html smuggling cybrary

HTML Smuggling

Secure your business with CyberHoot Today!!! Sign Up Now HTML Smuggling is an evasive malware delivery technique that leverages legitimate HTML5 and JavaScript features to deploy banking malware, Remote Access …

object identifier OID

Object Identifier (OID)

Secure your business with CyberHoot Today!!! Sign Up Now An Object Identifier (OID) is a specific, long-form name for any type of object or entity. In computing, an OID appears …

randomization functions cybrary

Randomization Function

Secure your business with CyberHoot Today!!! Sign Up Now A Randomization Function is an algorithm or procedure that implements a randomly chosen function between two specific sets, suitable for use …

check digits cybrary

Check Digits

Secure your business with CyberHoot Today!!! Sign Up Now A Check Digit is a digit added to a string of numbers for error detection purposes. Normally, the check digit is …

3des encryption

3DES Encryption

Secure your business with CyberHoot Today!!! Sign Up Now 3DES Encryption, also known as Triple Data Encryption Standard (DES), is a type of cryptography where block cipher algorithms are applied …

assembly language cybrary

Assembly Language

Secure your business with CyberHoot Today!!! Sign Up Now Assembly Language is the most basic programming language available for any processor. With assembly language, a programmer works only with operations that …

doxxing cybrary

Doxxing

Secure your business with CyberHoot Today!!! Sign Up Now Doxxing is the act of revealing identifying information about someone online, such as their real name, home address, workplace, phone, financial, …

script cyber cybrary

Script

Secure your business with CyberHoot Today!!! Sign Up Now A Script is a list of commands that are executed by a certain program or scripting engine. Scripts may be used …

crm cybrary

Customer Relationship Management (CRM)

Secure your business with CyberHoot Today!!! Sign Up Now Customer Relationship Management (CRM) is a technology tool for managing all your company’s relationships and interactions with customers, partners, and prospects. …

enterprise resource planning ERP Cybrary

Enterprise Resource Planning (ERP)

Secure your business with CyberHoot Today!!! Sign Up Now Enterprise Resource Planning (ERP) is a type of software that companies use to manage day-to-day business activities such as accounting, procurement, project management, risk management, …

internet service provider (ISP)

Internet Service Provider (ISP)

Secure your business with CyberHoot Today!!! Sign Up Now An Internet Service Provider (ISP) is a company that provides access to the Internet to both personal and business customers. ISPs …

emergency data request

Emergency Data Request (EDR)

Secure your business with CyberHoot Today!!! Sign Up Now An Emergency Data Request (EDR) is a procedure used by U.S. Law Enforcement agencies to obtain critical data from service providers in …

management information base MIB

Management Information Base (MIB)

Secure your business with CyberHoot Today!!! Sign Up Now A Management Information Base (MIB) is a Simple Network Management Protocol (SNMP) nonrelational database that describes devices being monitored. Network management platforms monitor …

network management system (NMS)

Network Management System (NMS)

Secure your business with CyberHoot Today!!! Sign Up Now A Network Management System (NMS) is an application or group of applications that allows network administrators to manage a network’s independent …

Self Assessment Questionnaire (SAQ)

Secure your business with CyberHoot Today!!! Sign Up Now A Self Assessment Questionnaire (SAQ) is most commonly used in the Payment Card Industry Data Security Standard (PCI-DSS) space to determine if …

simple network management protocol SNMP

Simple Network Management Protocol (SNMP)

Secure your business with CyberHoot Today!!! Sign Up Now Simple Network Management Protocol (SNMP) is an application-layer protocol for monitoring and managing network devices on a Local Area Network (LAN) or …

error correcting codes ECC cybrary

Error Correction Code (ECC)

Secure your business with CyberHoot Today!!! Sign Up Now An Error correction code (ECC) checks read or transmitted data for errors and corrects them as soon as they are found. …

quantum computing

Quantum Computing

Secure your business with CyberHoot Today!!! Sign Up Now Quantum Computing is an area of computing focused on developing computer technology based on the principles of quantum theory (which explains …

moore's law cybrary

Moore’s Law

Secure your business with CyberHoot Today!!! Sign Up Now Moore’s Law is a 1965 observation made by Intel co-founder Gordon E. Moore that the number of transistors placed in an …

command line interface cybrary

Command Line Interface (CLI)

Secure your business with CyberHoot Today!!! Sign Up Now A Command Line Interface (CLI) is a text-based user interface (UI) used to run programs, manage computer files and interact with …

endpoint protection and response edr cybrary

Endpoint Detection and Response (EDR)

Secure your business with CyberHoot Today!!! Sign Up Now Endpoint Detection and Response (EDR), also referred to as Endpoint Detection and Threat Response (EDTR), is an endpoint security solution that …

controlled unclassified information CUI cybrary

Controlled Unclassified Information (CUI)

Secure your business with CyberHoot Today!!! Sign Up Now Controlled Unclassified Information (CUI) is federal non-classified information (information the federal government creates or possesses, or that an entity creates or …

Red Purple and Blue Team Exercise Goals

Purple Team

Secure your business with CyberHoot Today!!! Sign Up Now A Purple Team is a group of cybersecurity experts that take on the role of the Blue Team and Red Team …

network access control cybrary

Network Access Control (NAC)

Secure your business with CyberHoot Today!!! Sign Up Now Network Access Control (NAC) is the act of keeping unauthorized devices (and their users) out of your private network. Organizations that …

aes encryption cybrary

AES Encryption

Secure your business with CyberHoot Today!!! Sign Up Now AES Encryption, also known as Advanced Encryption Standard, is a symmetric block cipher used by the U.S. government to protect classified information. In …

wiper malware cybrary

Wiper Malware

Secure your business with CyberHoot Today!!! Sign Up Now Wiper Malware is malicious software that wipes away everything that comes in its path. The sole purpose of this malware is …

fingerprint cyber cybrary

Fingerprint

Secure your business with CyberHoot Today!!! Sign Up Now Fingerprints used in cryptography are short keys that help identify a longer public key. Fingerprints are used for key authentication and …

checksum cybrary

Checksum

Secure your business with CyberHoot Today!!! Sign Up Now A Checksum is a value used to verify the integrity of a file or a data transfer. In other words, it …

lossless compression cybrary

Lossless Compression

Secure your business with CyberHoot Today!!! Sign Up Now Lossless Compression is when file size is reduced with no loss of quality or data. This seemingly magical method of reducing …

lossy compression cybrary

Lossy Compression

Secure your business with CyberHoot Today!!! Sign Up Now Lossy Compression is when data is lost or quality is reduced from the original version while compressing data. Lossy compression is …

Master Boot Record of a Computer

Master Boot Record (MBR)

Secure your business with CyberHoot Today!!! Sign Up Now The Master Boot Record (MBR) is the information in the first sector of any hard disk that identifies how and where an operating …

information disclosure cybrary

Information Disclosure

Secure your business with CyberHoot Today!!! Sign Up Now Information Disclosure, also known as Information Leakage, is when a website unintentionally reveals sensitive information. Depending on the context, websites may …

privilege escalation attack cybrary

Privilege Escalation Attack

Secure your business with CyberHoot Today!!! Sign Up Now Privilege Escalation Attacks are when attackers acquire access to elevated (administrative) rights, or privileges, beyond a simple regular unprivileged user. Privilege …

tornado cash cybrary

Tornado Cash

Secure your business with CyberHoot Today!!! Sign Up Now Tornado Cash is an Ethereum (ETH) mixer protocol that is used to improve transaction privacy by obscuring the on-chain link between the …

remote code execution rce

Remote Code Execution (RCE)

Secure your business with CyberHoot Today!!! Sign Up Now Remote Code Execution (RCE) is an attack that allows hackers to remotely execute malicious code on a computer. The impact of …

wide area network WAN cybrary

Wide Area Network (WAN)

Secure your business with CyberHoot Today!!! Sign Up Now A Wide Area Network (WAN) is a large computer network that connects groups of computers over large distances. WANs are often used …

metropolitan area network MAN cybrary

Metropolitan Area Network (MAN)

Secure your business with CyberHoot Today!!! Sign Up Now A Metropolitan Area Network (MAN) is a computer network that connects computers within a metropolitan area, such as a single large …

local area network LAN cybrary

Local Area Network (LAN)

Secure your business with CyberHoot Today!!! Sign Up Now A Local Area Network (LAN) is a group of devices connected together in one physical location, such as a building, office, …

error detection cybrary

Error Detection

Secure your business with CyberHoot Today!!! Sign Up Now Error Detection in cybersecurity refers to techniques that enable reliable delivery of digital data over unreliable communication channels, protecting the integrity of the data. Many communication …

network interface card nic

Network Interface Card (NIC)

Secure your business with CyberHoot Today!!! Sign Up Now A Network Interface Card (NIC) provides networking capabilities for a computer. It may enable a wired connection (Ethernet) or a wireless connection (Wi-Fi) …

osi model cybrary

Open Systems Interconnection (OSI) Model

The Open Systems Interconnection (OSI) Model is a conceptual model created by the International Organization for Standardization that allows various communication systems to communicate using standard protocols. In simpler terms, …

Layer 2 Network

Layer 2 Networks refers to the second layer of the Open Systems Interconnection (OSI) Model, which is the data link layer. Layer 2 Network is the link layer (second-lowest layer) …

layer 3 network cybrary

Layer 3 Network

A Layer 3 Network is the third layer of the Open Systems Interconnection (OSI) Model, or network layer. Layer 3 provides the network’s routing and switching logic that creates network …

pvlan cybrary

Private Virtual Local Area Network (PVLAN)

Private Virtual Local Area Network (PVLAN), also known as port isolation, is a network segmentation technology for layer 2 networks, which allows for separate sub-networks, or private VLANs under the main …

fleeceware cybrary

Fleeceware

Fleeceware is a malicious application that tricks users into paying money for simple apps with functionality that’s readily available for free elsewhere. Fleeceware is successful on Google’s Play Store (rather …

md5 hash

MD5 Hash

An MD5 Hash is a hashing algorithm that is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length digest value …

peer to peer network cybrary

Peer-to-Peer (P2P) Network

Peer-to-Peer (P2P) Networks exist where groups or “peers” of computer systems are linked to each other through the Internet for a common purpose usually with a common application directing their …

torrent cybrary

Torrent

A Torrent is a file type used by the BitTorrent file-sharing protocol. The protocol authorizes and points to a remote server that contains the location of different remote hosts with …