time to live TTL cybrary

Time-To-Live (TTL)

Secure your business with CyberHoot Today!!! Sign Up Now Time-To-Live (TTL) is a value for the period of time that a packet, or data, should exist on a computer or network …

call admission control cac

Call Admission Control (CAC)

Secure your business with CyberHoot Today!!! Sign Up Now Call Admission Control (CAC) is the method or process of regulating traffic in voice communications, specifically in wireless mobile networks and …

voice firewall definition cybrary

Voice Firewall

Source: Mobileum Secure your business with CyberHoot Today!!! Sign Up Now A Voice Firewall logs, monitors, and controls all inbound and outbound voice network activity on a per-call basis through …

traceroute cybrary definition

Traceroute

Secure your business with CyberHoot Today!!! Sign Up Now Traceroute is a network diagnostic tool used to track the path taken by a packet on an IP network from source …

honeymonkey cybrary

HoneyMonkey

Secure your business with CyberHoot Today!!! Sign Up Now A HoneyMonkey is a system created by Microsoft Research that uses a network of computers or virtual machines to browse different …

Interpol

Secure your business with CyberHoot Today!!! Sign Up Now Interpol, also known as the International Criminal Police Organization, is the world’s largest international police organization, with seven regional bureaus worldwide …

infragard cybrary

InfraGard

Secure your business with CyberHoot Today!!! Sign Up Now InfraGard is a partnership between the FBI and the private sector. It’s an association of individuals who represent businesses, academic institutions, …

universal authentication framework UAF definition

Universal Authentication Framework (UAF)

Secure your business with CyberHoot Today!!! Sign Up Now The Universal Authentication Framework (UAF) is an authentication standard created by the FIDO Alliance. In UAF, a user who is authenticating to …

indicators of compromise IOC

Indicators of Compromise (IoC)

Secure your business with CyberHoot Today!!! Sign Up Now Indicators of Compromise (IoC) are pieces of forensic evidence, called IoCs for short, which show potential intrusions on a computer system …

extended detection and response (XDR) cybrary definition

Extended Detection and Response (XDR)

Secure your business with CyberHoot Today!!! Sign Up Now Extended Detection and Response (XDR) is touted as a consolidation of technologies and disparate system monitoring into a single tool or …

fido cybrary definition

Fast Identity Online (FIDO)

Secure your business with CyberHoot Today!!! Sign Up Now Fast Identity Online (FIDO) is a set of technology security specifications for strong authentication. FIDO is developed by the FIDO Alliance, …

active directory (AD) cybrary definition

Active Directory (AD)

Secure your business with CyberHoot Today!!! Sign Up Now Active Directory (AD) is Microsoft’s proprietary directory service. It runs on Windows Server and enables administrators to manage permissions and access …

scareware cybrary definition

Scareware

Secure your business with CyberHoot Today!!! Sign Up Now Scareware is a type of malware tactic used to manipulate victims into downloading or buying malware-infested software. Scareware attacks are used …

oauth cybrary definition

OAuth

Secure your business with CyberHoot Today!!! Sign Up Now OAuth, also known as Open Authorization, is an open standard authorization framework for token-based authorization on the internet. OAuth enables an end-user’s account …

web3 cybrary definition

Web3

Secure your business with CyberHoot Today!!! Sign Up Now Web3, also referred to as Web 3.0, is the next evolution of the internet. The new phase is predicted by some …

Geofencing

Geofencing

Secure your business with CyberHoot Today!!! Sign Up Now Geofencing is a technology for setting virtual boundaries and triggering events when these boundaries are crossed by a mobile device on which …

html smuggling cybrary

HTML Smuggling

Secure your business with CyberHoot Today!!! Sign Up Now HTML Smuggling is an evasive malware delivery technique that leverages legitimate HTML5 and JavaScript features to deploy banking malware, Remote Access …

object identifier OID

Object Identifier (OID)

Secure your business with CyberHoot Today!!! Sign Up Now An Object Identifier (OID) is a specific, long-form name for any type of object or entity. In computing, an OID appears …

randomization functions cybrary

Randomization Function

Secure your business with CyberHoot Today!!! Sign Up Now A Randomization Function is an algorithm or procedure that implements a randomly chosen function between two specific sets, suitable for use …

check digits cybrary

Check Digits

Secure your business with CyberHoot Today!!! Sign Up Now A Check Digit is a digit added to a string of numbers for error detection purposes. Normally, the check digit is …

3des encryption

3DES Encryption

Secure your business with CyberHoot Today!!! Sign Up Now 3DES Encryption, also known as Triple Data Encryption Standard (DES), is a type of cryptography where block cipher algorithms are applied …

assembly language cybrary

Assembly Language

Secure your business with CyberHoot Today!!! Sign Up Now Assembly Language is the most basic programming language available for any processor. With assembly language, a programmer works only with operations that …

doxxing cybrary

Doxxing

Secure your business with CyberHoot Today!!! Sign Up Now Doxxing is the act of revealing identifying information about someone online, such as their real name, home address, workplace, phone, financial, …

script cyber cybrary

Script

Secure your business with CyberHoot Today!!! Sign Up Now A Script is a list of commands that are executed by a certain program or scripting engine. Scripts may be used …

crm cybrary

Customer Relationship Management (CRM)

Secure your business with CyberHoot Today!!! Sign Up Now Customer Relationship Management (CRM) is a technology tool for managing all your company’s relationships and interactions with customers, partners, and prospects. …

enterprise resource planning ERP Cybrary

Enterprise Resource Planning (ERP)

Secure your business with CyberHoot Today!!! Sign Up Now Enterprise Resource Planning (ERP) is a type of software that companies use to manage day-to-day business activities such as accounting, procurement, project management, risk management, …

internet service provider (ISP)

Internet Service Provider (ISP)

Secure your business with CyberHoot Today!!! Sign Up Now An Internet Service Provider (ISP) is a company that provides access to the Internet to both personal and business customers. ISPs …

emergency data request

Emergency Data Request (EDR)

Secure your business with CyberHoot Today!!! Sign Up Now An Emergency Data Request (EDR) is a procedure used by U.S. Law Enforcement agencies to obtain critical data from service providers in …

management information base MIB

Management Information Base (MIB)

Secure your business with CyberHoot Today!!! Sign Up Now A Management Information Base (MIB) is a Simple Network Management Protocol (SNMP) nonrelational database that describes devices being monitored. Network management platforms monitor …

network management system (NMS)

Network Management System (NMS)

Secure your business with CyberHoot Today!!! Sign Up Now A Network Management System (NMS) is an application or group of applications that allows network administrators to manage a network’s independent …

Self Assessment Questionnaire (SAQ)

Secure your business with CyberHoot Today!!! Sign Up Now A Self Assessment Questionnaire (SAQ) is most commonly used in the Payment Card Industry Data Security Standard (PCI-DSS) space to determine if …

simple network management protocol SNMP

Simple Network Management Protocol (SNMP)

Secure your business with CyberHoot Today!!! Sign Up Now Simple Network Management Protocol (SNMP) is an application-layer protocol for monitoring and managing network devices on a Local Area Network (LAN) or …

error correcting codes ECC cybrary

Error Correction Code (ECC)

Secure your business with CyberHoot Today!!! Sign Up Now An Error correction code (ECC) checks read or transmitted data for errors and corrects them as soon as they are found. …

quantum computing

Quantum Computing

Secure your business with CyberHoot Today!!! Sign Up Now Quantum Computing is an area of computing focused on developing computer technology based on the principles of quantum theory (which explains …

moore's law cybrary

Moore’s Law

Secure your business with CyberHoot Today!!! Sign Up Now Moore’s Law is a 1965 observation made by Intel co-founder Gordon E. Moore that the number of transistors placed in an …

command line interface cybrary

Command Line Interface (CLI)

Secure your business with CyberHoot Today!!! Sign Up Now A Command Line Interface (CLI) is a text-based user interface (UI) used to run programs, manage computer files and interact with …

endpoint protection and response edr cybrary

Endpoint Detection and Response (EDR)

Secure your business with CyberHoot Today!!! Sign Up Now Endpoint Detection and Response (EDR), also referred to as Endpoint Detection and Threat Response (EDTR), is an endpoint security solution that …

controlled unclassified information CUI cybrary

Controlled Unclassified Information (CUI)

Secure your business with CyberHoot Today!!! Sign Up Now Controlled Unclassified Information (CUI) is federal non-classified information (information the federal government creates or possesses, or that an entity creates or …

Red Purple and Blue Team Exercise Goals

Purple Team

Secure your business with CyberHoot Today!!! Sign Up Now A Purple Team is a group of cybersecurity experts that take on the role of the Blue Team and Red Team …

network access control cybrary

Network Access Control (NAC)

Secure your business with CyberHoot Today!!! Sign Up Now Network Access Control (NAC) is the act of keeping unauthorized devices (and their users) out of your private network. Organizations that …

aes encryption cybrary

AES Encryption

Secure your business with CyberHoot Today!!! Sign Up Now AES Encryption, also known as Advanced Encryption Standard, is a symmetric block cipher used by the U.S. government to protect classified information. In …

wiper malware cybrary

Wiper Malware

Secure your business with CyberHoot Today!!! Sign Up Now Wiper Malware is malicious software that wipes away everything that comes in its path. The sole purpose of this malware is …

fingerprint cyber cybrary

Fingerprint

Secure your business with CyberHoot Today!!! Sign Up Now Fingerprints used in cryptography are short keys that help identify a longer public key. Fingerprints are used for key authentication and …

checksum cybrary

Checksum

Secure your business with CyberHoot Today!!! Sign Up Now A Checksum is a value used to verify the integrity of a file or a data transfer. In other words, it …

lossless compression cybrary

Lossless Compression

Secure your business with CyberHoot Today!!! Sign Up Now Lossless Compression is when file size is reduced with no loss of quality or data. This seemingly magical method of reducing …

lossy compression cybrary

Lossy Compression

Secure your business with CyberHoot Today!!! Sign Up Now Lossy Compression is when data is lost or quality is reduced from the original version while compressing data. Lossy compression is …