knowledge about existing or emerging threats that can inform decisions about an organisation's response to those threats.

TLP (Traffic Light Protocol)

Standards

A set of labels (RED, AMBER+STRICT, AMBER, GREEN, CLEAR) used to indicate sharing boundaries for sensitive information within the cybersecurity community.

V

Vulnerability

General

A weakness in a system, application, or process that could be exploited by a threat actor to gain unauthorised access or cause harm.

Z

Zero-Day

Threats

A previously unknown vulnerability that is exploited before the vendor has released a patch or fix. Called "zero-day" because the developer has had zero days to address it.

Zero Trust

General

A security model based on the principle "never trust, always verify" — every access request is fully authenticated, authorised, and encrypted regardless of network location.