Daftar Kosakata Keamanan Siber (Inggris - Indonesia)
Tampilan
	
	
Kriptografi
- Encryption = /ɪnˈkrɪpʃən/ = Enkripsi
- Decryption = /diːˈkrɪpʃən/ = Dekripsi
- Cipher = /ˈsaɪfər/ = Sandi
- Key = /kiː/ = Kunci (kriptografi)
- Hash = /hæʃ/ = Fungsi hash
- Digital Signature = /ˈdɪdʒɪtəl ˈsɪgnətʃər/ = Tanda tangan digital
- Public Key = /ˈpʌblɪk kiː/ = Kunci publik
- Private Key = /ˈpraɪvət kiː/ = Kunci privat
- Symmetric Encryption = /sɪˈmɛtrɪk ɪnˈkrɪpʃən/ = Enkripsi simetris
- Asymmetric Encryption = /eɪˈsɪmɛtrɪk ɪnˈkrɪpʃən/ = Enkripsi asimetris
Jaringan
- Firewall = /ˈfaɪərwɔːl/ = Firewall
- Router = /ˈruːtər/ = Penghala
- Switch = /swɪtʃ/ = Saklar jaringan
- Bandwidth = /ˈbændwɪdθ/ = Lebar pita
- IP Address = /aɪ piː əˈdrɛs/ = Alamat IP
- Subnet = /ˈsʌbnɛt/ = Subnet
- VPN = /viː piː ɛn/ = VPN
- Packet = /ˈpækɪt/ = Paket data
- Protocol = /ˈproʊtəkɒl/ = Protokol jaringan
- Port = /pɔːrt/ = Port (jaringan)
Malware
- Virus = /ˈvaɪrəs/ = Virus komputer
- Trojan = /ˈtroʊdʒən/ = Trojan horse (komputer)
- Worm = /wɜːrm/ = Worm komputer
- Spyware = /ˈspaɪwɛər/ = Spyware
- Adware = /ˈædwɛər/ = Adware
- Ransomware = /ˈrænsəmwɛər/ = Ransomware
- Rootkit = /ˈruːtkɪt/ = Rootkit
- Keylogger = /ˈkiːˌlɒɡər/ = Keylogger
- Botnet = /ˈbɒtnɛt/ = Botnet
- Backdoor = /ˈbækˌdɔːr/ = Backdoor (komputer)
Keamanan Informasi
- Authentication = /ˌɔːθɛntɪˈkeɪʃən/ = Autentikasi
- Authorization = /ˌɔːθərəˈzeɪʃən/ = Otorisasi
- Confidentiality = /ˌkɒnfɪˌdɛnʃɪˈælɪti/ = Kerahasiaan
- Integrity = /ɪnˈtɛɡrɪti/ = Integritas
- Availability = /əˌveɪləˈbɪlɪti/ = Ketersediaan
- Non-repudiation = /ˌnɒn rɪˌpjuːdiˈeɪʃən/ = Non-repudiation
- Access Control = /ˈæksɛs kənˈtroʊl/ = Kontrol akses
- Data Breach = /ˈdeɪtə briːʧ/ = Kebocoran data
- Security Policy = /sɪˈkjʊrɪti ˈpɒləsi/ = Kebijakan keamanan
- Risk Assessment = /rɪsk əˈsɛsmənt/ = Penilaian risiko
Serangan Siber
- Phishing = /ˈfɪʃɪŋ/ = Phishing
- DDoS = /ˈdiːdɒs/ = Serangan DDoS
- Man-in-the-Middle = /mæn ɪn ðə ˈmɪdl/ = Serangan Man-in-the-Middle
- Brute Force = /bruːt fɔːrs/ = Brute force
- SQL Injection = /ˌɛs kjuː ˈɛl ɪnˈdʒɛkʃən/ = SQL injection
- Cross-Site Scripting = /krɒs saɪt ˈskrɪptɪŋ/ = Cross-site scripting
- Zero-Day = /ˈzɪəroʊ deɪ/ = Kerentanan zero-day
- Credential Stuffing = /krɪˈdɛnʃəl ˈstʌfɪŋ/ = Credential stuffing
- Session Hijacking = /ˈsɛʃən ˈhaɪˌdʒækɪŋ/ = Pembajakan sesi
- Clickjacking = /ˈklɪkdʒækɪŋ/ = Clickjacking
Forensik Digital
- Digital Forensics = /ˈdɪdʒɪtəl fəˈrɛnsɪks/ = Forensik digital
- Data Recovery = /ˈdeɪtə rɪˈkʌvəri/ = Pemulihan data
- Chain of Custody = /ʧeɪn əv ˈkʌstədi/ = Rantai penguasaan
- Evidence = /ˈɛvɪdəns/ = Bukti
- Metadata = /ˈmɛtəˌdeɪtə/ = Metadata
- Disk Imaging = /dɪsk ˈɪmɪdʒɪŋ/ = Pencitraan disk
- Log Analysis = /lɒɡ əˈnæləsɪs/ = Analisis log
- Timeline Analysis = /ˈtaɪmlaɪn əˈnæləsɪs/ = Analisis garis waktu
- File Carving = /faɪl ˈkɑːrvɪŋ/ = File carving
- Steganography = /ˌstɛɡəˈnɒɡrəfi/ = Steganografi
Keamanan Aplikasi
- Input Validation = /ˈɪnpʊt ˌvælɪˈdeɪʃən/ = Validasi masukan
- Code Review = /koʊd rɪˈvjuː/ = Tinjauan kode
- Secure Coding = /sɪˈkjʊər ˈkoʊdɪŋ/ = Pengkodean aman
- Patch Management = /pæʧ ˈmænɪdʒmənt/ = Manajemen patch
- Bug Fix = /bʌɡ fɪks/ = Perbaikan bug
- Application Firewall = /ˌæplɪˈkeɪʃən ˈfaɪərwɔːl/ = Firewall aplikasi
- Security Testing = /sɪˈkjʊrɪti ˈtɛstɪŋ/ = Pengujian keamanan
- Vulnerability Assessment = /ˌvʌlnərəˈbɪlɪti əˈsɛsmənt/ = Penilaian kerentanan
- Penetration Testing = /ˌpɛnɪˈtreɪʃən ˈtɛstɪŋ/ = Pengujian penetrasi
- Threat Modeling = /θrɛt ˈmɒdəlɪŋ/ = Pemodelan ancaman
Standar dan Kepatuhan
- ISO 27001 = /ˈaɪsoʊ ˈtwɛnti ˈsɛvən ˈzɪro ˈzɪro ˈwʌn/ = ISO/IEC 27001
- NIST = /nɪst/ = NIST
- GDPR = /ˌdʒiː diː piː ˈɑːr/ = Perlindungan data umum
- PCI DSS = /piː siː aɪ diː ɛs ɛs/ = PCI DSS
- HIPAA = /ˈhɪpə/ = HIPAA
- SOX = /sɒks/ = Sarbanes–Oxley Act
- Cybersecurity Framework = /ˈsaɪbər sɪˈkjʊrɪti ˈfreɪmˌwɜːrk/ = Kerangka kerja keamanan siber
- Compliance Audit = /kəmˈplaɪəns ˈɔːdɪt/ = Audit kepatuhan
- Security Standard = /sɪˈkjʊrɪti ˈstændərd/ = Standar keamanan
- Risk Management = /rɪsk ˈmænɪdʒmənt/ = Manajemen risiko
Identitas dan Akses
- Multi-factor Authentication = /ˈmʌlti ˈfæktər ɔːˌθɛntɪˈkeɪʃən/ = Autentikasi multi-faktor
- Single Sign-On = /ˈsɪŋɡəl saɪn ɒn/ = Masuk tunggal
- Biometric Authentication = /ˌbaɪoʊˈmɛtrɪk ɔːˌθɛntɪˈkeɪʃən/ = Autentikasi biometrik
- Password Policy = /ˈpæswɜːrd ˈpɒləsi/ = Kebijakan kata sandi
- Token = /ˈtoʊkən/ = Token
- Identity Provider = /aɪˈdɛntɪti prəˈvaɪdər/ = Penyedia identitas
- Access Token = /ˈæksɛs ˈtoʊkən/ = Token akses
- Role-Based Access Control = /roʊl beɪst ˈæksɛs kənˈtroʊl/ = Kontrol akses berbasis peran
- Privilege = /ˈprɪvəlɪdʒ/ = Hak istimewa
- Credential = /krɪˈdɛnʃəl/ = Kredensial
Teknologi Cloud
- Cloud Computing = /klaʊd kəmˈpjuːtɪŋ/ = Komputasi awan
- IaaS = /ˈaɪ æs/ = IaaS
- PaaS = /ˈpæs/ = PaaS
- SaaS = /ˈsæs/ = SaaS
- Cloud Storage = /klaʊd ˈstɔːrɪdʒ/ = Penyimpanan awan
- Cloud Security = /klaʊd sɪˈkjʊrɪti/ = Keamanan awan
- Virtual Machine = /ˈvɜːrtʃuəl məˈʃiːn/ = Mesin virtual
- Containerization = /kənˌteɪnərɪˈzeɪʃən/ = Kontainerisasi
- Kubernetes = /ˌkuːbərˈnɛtɪs/ = Kubernetes
- Serverless = /ˈsɜːrvərləs/ = Komputasi serverless