Skip to content
CyberHoot
Menu
  • Individuals
  • Businesses
  • Partners
  • My CyberHoot
  • The Nest
  • Schedule a demo

Cybrary

  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
  • #

A

  • Access Control
  • Access Control (Physical and Logical)
  • Access Control Mechanism
  • Accidental Insider Threat
  • Account Hijacking
  • Active Attack
  • Active Content
  • Administrator Rights
  • Advanced Persistent Threat
  • Adversary (or Attacker)
  • Adware
  • Agile Development Methodology
  • Air Gap
  • All-Source Analysis
  • Allow List, Permit List (Deprecated: whitelist)
  • Anti-Censorship
  • Anti-Malware
  • Antivirus Software
  • Apple Wireless Direct Link (AWDL)
  • Application Fuzzing
  • Application Programming Interface (API)
  • Application Proxy
  • Application Security Assessment
  • Attack
  • Attack Signature
  • Attack Surface
  • Attacker
  • Attribution
  • Authentication
  • Authenticity
  • Authorization
  • Availability
Back to top

B

  • Backdoor
  • Bandwidth
  • Biometrics
  • Bitcoin
  • Black Box Testing
  • Blended Threat
  • Bloatware
  • Block List, Deny List, (Deprecated: blacklist)
  • Blue Team
  • Boot Sector Virus
  • Bot, Botnet, Bot Herder, and Bot Master
  • Brute Force Attack
  • Buffer Overflow Attack
  • Bug
  • Bug Bounty Programs
  • Built-In Security
  • Business Continuity and Disaster Recovery Plan
Back to top

C

  • Catfishing
  • Ciphertext
  • Clickbait
  • Closed Source
  • Cloud Computing
  • Command and Control (C&C) Server
  • Commercial Off-The-Shelf (COTS)
  • Common Vulnerabilities and Exposures (CVE)
  • Compromised Credentials
  • Computer Emergency Response Team (CERT)
  • Computer Network Defense
  • Confidentiality
  • Contact Tracing
  • Container
  • Containment
  • Content Delivery Network (CDN)
  • Continuity of Operations Plan
  • Cookie
  • Coronavirus Advisory
  • Countermeasure
  • Cracker
  • Credential Stuffing
  • Critical (Confidential) Information
  • Cross-Site Request Forgery (CSRF)
  • Cross-Site Scripting (XSS)
  • Cryptanalysis
  • Crypto-Mining or Cryptojacking
  • Cryptographic Algorithm
  • Cryptography
  • Cyber Criminals
  • Cyber Espionage
  • Cyber Insurance
  • Cybersecurity
  • Cybersecurity Ecosystem
  • Cyberspace
  • Cybersquatting
  • Cyberwarfare
Back to top

D

  • Data Aggregation
  • Data Breach
  • Data Classification
  • Data Exfiltration
  • Data Loss
  • Data Loss Prevention
  • Data Mining
  • Data Normalization
  • Data Spill
  • Decrypt
  • Decryption
  • Deepfakes
  • Demilitarized Zone (DMZ)
  • Denial of Service (DoS)
  • Digital Content Management (DCM)
  • Digital Forensics
  • Digital Rights Management (DRM)
  • Digital Signature
  • Discretionary Access Controls (DAC)
  • Disinformation
  • Distributed Denial of Service (DDoS)
  • DKIM
  • DMARC
  • DNS Reflection and Amplification Attacks
  • Domain Name System (DNS)
  • Drive-By Download
  • Dwell Time
  • Dynamic Code Analysis
Back to top

E

  • Eavesdropping
  • Education and Training
  • Electronic Signature
  • Elliptic Curve Cryptography
  • Email Impersonation
  • Encipher
  • Encode
  • Encrypt
  • Encryption
  • End-Of-Life (EOL) – End-Of-Support (EOS)
  • Enterprise Risk Management
  • Eradication
  • Event
  • Exploit
  • Exploit Chain
  • Exploitation Analysis
  • Exposure
Back to top

F

  • Facial Recognition
  • Failure
  • False Flag
  • File Transfer Protocol (FTP)
  • Firewall
  • Flooding
  • Fragment Overlap Attack
Back to top

G

  • Gateway
  • General (Public) Information
  • Graphical User Interface (GUI)
  • Guest Wi-Fi Network
Back to top

H

  • Hacker
  • Hacking with Google Dorks
  • Hacktivists
  • Hard Disk Drive (HDD)
  • Hash Value
  • Hashing
  • Hazard
  • HMAC Authentication
  • Honeypot
  • Human-Machine Interface (HMI)
  • Hypervisor
Back to top

I

  • Identification
  • Identity and Access Management
  • Identity Theft
  • ILOVEYOU Virus
  • Incident
  • Incident Management
  • Incident Reponse
  • Incident Response Plan
  • Indicator
  • Industrial Control System
  • Influencer
  • Information and Communication(s) Technology
  • Information Assurance
  • Information Assurance Compliance
  • Information Dissemination
  • Information Resources Management (IRM)
  • Information Security Policy
  • Information Sharing
  • Information System Resilience
  • Information Systems Security Operations
  • Information Technology
  • Infrastructure as a Service (IaaS)
  • Insider
  • Insider Threat
  • Integrated Risk Management
  • Integrity
  • Intellectual Property
  • Internet Control Message Protocol (ICMP)
  • Internet Engineering Task Force (IETF)
  • Internet Message Access Protocol (IMAP)
  • Internet of Things (IoT)
  • Internet Protocol Security (IPSec)
  • Interoperability
  • Intrusion
  • Intrusion Detection
  • Investigation
Back to top

J

  • JavaScript
  • JBOH (JavaScript-Binding-Over-HTTP)
Back to top

K

  • Kernel
  • Key
  • Key Pair
  • Keylogger
  • Kill Chain
  • Knowledge Management
Back to top

L

  • Lateral Movement
  • Learning Management System (LMS)
  • Least Privilege
  • Lightweight Directory Access Protocol (LDAP)
  • Linkjacking
  • Linux
Back to top

M

  • Machine Learning and Evolution
  • Macro Virus
  • Malicious Applet
  • Malicious Code
  • Malicious Insider Threat
  • Malicious Logic
  • Malicious URL
  • Malware
  • Man-In-The-Middle Attack
  • Mandatory Access Controls (MAC)
  • MAZE Ransomware
  • MAZE Ransomware: 3x Threat to Data Security
  • Media Access Control (MAC) Address
  • Melissa Virus
  • Memory-Resident Virus
  • Metadata
  • Monthly Recurring Revenue (MRR)
  • Morris Worm
  • Moving Target Defense
Back to top

N

  • Nation State Hackers
  • Near Field Communications (NFC)
  • Need to Know
  • Network Based Intrusion Detection System (NIDS)
  • Network Behavior Analysis (NBA)
  • Network Resilience
  • Network Segmentation
  • Network Services
  • Network-Based Intrusion Prevention
  • Non-Public Personal Information (NPPI)
  • Non-Repudiation
Back to top

O

  • Off Boarding Process
  • Open Source
  • Operate and Maintain
  • Operations Technology
  • Organized Crime
  • Outsider Threat
  • Oversight & Development
  • OWASP Top Ten
Back to top

P

  • Packet
  • Packet Sniffing
  • Parasitic Virus
  • Passive Attack
  • Passphrase
  • Password
  • Password Cracking
  • Password Manager
  • Password Salting
  • Password Sniffing
  • Paste
  • Patch
  • PCI-DSS
  • PDF (Portable Document Format)
  • Penetration Testing
  • Personal Identifying Information
  • Phishing
  • Piggybacking
  • Ping of Death (PoD)
  • Plaintext
  • Platform as a Service (PaaS)
  • Point-to-Point Tunneling Protocol (PPTP)
  • Polyinstantiation
  • Polymorphic Virus
  • POS Intrusions
  • Precursor
  • Privacy
  • Private Key
  • Privileged User
  • Public Key
  • Public Key Cryptography
  • Public Key Infrastructure
Back to top

Q

  • Quality of Service (QoS)
Back to top

R

  • Radio Frequency Identification (RFID)
  • RADIUS Authentication
  • Rainbow Tables
  • RAM Disk
  • Random Access Memory (RAM)
  • Ransomware
  • Read-Only Memory (ROM)
  • Real User Monitoring (RUM)
  • reCAPTCHA
  • Reconnaissance
  • Recovery
  • Recovery Point Objective (RPO)
  • Recovery Time Objective (RTO)
  • Red Team
  • Red Team Exercise
  • Redundancy
  • Remote Access Trojan (RAT)
  • Remote Desktop Protocol (RDP)
  • Remote Monitoring and Management (RMM)
  • Response
  • Responsible Disclosure
  • Restore (Recovery)
  • Revenge Porn
  • Reverse Engineering
  • Reverse Intent
  • Reverse Proxy
  • Revision
  • Risk
  • Risk Acceptance (Accept)
  • Risk Analysis
  • Risk Assessment
  • Risk Avoidance
  • Risk Management
  • Risk Mitigation
  • Risk Reduction (Limitation)
  • Risk Transfer
  • Risk-Based Data Management
  • Root Cause Analysis
  • Rootkit
Back to top

S

  • Safe Links | URL Protection | Link Protection
  • Sandboxing
  • Script Kiddie
  • Secret Key
  • Secure Shell (SSH)
  • Secure Socket Layer (SSL)
  • Secure Web Gateway (SWG)
  • Security Automation
  • Security Event and Incident Management (SEIM)
  • Security Operations
  • Security Operations Center (SOC)
  • Security Policy
  • Sender Policy Framework (SPF)
  • Sensitive (Restricted) Information
  • Separation of Duties
  • Session Hijacking Attack
  • Signature
  • SIM Swapping
  • Single Sign-On (SSO)
  • Situational Awareness
  • Smishing
  • SOC 1
  • SOC 2
  • SOC 3
  • Social Engineering
  • Social Media Bots
  • Software as a Service (SaaS)
  • Software Assurance
  • Software Development Life Cycle (SDLC)
  • Solid State Drive (SSD)
  • Spam
  • Spear-Phishing
  • Spoofing
  • Spyware
  • SQL Slammer Virus (Harbinger of things to come)
  • SSAE Compliance
  • Static Code Analysis
  • Steganography
  • Stuxnet
  • Subject
  • Supervisory Control and Data Acquisition
  • Supply Chain
  • Supply Chain Risk Management
  • Supply Chain Threat
  • Swatting
  • Symmetric Cryptography
  • Symmetric Key
  • Synthetic Transaction Monitoring (STM)
  • System Integrity
Back to top

T

  • Tailored Trustworthy Space
  • Test Oracle
  • Threat
  • Threat Actor
  • Threat Agent
  • Threat Analysis
  • Threat Assessment
  • Ticket
  • Tokenization
  • Tor Browser
  • Traffic Light Protocol
  • Transmission Control Protocol (TCP)
  • Transport Layer Security (TLS)
  • Trialware
  • Trojan Horse
  • Trusted Wi-Fi Network
  • Two-Factor Authentication
  • Typosquatting
Back to top

U

  • Unauthorized Access
  • User Datagram Protocol (UDP)
Back to top

V

  • vCISO
  • Virtual Private Network (VPN)
  • Virus
  • Vishing
  • VLAN (Virtual Local Area Network)
  • Voice over Internet Protocol (VoIP)
  • Vulnerability
Back to top

W

  • Waterfall Development Methodology
  • Weakness
  • Web Application Firewall (WAF)
  • Whaling
  • White Box Testing
  • White Team
  • Wi-Fi 6E
  • Wired Equivalent Privacy (WEP)
  • Wireless Application Protocol (WAP)
  • Wireshark
  • Work Factor
  • Worm
Back to top

Z

  • Zero Day Vulnerabilities
  • Zombie
  • Zoom Bombing
Back to top

#

  • 3-2-1 Backup Method
Back to top

Businesses

CYBERHOOT

Legal Corporation HQ

Smyrna, DE

Field Offices

Portsmouth, NH

PRODUCTS

  • Individuals
  • Businesses
  • Partners
  • Referral Program

Contact

  • Sales
  • Support
  • HowTo (Self Help)
  • facebook
  • twitter
  • youtube
  • rss

RESOURCES

  • Blog
  • Case Study – MSP
  • Case Study – SMB
  • Testimonials
  • Cybrary
  • InfoGraphics
  • Newsletters
  • Press Releases
  • Video Training Library
Copyright © 2021 CyberHoot