Universal Authentication Framework (UAF)
Secure your business with CyberHoot Today!!! Sign Up Now The Universal Authentication Framework (UAF) is an authentication standard created by the FIDO Alliance. In UAF, a user who is authenticating to …
A Cyber Library of 300+ Cybersecurity Terms.
Secure your business with CyberHoot Today!!! Sign Up Now The Universal Authentication Framework (UAF) is an authentication standard created by the FIDO Alliance. In UAF, a user who is authenticating to …
Secure your business with CyberHoot Today!!! Sign Up Now Indicators of Compromise (IoC) are pieces of forensic evidence, called IoCs for short, which show potential intrusions on a computer system …
Secure your business with CyberHoot Today!!! Sign Up Now Extended Detection and Response (XDR) is touted as a consolidation of technologies and disparate system monitoring into a single tool or …
Secure your business with CyberHoot Today!!! Sign Up Now Fast Identity Online (FIDO) is a set of technology security specifications for strong authentication. FIDO is developed by the FIDO Alliance, …
Secure your business with CyberHoot Today!!! Sign Up Now Active Directory (AD) is Microsoft’s proprietary directory service. It runs on Windows Server and enables administrators to manage permissions and access …
Secure your business with CyberHoot Today!!! Sign Up Now The National Institute of Standards and Technology (NIST) is a division within the U.S. Department of Commerce that promotes innovation and …
Secure your business with CyberHoot Today!!! Sign Up Now The Cybersecurity and Infrastructure Security Agency (CISA) leads the United States’ national effort to understand, manage, and reduce risk to our cyber and …
Secure your business with CyberHoot Today!!! Sign Up Now Geofencing is a technology for setting virtual boundaries and triggering events when these boundaries are crossed by a mobile device on which …
Secure your business with CyberHoot Today!!! Sign Up Now HTML Smuggling is an evasive malware delivery technique that leverages legitimate HTML5 and JavaScript features to deploy banking malware, Remote Access …
Secure your business with CyberHoot Today!!! Sign Up Now An Object Identifier (OID) is a specific, long-form name for any type of object or entity. In computing, an OID appears …
Secure your business with CyberHoot Today!!! Sign Up Now A Randomization Function is an algorithm or procedure that implements a randomly chosen function between two specific sets, suitable for use …
Secure your business with CyberHoot Today!!! Sign Up Now A Check Digit is a digit added to a string of numbers for error detection purposes. Normally, the check digit is …
Secure your business with CyberHoot Today!!! Sign Up Now 3DES Encryption, also known as Triple Data Encryption Standard (DES), is a type of cryptography where block cipher algorithms are applied …
Secure your business with CyberHoot Today!!! Sign Up Now Assembly Language is the most basic programming language available for any processor. With assembly language, a programmer works only with operations that …
Secure your business with CyberHoot Today!!! Sign Up Now Customer Relationship Management (CRM) is a technology tool for managing all your company’s relationships and interactions with customers, partners, and prospects. …
Secure your business with CyberHoot Today!!! Sign Up Now Enterprise Resource Planning (ERP) is a type of software that companies use to manage day-to-day business activities such as accounting, procurement, project management, risk management, …
Secure your business with CyberHoot Today!!! Sign Up Now An Internet Service Provider (ISP) is a company that provides access to the Internet to both personal and business customers. ISPs …
Secure your business with CyberHoot Today!!! Sign Up Now An Emergency Data Request (EDR) is a procedure used by U.S. Law Enforcement agencies to obtain critical data from service providers in …
Secure your business with CyberHoot Today!!! Sign Up Now A Management Information Base (MIB) is a Simple Network Management Protocol (SNMP) nonrelational database that describes devices being monitored. Network management platforms monitor …
Secure your business with CyberHoot Today!!! Sign Up Now A Network Management System (NMS) is an application or group of applications that allows network administrators to manage a network’s independent …
Secure your business with CyberHoot Today!!! Sign Up Now A Self Assessment Questionnaire (SAQ) is most commonly used in the Payment Card Industry Data Security Standard (PCI-DSS) space to determine if …
Secure your business with CyberHoot Today!!! Sign Up Now Simple Network Management Protocol (SNMP) is an application-layer protocol for monitoring and managing network devices on a Local Area Network (LAN) or …
Secure your business with CyberHoot Today!!! Sign Up Now An Error correction code (ECC) checks read or transmitted data for errors and corrects them as soon as they are found. …
Secure your business with CyberHoot Today!!! Sign Up Now Quantum Computing is an area of computing focused on developing computer technology based on the principles of quantum theory (which explains …
Secure your business with CyberHoot Today!!! Sign Up Now Moore’s Law is a 1965 observation made by Intel co-founder Gordon E. Moore that the number of transistors placed in an …
Secure your business with CyberHoot Today!!! Sign Up Now A Command Line Interface (CLI) is a text-based user interface (UI) used to run programs, manage computer files and interact with …
Secure your business with CyberHoot Today!!! Sign Up Now Endpoint Detection and Response (EDR), also referred to as Endpoint Detection and Threat Response (EDTR), is an endpoint security solution that …
Secure your business with CyberHoot Today!!! Sign Up Now The Health Insurance Portability and Accountability Act (HIPAA) is United States legislation that provides data privacy and security requirements for safeguarding …
Secure your business with CyberHoot Today!!! Sign Up Now Controlled Unclassified Information (CUI) is federal non-classified information (information the federal government creates or possesses, or that an entity creates or …
Secure your business with CyberHoot Today!!! Sign Up Now The Cybersecurity Maturity Model Certification (CMMC) is a system of compliance levels that helps the government, specifically the Department of Defense …
Secure your business with CyberHoot Today!!! Sign Up Now A Purple Team is a group of cybersecurity experts that take on the role of the Blue Team and Red Team …
Secure your business with CyberHoot Today!!! Sign Up Now Network Access Control (NAC) is the act of keeping unauthorized devices (and their users) out of your private network. Organizations that …
Secure your business with CyberHoot Today!!! Sign Up Now AES Encryption, also known as Advanced Encryption Standard, is a symmetric block cipher used by the U.S. government to protect classified information. In …
Secure your business with CyberHoot Today!!! Sign Up Now Wiper Malware is malicious software that wipes away everything that comes in its path. The sole purpose of this malware is …
Secure your business with CyberHoot Today!!! Sign Up Now Fingerprints used in cryptography are short keys that help identify a longer public key. Fingerprints are used for key authentication and …
Secure your business with CyberHoot Today!!! Sign Up Now Lossless Compression is when file size is reduced with no loss of quality or data. This seemingly magical method of reducing …
Secure your business with CyberHoot Today!!! Sign Up Now Lossy Compression is when data is lost or quality is reduced from the original version while compressing data. Lossy compression is …
Secure your business with CyberHoot Today!!! Sign Up Now The Master Boot Record (MBR) is the information in the first sector of any hard disk that identifies how and where an operating …
Secure your business with CyberHoot Today!!! Sign Up Now Information Disclosure, also known as Information Leakage, is when a website unintentionally reveals sensitive information. Depending on the context, websites may …
Secure your business with CyberHoot Today!!! Sign Up Now Privilege Escalation Attacks are when attackers acquire access to elevated (administrative) rights, or privileges, beyond a simple regular unprivileged user. Privilege …
Secure your business with CyberHoot Today!!! Sign Up Now Tornado Cash is an Ethereum (ETH) mixer protocol that is used to improve transaction privacy by obscuring the on-chain link between the …
Secure your business with CyberHoot Today!!! Sign Up Now Remote Code Execution (RCE) is an attack that allows hackers to remotely execute malicious code on a computer. The impact of …
Secure your business with CyberHoot Today!!! Sign Up Now A Wide Area Network (WAN) is a large computer network that connects groups of computers over large distances. WANs are often used …
Secure your business with CyberHoot Today!!! Sign Up Now A Metropolitan Area Network (MAN) is a computer network that connects computers within a metropolitan area, such as a single large …