Zero Trust
Zero Trust is a security strategy focused on the belief that organizations shouldn’t automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to …
A Cyber Library of 300+ Cybersecurity Terms.
Zero Trust is a security strategy focused on the belief that organizations shouldn’t automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to …
Clickjacking, also known as a “UI Redress Attack”, is when an attacker uses multiple transparent or vague layers to trick a user into clicking on a button or link on …
The Ransomware Task Force (RTF) is a group of high-profile security vendors who teamed up with the Institute for Security and Technology (IST) in December of 2020 to combat ransomware. Members …
Bluejacking is the unauthorized sending of messages from one Bluetooth device to another. Bluetooth is a high-speed, short-range wireless technology for exchanging data between laptops, smartphones, smartwatches, etc. This sort …
Threat Intelligence (TI) is information about current attack tactics and techniques (T&T) used by hackers to breach companies, their networks, and their data. Threat Intelligence collects, compares, and summarizes T&T …
Threat Hunting is proactive hunting or searching through networks, endpoints, and datasets to find malicious, suspicious, or risky activity, patterns, or files that evaded existing detection tools. This is different …
The International Traffic in Arms Regulations (ITAR) is United States regulation that controls the manufacture, sale, and distribution of defense and space-related products and services as defined in the United …
Third-Party Risk Management (TPRM) is the process of identifying, assessing, and controlling risks presented throughout the lifecycle of your relationships with third parties. This oftentimes starts during procurement and extends …
The Personal Information Protection and Electronic Documents Act (PIPEDA) is Canada’s main government privacy law. Compliance with PIPEDA is essential for private sector businesses operating in Canada. Violation of PIPEDA can …
The General Data Protection Regulation (GDPR) was passed in the European Union (EU) in 2016 and requires all businesses to protect an updated definition of personal and private data of EU …
Data Sanitization is the process of permanently and irreversibly destroying data on a storage device in a deliberate manner, often for compliance or cybersecurity purposes. After data sanitization, a storage …
Deep Learning is a type of Machine Learning and Artificial Intelligence (AI) that mimics the way people gain certain forms of knowledge. It’s extremely beneficial to data scientists who are tasked …
Artificial Intelligence (AI) refers to human-like intelligence presented by a computer, robot, or other machines. AI mimics human learning by building iterative learning capabilities into a computer. AI machines learn …
User Behavior Analytics (UBA) is the tracking, collecting, and assessment of user data and activities using monitoring systems. UBA examine archived data from network and authentication logs collected and stored …
Blockchain is a digital record of transactions. The name comes from its structure where specific records called blocks are linked together in a single list, called a chain. Blockchains are used …
Non-Fungible Tokens (NFTs) are unique, easily verifiable digital assets that can represent items such as GIFs, images, videos, music albums, and more. Anything that exists online can be purchased as an …
Geotagging adds geographical information to media through the use of metadata. Geotagging data often includes latitude and longitude coordinates, but may also include altitude, distance, and physical location names. Geotagging …
Jailbreaking is the exploiting of manufacturer or carrier operating systems, often by removing restrictions from a device like an iPhone. The exploit usually involves running a privilege escalation attack on …
Mean Time to Failure (MTTF) and sometimes references as Mean Time For Failure (MTFF) is the length of time a device or software is expected to last in operation. MTTF …
Role-Based Access Control (RBAC) is a strategy of limiting network access based on the roles of individual users within a business. RBAC lets employees have access rights only to the …
A Ping of Death (PoD) is a type of Denial of Service (DoS) attack that deliberately sends IP packets larger than the 65,536 bytes allowed by the IP protocol. One of …
Synthetic Transaction Monitoring (STM), also known as Synthetic Monitoring, is a web monitoring tool similar to Real User Monitoring (RUM), but Instead of collecting real user data, it simulates it. …
Common Vulnerabilities and Exposures (CVE) is a list of computer security flaws ranked on critical measures to aid individuals and companies with assessing the risk posed by the vulnerability or exposure …
Real User Monitoring (RUM) is a form of performance monitoring that captures and analyzes user activity and transacations on a website or application. It’s also known as real user measurement, …
Cross-Site Scripting (XSS) is an attack vector where hackers inject malicious code into a vulnerable web application. XSS differs from other web attack vectors in that it does not directly …
A Hypervisor, also known as a Virtual Machine Monitor or VMM, is software that creates and manages virtual machines (VMs). A hypervisor allows a computer to maintain many guest VMs …
Cross-Site Request Forgery (CSRF), also known as XSRF, is an attack method that fools a web browser into performing unwanted actions in a user application. Similar to Phishing Attacks, CSRFs …
The IETF (Internet Engineering Task Force) is the organization that defines standard Internet operating protocols such as TCP/IP. The IETF is a community of network designers, operators, vendors, and researchers concerned with …
Read-Only Memory (ROM) is storage technology that permanently stores data in a chip built into computers and other electronic devices. ROM includes the most basic programming needed to start a …
A Domain Name System (DNS) is essentially the ‘phonebook’ of the Internet. DNS is an elaborate, fault-tolerant way of connecting people to resources online. While it is quite complex, this …
Sender Policy Framework (SPF) is an anti-spam tool where email domains of the senders can be authenticated. SPF works hand-in-hand with DKIM and DMARC to help authenticate email messages to …
Non-Public Personal Information (NPPI) is personal and private information that’s provided by a consumer to some entity for their use. This information includes the following examples: Name, address, income, social …
Anti-Censorship are methods to combat censorship – for example, preventing search results from being blocked or interfered with. The growth of online platforms (Facebook, Instagram, Twitter, etc.) raises important questions …
A Graphical User Interface (GUI), often pronounced ‘gooey’, is a user interface that includes graphical elements, such as windows, icons, and buttons. The term was created in the 1970s to distinguish graphical interfaces from text-based …
A Solid State Drive (SSD) is a type of storage device that supports reading and writing data and stores the data in a permanent state even without a power source …
A Hard Disk Drive (HDD), also known as a hard drive, is a computer storage device holding magnetic disks or platters spinning at high speeds. It’s the only long-term storage …
A Polymorphic Virus is a type of ‘shape-shifting’ virus, producing malicious code that is able to replicate itself with new signatures but identical payloads over and over again. These viruses …
Apple Wireless Direct Link (AWDL) is a low latency/high-speed Wi-Fi peer-to peer-connection Apple uses everywhere you’d expect them to: AirDrop, GameKit (which also uses Bluetooth), AirPlay, and conceivably with future …