universal authentication framework UAF definition

Universal Authentication Framework (UAF)

Secure your business with CyberHoot Today!!! Sign Up Now The Universal Authentication Framework (UAF) is an authentication standard created by the FIDO Alliance. In UAF, a user who is authenticating to …

indicators of compromise IOC

Indicators of Compromise (IoC)

Secure your business with CyberHoot Today!!! Sign Up Now Indicators of Compromise (IoC) are pieces of forensic evidence, called IoCs for short, which show potential intrusions on a computer system …

extended detection and response (XDR) cybrary definition

Extended Detection and Response (XDR)

Secure your business with CyberHoot Today!!! Sign Up Now Extended Detection and Response (XDR) is touted as a consolidation of technologies and disparate system monitoring into a single tool or …

fido cybrary definition

Fast Identity Online (FIDO)

Secure your business with CyberHoot Today!!! Sign Up Now Fast Identity Online (FIDO) is a set of technology security specifications for strong authentication. FIDO is developed by the FIDO Alliance, …

active directory (AD) cybrary definition

Active Directory (AD)

Secure your business with CyberHoot Today!!! Sign Up Now Active Directory (AD) is Microsoft’s proprietary directory service. It runs on Windows Server and enables administrators to manage permissions and access …

scareware cybrary definition

Scareware

Secure your business with CyberHoot Today!!! Sign Up Now Scareware is a type of malware tactic used to manipulate victims into downloading or buying malware-infested software. Scareware attacks are used …

oauth cybrary definition

OAuth

Secure your business with CyberHoot Today!!! Sign Up Now OAuth, also known as Open Authorization, is an open standard authorization framework for token-based authorization on the internet. OAuth enables an end-user’s account …

web3 cybrary definition

Web3

Secure your business with CyberHoot Today!!! Sign Up Now Web3, also referred to as Web 3.0, is the next evolution of the internet. The new phase is predicted by some …

Geofencing

Geofencing

Secure your business with CyberHoot Today!!! Sign Up Now Geofencing is a technology for setting virtual boundaries and triggering events when these boundaries are crossed by a mobile device on which …

html smuggling cybrary

HTML Smuggling

Secure your business with CyberHoot Today!!! Sign Up Now HTML Smuggling is an evasive malware delivery technique that leverages legitimate HTML5 and JavaScript features to deploy banking malware, Remote Access …

object identifier OID

Object Identifier (OID)

Secure your business with CyberHoot Today!!! Sign Up Now An Object Identifier (OID) is a specific, long-form name for any type of object or entity. In computing, an OID appears …

randomization functions cybrary

Randomization Function

Secure your business with CyberHoot Today!!! Sign Up Now A Randomization Function is an algorithm or procedure that implements a randomly chosen function between two specific sets, suitable for use …

check digits cybrary

Check Digits

Secure your business with CyberHoot Today!!! Sign Up Now A Check Digit is a digit added to a string of numbers for error detection purposes. Normally, the check digit is …

3des encryption

3DES Encryption

Secure your business with CyberHoot Today!!! Sign Up Now 3DES Encryption, also known as Triple Data Encryption Standard (DES), is a type of cryptography where block cipher algorithms are applied …

assembly language cybrary

Assembly Language

Secure your business with CyberHoot Today!!! Sign Up Now Assembly Language is the most basic programming language available for any processor. With assembly language, a programmer works only with operations that …

doxxing cybrary

Doxxing

Secure your business with CyberHoot Today!!! Sign Up Now Doxxing is the act of revealing identifying information about someone online, such as their real name, home address, workplace, phone, financial, …

script cyber cybrary

Script

Secure your business with CyberHoot Today!!! Sign Up Now A Script is a list of commands that are executed by a certain program or scripting engine. Scripts may be used …

crm cybrary

Customer Relationship Management (CRM)

Secure your business with CyberHoot Today!!! Sign Up Now Customer Relationship Management (CRM) is a technology tool for managing all your company’s relationships and interactions with customers, partners, and prospects. …

enterprise resource planning ERP Cybrary

Enterprise Resource Planning (ERP)

Secure your business with CyberHoot Today!!! Sign Up Now Enterprise Resource Planning (ERP) is a type of software that companies use to manage day-to-day business activities such as accounting, procurement, project management, risk management, …

internet service provider (ISP)

Internet Service Provider (ISP)

Secure your business with CyberHoot Today!!! Sign Up Now An Internet Service Provider (ISP) is a company that provides access to the Internet to both personal and business customers. ISPs …

emergency data request

Emergency Data Request (EDR)

Secure your business with CyberHoot Today!!! Sign Up Now An Emergency Data Request (EDR) is a procedure used by U.S. Law Enforcement agencies to obtain critical data from service providers in …

management information base MIB

Management Information Base (MIB)

Secure your business with CyberHoot Today!!! Sign Up Now A Management Information Base (MIB) is a Simple Network Management Protocol (SNMP) nonrelational database that describes devices being monitored. Network management platforms monitor …

network management system (NMS)

Network Management System (NMS)

Secure your business with CyberHoot Today!!! Sign Up Now A Network Management System (NMS) is an application or group of applications that allows network administrators to manage a network’s independent …

Self Assessment Questionnaire (SAQ)

Secure your business with CyberHoot Today!!! Sign Up Now A Self Assessment Questionnaire (SAQ) is most commonly used in the Payment Card Industry Data Security Standard (PCI-DSS) space to determine if …

simple network management protocol SNMP

Simple Network Management Protocol (SNMP)

Secure your business with CyberHoot Today!!! Sign Up Now Simple Network Management Protocol (SNMP) is an application-layer protocol for monitoring and managing network devices on a Local Area Network (LAN) or …

error correcting codes ECC cybrary

Error Correction Code (ECC)

Secure your business with CyberHoot Today!!! Sign Up Now An Error correction code (ECC) checks read or transmitted data for errors and corrects them as soon as they are found. …

quantum computing

Quantum Computing

Secure your business with CyberHoot Today!!! Sign Up Now Quantum Computing is an area of computing focused on developing computer technology based on the principles of quantum theory (which explains …

moore's law cybrary

Moore’s Law

Secure your business with CyberHoot Today!!! Sign Up Now Moore’s Law is a 1965 observation made by Intel co-founder Gordon E. Moore that the number of transistors placed in an …

command line interface cybrary

Command Line Interface (CLI)

Secure your business with CyberHoot Today!!! Sign Up Now A Command Line Interface (CLI) is a text-based user interface (UI) used to run programs, manage computer files and interact with …

endpoint protection and response edr cybrary

Endpoint Detection and Response (EDR)

Secure your business with CyberHoot Today!!! Sign Up Now Endpoint Detection and Response (EDR), also referred to as Endpoint Detection and Threat Response (EDTR), is an endpoint security solution that …

controlled unclassified information CUI cybrary

Controlled Unclassified Information (CUI)

Secure your business with CyberHoot Today!!! Sign Up Now Controlled Unclassified Information (CUI) is federal non-classified information (information the federal government creates or possesses, or that an entity creates or …

Red Purple and Blue Team Exercise Goals

Purple Team

Secure your business with CyberHoot Today!!! Sign Up Now A Purple Team is a group of cybersecurity experts that take on the role of the Blue Team and Red Team …

network access control cybrary

Network Access Control (NAC)

Secure your business with CyberHoot Today!!! Sign Up Now Network Access Control (NAC) is the act of keeping unauthorized devices (and their users) out of your private network. Organizations that …

aes encryption cybrary

AES Encryption

Secure your business with CyberHoot Today!!! Sign Up Now AES Encryption, also known as Advanced Encryption Standard, is a symmetric block cipher used by the U.S. government to protect classified information. In …

wiper malware cybrary

Wiper Malware

Secure your business with CyberHoot Today!!! Sign Up Now Wiper Malware is malicious software that wipes away everything that comes in its path. The sole purpose of this malware is …

fingerprint cyber cybrary

Fingerprint

Secure your business with CyberHoot Today!!! Sign Up Now Fingerprints used in cryptography are short keys that help identify a longer public key. Fingerprints are used for key authentication and …

checksum cybrary

Checksum

Secure your business with CyberHoot Today!!! Sign Up Now A Checksum is a value used to verify the integrity of a file or a data transfer. In other words, it …

lossless compression cybrary

Lossless Compression

Secure your business with CyberHoot Today!!! Sign Up Now Lossless Compression is when file size is reduced with no loss of quality or data. This seemingly magical method of reducing …

lossy compression cybrary

Lossy Compression

Secure your business with CyberHoot Today!!! Sign Up Now Lossy Compression is when data is lost or quality is reduced from the original version while compressing data. Lossy compression is …

Master Boot Record of a Computer

Master Boot Record (MBR)

Secure your business with CyberHoot Today!!! Sign Up Now The Master Boot Record (MBR) is the information in the first sector of any hard disk that identifies how and where an operating …

information disclosure cybrary

Information Disclosure

Secure your business with CyberHoot Today!!! Sign Up Now Information Disclosure, also known as Information Leakage, is when a website unintentionally reveals sensitive information. Depending on the context, websites may …

privilege escalation attack cybrary

Privilege Escalation Attack

Secure your business with CyberHoot Today!!! Sign Up Now Privilege Escalation Attacks are when attackers acquire access to elevated (administrative) rights, or privileges, beyond a simple regular unprivileged user. Privilege …

tornado cash cybrary

Tornado Cash

Secure your business with CyberHoot Today!!! Sign Up Now Tornado Cash is an Ethereum (ETH) mixer protocol that is used to improve transaction privacy by obscuring the on-chain link between the …

remote code execution rce

Remote Code Execution (RCE)

Secure your business with CyberHoot Today!!! Sign Up Now Remote Code Execution (RCE) is an attack that allows hackers to remotely execute malicious code on a computer. The impact of …

wide area network WAN cybrary

Wide Area Network (WAN)

Secure your business with CyberHoot Today!!! Sign Up Now A Wide Area Network (WAN) is a large computer network that connects groups of computers over large distances. WANs are often used …

metropolitan area network MAN cybrary

Metropolitan Area Network (MAN)

Secure your business with CyberHoot Today!!! Sign Up Now A Metropolitan Area Network (MAN) is a computer network that connects computers within a metropolitan area, such as a single large …