Clickbait
Clickbait is Internet content that uses overemphasized or misleading headlines to lure a person into clicking a link. Once the link is clicked, it brings the user to another website …
A Cyber Library of 300+ Cybersecurity Terms.
Biometrics identification refers to computer-based data that identifies a person based on unique physical characteristics and traits, including your face, fingerprints, voice, and even retinas (eye scans). Biometric identifiers (something …
A Parasitic Virus, also known as a file virus, is spread by attaching itself to executable programs. When a program infected with a parasitic virus is opened, the virus code …
A Boot Sector Virus is a virus that infects the ‘boot sector’ of floppy disks or the ‘Master Boot Record’ (MBR) of hard disks (some infect the boot sector of …
A Macro Virus is a virus that adds its code to the macros embedded within documents, spreadsheets, and other data files. The first macro virus appeared in July of 1995 infecting …
A Memory-Resident Virus is a virus that is located in the memory of a computer, even after the ‘host’ application or program has stopped running (been terminated). Non-Memory-Resident Viruses are …
Random Access Memory (RAM) is a machine’s short-term memory. RAM is fundamental to computer processing, being a super-fast and temporary data storage space that a computer needs to access right …
A Learning Management System (LMS) is a solution used by organizations to deploy and track online training initiatives. Typically assets, such as Training Assignments, Policies, or Surveys are uploaded to …
Lateral Movement is the technique that hackers use after gaining initial access to machines or networks. Hackers use this strategy to move deeper into a network in search of sensitive …
Reconnaissance in cybersecurity refers to the preliminary step of a cyberattack, where a hacker is ‘scouting’ the target system. The terminology comes from military language, referring to a mission into …
A Secure Web Gateway (SWG) is a tool that shields users from web-based threats as well as applying and enforcing business use policies. Instead of connecting directly to a website, …
Single Sign-On (SSO) is an authentication method that enables users to securely authenticate with multiple applications and websites by using just one set of credentials. SSO works based on relationships …
A PDF (Portable Document Format) is a file format designed to present documents consistently across multiple devices and platforms. Since developed by Adobe 1992, it’s become one of the most …
A Malicious URL is a link created with the purpose of promoting scams, attacks, and fraud. By clicking on an infected URL, you may download malware or a trojan that …
SSAE Compliance, also known as Statement on Standards for Attestation Engagements and Compliance, is a collection of auditing standards and guidance using standards published by the Auditing Standards Board (ASB) …
All-Source Analysis is the analysis of threat information from multiple sources, disciplines, and agencies across the Intelligence Community. Analysts use this strategy to synthesize and group intelligence data gathered to …
Cyber Insurance is a form of insurance for businesses and individuals against Internet-based threats. Many high profile data breaches have prompted insurance companies to offer cyber insurance policies to protect …
Digital Content Management (DCM) is the process for collection, delivery, retrieval, governance and overall management of information in any digital format. The term is generally used in reference to administration …
Nation states have taken heavily to cyberwarfare over the past 20 years. Some flex their muscles openly such as when Russia invaded Georgia a few years back and took out their critical infrastructure through Cyberwarfare before they rolled their tanks in. Others do so more stealthily with false flags and more. The only certainty is you must protect yourself, because no-one else will or can. Learn how at CyberHoot.
An Application Programming Interface (API) is a set of definitions and protocols for building and integrating application software. APIs let your product communicate with other products and services without having …
The Tor Browser is a web browser designed for anonymous web browsing and protection against traffic capture, providing some level of privacy protection for individuals who us it. The Tor …
Digital Rights Management (DRM) are measures taken to protect digital media copyrights. DRM tries to prevent unauthorized redistribution of digital media and places restrictions on the ways consumers can copy …
A Data Spill, or Data Leak, is the accidental or deliberate exposure of information into an unauthorized environment. Data spillage is often the result of hackers breaking into company networks …
Quality of Service (QoS) is a technology that manages and prioritizes certain types of data traffic on a network with the goal of reducing packet loss, latency and jitters for …
Network Behavior Analysis (NBA), also known as “Behavior Monitoring” is the collection and analysis of internal network data to identify malicious or unusual activity. Behavioral monitoring tools analyze information from …
Bandwidth is foundational to any company’s Internet presence and function. Having enough bandwidth and reliable connectivity to the Internet can ensure smooth operations. This article gives a high level overview of your Bandwidth needs, planning considerations, and troubleshooting tools.
A Blended Threat is a computer network attack that seeks to maximize the severity of damage and speed of contagion by combining methods—for example, using characteristics of both viruses and …
Data Normalization is a process of reorganizing information in a database to meet two requirements: data is only stored in one place (reducing the data) and all related data items …
Catfishing is a common technique used on social media sites to attack victims through fake personalities and accounts. This technique is also used on dating sites, playing on people’s emotions, …
Updated: 9/9/2024 with new links to Freeze your Credit. Identity Theft is when a hacker uses your personal identifying information and pretends to be you in order to commit fraud …
The world of big data swirls around all of us online today. Data Aggregation (DA) is how big data is analyses for meaningful relationships and then converted into actionable intelligence. Learn more at CyberHoot.
A Threat Actor is a person or group performing malicious or hostile actions which cause harm to the victims computers, devices, systems, or networks. Threat Actors are categorized into groups …
JavaScript is a programming language developed by Netscape commonly used in web development; used to add dynamic and interactive elements to web pages. The coding language is a “client-side” language …
Cyberspace is the complex environment of interdependent networks of IT infrastructures including the public Internet, various private “Internets” such as Internet2 or the US military’s Secret Internet Protocol Router Network (SIPRNet), telecommunications …
JBOH (JavaScript-Binding-Over-HTTP) is a mobile device attack that enables an attacker to execute arbitrary code on a previously compromised device. These attacks are known to be deployed through malicious JBOH …
Situational awareness is knowledge combined with attitudes and behaviors that work to protect our IT assets. Being aware in cybersecurity means you understand what the threats you face are and …
Cryptanalysis is the decryption and analysis of codes, ciphers or encrypted text. Cryptanalysis uses mathematical formulas to search for algorithm vulnerabilities, attempting to break into a cryptographic system. The goal …
Piggybacking is a form of cyber attack where a hacker(s) gain access to an unauthorized network, computing resource, or even a physical building. They do this by leveraging an insecure …
Disinformation is closely aligned to social engineering. When combined the two can have very believable and devastating consequences. Develop a healthy skepticism towards online content. To avoid being taken advantage of, seek to validate sources, facts, and authors.