data purging cybrary

Data Sanitization

Data Sanitization is the process of permanently and irreversibly destroying data on a storage device in a deliberate manner, often for compliance or cybersecurity purposes. After data sanitization, a storage …

deep learning cybrary

Deep Learning

Deep Learning is a type of Machine Learning and Artificial Intelligence (AI) that mimics the way people gain certain forms of knowledge. It’s extremely beneficial to data scientists who are tasked …

aI

Artificial Intelligence (AI)

Artificial Intelligence (AI) refers to human-like intelligence presented by a computer, robot, or other machines. AI mimics human learning by building iterative learning capabilities into a computer.  AI machines learn …

hadoop

Hadoop

Hadoop is a software platform that makes it possible for users to manage large amounts of data. Hadoop processes extensive amounts of structured, semi-structured, and unstructured data. Some examples of data …

user behavior analytics

User Behavior Analytics (UBA)

User Behavior Analytics (UBA) is the tracking, collecting, and assessment of user data and activities using monitoring systems. UBA examine archived data from network and authentication logs collected and stored …

blockchain cybrary

Blockchain

Blockchain is a digital record of transactions. The name comes from its structure where specific records called blocks are linked together in a single list, called a chain. Blockchains are used …

rfc 1918 cybrary term

RFC 1918

RFC 1918, also known as Request for Comment 1918, is the Internet Engineering Task Force (IETF) record on methods of assigning private IP addresses on TCP/IP networks. RFC 1918 outlines the usable private …

bogon cyber term

Bogon

A Bogon is an IP address (IPv4 or IPv6) that has yet to be officially assigned for use by the Internet Assigned Number Authority (IANA). As such they are unassigned …

nft cyber term

Non-Fungible Token (NFT)

Non-Fungible Tokens (NFTs) are unique, easily verifiable digital assets that can represent items such as GIFs, images, videos, music albums, and more. Anything that exists online can be purchased as an …

jailbreak cybrary

Jailbreaking

Jailbreaking is the exploiting of manufacturer or carrier operating systems, often by removing restrictions from a device like an iPhone. The exploit usually involves running a privilege escalation attack on …

mttf cybrary term

Mean Time to Failure (MTTF)

Mean Time to Failure (MTTF) and sometimes references as Mean Time For Failure (MTFF) is the length of time a device or software is expected to last in operation. MTTF …

rbac cyber term

Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC) is a strategy of limiting network access based on the roles of individual users within a business. RBAC lets employees have access rights only to the …

leakware cybrary

Leakware

Leakware, also known as Doxware, is a new more potent, and dangerous form of ransomware. When a ransomware Attack containing Leakware occurs, the attacker threatens to publicize personal data (confidentiality …

packet cybrary term

Packet

A Packet is the unit of data that is routed between an origin and a destination on the Internet or any other packet-switched network. TCP packets, passed over TCP/IP networks …

ping of death

Ping of Death (PoD)

A Ping of Death (PoD) is a type of Denial of Service (DoS) attack that deliberately sends IP packets larger than the 65,536 bytes allowed by the IP protocol. One of …

synthetic monitoring stm

Synthetic Transaction Monitoring (STM)

Synthetic Transaction Monitoring (STM), also known as Synthetic Monitoring, is a web monitoring tool similar to Real User Monitoring (RUM), but Instead of collecting real user data, it simulates it. …

common vulnerabilities exposures cve

Common Vulnerabilities and Exposures (CVE)

Common Vulnerabilities and Exposures (CVE) is a list of computer security flaws ranked on critical measures to aid individuals and companies with assessing the risk posed by the vulnerability or exposure …

real user monitoring rum

Real User Monitoring (RUM)

Real User Monitoring (RUM) is a form of performance monitoring that captures and analyzes user activity and transacations on a website or application. It’s also known as real user measurement, …

container cybrary

Container

Before we get into what a container is, we need you to understand the difference between today’s term ‘Container’ and the previous term CyberHoot published ‘Hypervisor‘. Knowing the difference between …

xss cybrary term

Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS) is an attack vector where hackers inject malicious code into a vulnerable web application. XSS differs from other web attack vectors in that it does not directly …

hypervisor

Hypervisor

A Hypervisor, also known as a Virtual Machine Monitor or VMM, is software that creates and manages virtual machines (VMs). A hypervisor allows a computer to maintain many guest VMs …

csrf cybrary

Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF), also known as XSRF, is an attack method that fools a web browser into performing unwanted actions in a user application. Similar to Phishing Attacks, CSRFs …

pci-dss cybrary

PCI-DSS

PCI-DSS (Payment Card Industry-Data Security Standard) is a set of requirements intended to ensure that all companies that process, store, or transmit credit card information manage it safely and in …

ietf cybrary

Internet Engineering Task Force (IETF)

The IETF (Internet Engineering Task Force) is the organization that defines standard Internet operating protocols such as TCP/IP. The IETF is a community of network designers, operators, vendors, and researchers concerned with …

read only memory rom

Read-Only Memory (ROM)

Read-Only Memory (ROM) is storage technology that permanently stores data in a chip built into computers and other electronic devices. ROM includes the most basic programming needed to start a …

dns cybrary

Domain Name System (DNS)

A Domain Name System (DNS) is essentially the ‘phonebook’ of the Internet. DNS is an elaborate, fault-tolerant way of connecting people to resources online.  While it is quite complex, this …

spf cybrary

Sender Policy Framework (SPF)

Sender Policy Framework (SPF) is an anti-spam tool where email domains of the senders can be authenticated. SPF works hand-in-hand with DKIM and DMARC to help authenticate email messages to …

DKIM

DKIM (DomainKeys Identified Mail) is an email authentication tool that verifies messages are sent from a legitimate user’s email address. It’s designed to prevent email forgery and spoofing; essentially phishing. …

dmarc cybrary

DMARC

DMARC which stands for Domain-based Message Authentication, Reporting, and Conformance is an email security protocol. When enabled, your email domain is protected from spoofing by hackers.  DMARC sets up an …

Non-Public Personal Information (NPPI)

Non-Public Personal Information (NPPI) is personal and private information that’s provided by a consumer to some entity for their use. This information includes  the following examples: Name, address, income, social …

anti censorship

Anti-Censorship

Anti-Censorship are methods to combat censorship – for example, preventing search results from being blocked or interfered with.  The growth of online platforms (Facebook, Instagram, Twitter, etc.) raises important questions …

GUI Desktop Environments

Graphical User Interface (GUI)

A Graphical User Interface (GUI), often pronounced ‘gooey’, is a user interface that includes graphical elements, such as windows, icons, and buttons. The term was created in the 1970s to distinguish graphical interfaces from text-based …

ssd drive

Solid State Drive (SSD)

A Solid State Drive (SSD) is a type of storage device that supports reading and writing data and stores the data in a permanent state even without a power source …

hdd vs ssd

Hard Disk Drive (HDD)

A Hard Disk Drive (HDD), also known as a hard drive, is a computer storage device holding magnetic disks or platters spinning at high speeds. It’s the only long-term storage …

ram disk drive

RAM Disk

A RAM Disk is Random Access Memory (RAM) that has been adjusted to simulate a disk drive. You can access data on a RAM disk as you’d access data on a ‘hard disk’ (hard drive). RAM …

polymorphic virus cybrary

Polymorphic Virus

A Polymorphic Virus is a type of ‘shape-shifting’ virus, producing malicious code that is able to replicate itself with new signatures but identical payloads over and over again. These viruses …

awdl cybrary

Apple Wireless Direct Link (AWDL)

Apple Wireless Direct Link (AWDL) is a low latency/high-speed Wi-Fi peer-to peer-connection Apple uses everywhere you’d expect them to: AirDrop, GameKit (which also uses Bluetooth), AirPlay, and conceivably with future …

clickbait cybrary

Clickbait

Clickbait is Internet content that uses overemphasized or misleading headlines to lure a person into clicking a link. Once the link is clicked, it brings the user to another website …

biometrics cybrary

Biometrics

Biometrics identification refers to computer-based data that identifies a person based on unique physical characteristics and traits, including your face, fingerprints, voice, and even retinas (eye scans). Biometric identifiers (something …

parasitic virus cybrary

Parasitic Virus

A Parasitic Virus, also known as a file virus, is spread by attaching itself to executable programs. When a program infected with a parasitic virus is opened, the virus code …

boot sector virus

Boot Sector Virus

A Boot Sector Virus is a virus that infects the ‘boot sector’ of floppy disks or the ‘Master Boot Record’ (MBR) of hard disks (some infect the boot sector of …

macro virus

Macro Virus

A Macro Virus is a virus that adds its code to the macros embedded within documents, spreadsheets, and other data files. The first macro virus appeared in July of 1995 infecting …

Memory-Resident Virus

A Memory-Resident Virus is a virus that is located in the memory of a computer, even after the ‘host’ application or program has stopped running (been terminated). Non-Memory-Resident Viruses are …

RAM

Random Access Memory (RAM)

Random Access Memory (RAM) is a machine’s short-term memory. RAM is fundamental to computer processing, being a super-fast and temporary data storage space that a computer needs to access right …

lms

Learning Management System (LMS)

A Learning Management System (LMS) is a solution used by organizations to deploy and track online training initiatives. Typically assets, such as Training Assignments, Policies, or Surveys are uploaded to …

linux cybrary

Linux

Linux is an open-source operating system (OS) that manages a system’s hardware resources including memory and storage. The OS rests between applications and hardware making connections between all of your …

lateral movement

Lateral Movement

Lateral Movement is the technique that hackers use after gaining initial access to machines or networks. Hackers use this strategy to move deeper into a network in search of sensitive …