Cyber Security Terms
No terms found.
Related Resources
Related Resources
Related Resources
Related Resources
Authenticator
A method for users to prove their identity to a system. It can be a password, multifactor authentication, fingerprint, or facial recognition.
Read moreRelated Resources
Related Resources
BianLian - from rags to riches, the malware dropper that had a dream
Black Basta
A ransomware group known for their double extortion attacks, threatening victims to pay a demanded ransom or risk having stolen data slowly leaked on a dedicated data leak site.
Read moreRelated Resources
Related Resources
Related Resources
Related Resources
Related Resources
Related Resources
Bring Your Own Device
A company's strategy or policy that allows employees to use their own personal computers, cell phone devices for work purposes.
Read moreRelated Resources
Related Resources
Related Resources
Catfishing
An online scam where a person pretends to be someone else on the internet. People create fake profiles on social media or dating apps and other platforms.
Read moreRelated Resources
Related Resources
Clop Ransomware
Part of the Cryptomix ransomware family is a file-encrypting virus that infects an unprotected system and encrypts the computers files by planting the. Clop extension.
Read moreRelated Resources
Clop Ransomware: Overview, Operating Mode, Prevention and Removal
Closed Source
Computer programs whose source code is not published except to licensees. It is available to be edited only by the individual or company that developed it and can be used by those licensed to use the software.
Read moreRelated Resources
Difference Between Open Source Software and Closed Source Software.
Cloud Access Security Broker
Software or hardware that is used to protect against cloud security risks
Read moreRelated Resources
Related Resources
Related Resources
Crypto-Jacking
To use people's devices without their consent or knowledge, to secretly mine cryptocurrency
Read moreRelated Resources
Related Resources
Related Resources
Cyber Kill Chain
In a cyber-attack, it identifies vulnerabilities and helps the security team to stop the attacks.
Read moreRelated Resources
What is the Cyber Kill Chain and How it Can Protect Against Attacks
Cyberattack
A malicious attempt to damage, disrupt or gain unauthorized access to computer systems, networks, or devices, via cyber means.
Read moreRelated Resources
Cybersecurity
The protection of systems, devices, services, and networks, as well as the information on them from theft or damage.
Read moreRelated Resources
Related Resources
Data Encryption
A security method where information is encrypted and can only be accessed by using the correct encryption key
Read moreRelated Resources
Data Loss Prevention
It is a strategy for preventing individuals who should not have access, from accessing sensitive information.
Read moreRelated Resources
Related Resources
Denial of Service Attack
An attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target with a flood of Internet traffic.
Read moreDictionary Attack
A brute force attack in which the attacker uses known dictionary words, phrases, or common passwords as their guesses to gain access to an unauthorized asset.
Read moreRelated Resources
Digital Footprint
The 'footprint' of the digital information that a user's online activity leaves behind.
Read moreDigital Signature
A mathematical scheme for verifying the authenticity of digital messages or documents
Read moreRelated Resources
Related Resources
End-of-Life Systems
When the manufacturer no longer supports end-of-life systems. This means that they are no longer being updated with security patches. As a result, these systems are more vulnerable to attack.
Read moreRelated Resources
Related Resources
Endpoint Detection and Response
Provides real-time continuous monitoring and the collection of endpoint data
Read moreEndpoint security
The subsect of security that deals with the devices at the end of a network connection.
Read moreRelated Resources
Related Resources
Extended Detection and Response
An extended detection and response is a new approach to endpoint threat detection and response, providing correlation and normalization of massive amounts of data.
Read moreRelated Resources
Related Resources
GlobeImposter
A ransomware application that will encrypt files on a victim machine and demand payment to retrieve the information.
Read moreRelated Resources
Green Team
They are the creators of the security system put themselves in the shoes of The Defender
Read moreRelated Resources
Group Authenticator
Used in addition to a sign-on authenticator, a Group Authenticator may be used to allow access to specific data or functions that may be shared by all members of a designated group.
Read moreRelated Resources
Health Insurance Portability and Accountability Act
A federal law that required the creation of national standards to protect sensitive patient health information
Read moreHermetic Wiper
A wiper malware that damages the master boot record making the device unable to boot the operating system.
Read moreRelated Resources
Related Resources
Identity Access Management
A sub-section of cybersecurity that deals with the access and identity check and control of the individual's privilege in the cloud.
Read moreRelated Resources
Incident Response Rlan
Documented method of approaching and managing situations resulting from IT security incidents or breaches.
Read moreRelated Resources
Insider Threat
A threat to a company's data that is coming from someone within the organization, usually an employee or another company insider.
Read moreRelated Resources
Internet of Things
Refers to the ability of everyday objects to connect to the internet. Examples include connected appliances, smart home security systems, and televisions.
Read moreIntrusion detection system
A system that allos organizations to instantly detect cyber attacks.
Read moreRelated Resources
Related Resources
Jailbroken Mobile Device
Apple devices on which users bypass these restrictions to gain control of the OS.
Read moreRelated Resources
Man-in-the-Middle Attacks
A type of cybersecurity attack that allows the attackers to eavesdrop on the communication between two targets
Read moreRelated Resources
Related Resources
Related Resources
Mitigation
The steps for organizations and individuals take to address, eliminate, or minimize the risks posed by a cybersecurity threat.
Read moreMonitoring
An essential cybersecurity process that helps organizations detect and respond to cybersecurity incidents.
Read moreRelated Resources
Multi-Factor Authentication
Authentication method that requires the user to provide two or more verification factors to gain access.
Read moreNerbian Rat
A complex malware with low complexity obfuscation, that was designed to affect as many systems as possible.
Read moreRelated Resources
Related Resources
Related Resources
New Night Sky Ransomware Enters Corporate Ransom Attack Scene
Related Resources
Difference Between Open Source Software and Closed Source Software.
Password Sniffing
A software application that scans and records passwords that are being used on a computer or network interface.
Read moreRelated Resources
Personal Identifiable Information
Information that can be used by organizations on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
Read moreRelated Resources
Related Resources
Related Resources
Principle of Least Privilege
The security guideline is that a user should only have access to the system, tools, and data that is required for them to do their work
Read morePrivileged Access Management
Managing the access of elevated privileges to safeguard identities beyond that of regular users.
Read morePurple Team
The Purple team is the team that in a cybersecurity testing exercise, takes on the role of both the red team and the blue team.
Read moreRelated Resources
Related Resources
Quantum
This group is among the fastest ransomware groups due to the speed of its attacks, where some incidents have taken place within as little as 4 hours. The groups' victims tend to be in the financial and healthcare sectors, targeting them with an email containing an attachment or link to an ISO image.
Read moreRelated Resources
Ransomcloud
A strain of ransomware that infiltrates cloud-based systems such as Microsoft 365 and Google Workspace to encrypt emails.
Read moreRelated Resources
What is Ransomcloud, and what are its dagers to your business
Ransomware
Ransomware is a type of malware that prevents you from using your computer or accessing certain computer files
Read moreRansomware-as-a-Service
Ransomware as a Service is a business model in which individuals or organizations pay ransomware developers to deploy their software to infiltrate a company.
Read moreRelated Resources
Related Resources
Organizations Warned of New Lilith, RedAlert, 0mega Ransomware
Remote Desktop Protocol
It provides a user the ability to connect to another user's computer over a network connection.
Read moreRelated Resources
Response Planning and Testing
A plan for how an organization will respond to a cybersecurity incident.
Read moreRisk Analytics
Examining each risk to the security of your organization’s information systems, devices, and data and prioritizing the potential threats.
Read moreRelated Resources
Secure Shell Protocol
It provides a secure, encrypted communication between two untrusted hosts over an unsecured network.
Read moreRelated Resources
Related Resources
Related Resources
Sodinokibi
A ransomware program that encrypts files stored on a victim's computers and prevents people from accessing their files until they have paid a ransom.
Read moreSoftware as a Service
Software as a Service is a business model in which companies and consumers access centrally hosted software applications over the internet. Normally under a 'pay for the resources' used model.
Read moreSpear-Phishing
Spear-Phishing is a more targeted form of phishing, where an email is designed to look like it's from a person the recipient knows and trusts.
Read moreRelated Resources
Two-Factor Authentication
Two-factor authentication is the use of two different components to verify a user's identity. Also known as multi-factor authentication.
Read moreUser and Entity Behavior Analytics
A software used to detect, identify and control the possibility of Insider Threats. It is not foolproof, and even with the software insider threats remain a huge problem.
Read moreRelated Resources
Vice Society
Vice Society has been in the public eye since June 2021, mainly targeting small or mid-sized companies. They are known for breaching networks by exploiting known vulnerabilities on unpatched systems.
Read moreRelated Resources
Vice Society ransomware claims attack on Italian city of Palermo
Virtual Private Network
A technology that extends a private network and all its encryption, security, and functionality across a public network.
Read moreRelated Resources
Vulnerability
A vulnerability is a weakness, or flaw, in software, a system, or a process.
Read moreVulnerability Assessment
A vulnerability assessment is the process of identifying any risks or vulnerabilities in computer networks, systems, hardware, and applications, within an IT environment.
Read moreWhite Hat Hacker
White hat hack is an ethical Hacker who are cybersecurity specialists who test a system's security.
Read moreRelated Resources
White Team
In a cybersecurity testing exercise, the white team oversees the cyber defense competition and referees the event.
Read moreRelated Resources
Yellow Team
It is the team responsible for developing the security system of an organization.
Read more
Social Engineering
Tricking people into divulging personal information or other confidential data via email or text
Read moreRelated Resources
What is Social Engineering