Human-Machine Interface (HMI)

Human-Machine Interface (HMI) is the hardware or software through which an operator interacts with a controller. An HMI can range from a physical control panel with buttons and indicator lights …

Test Oracle

A Test Oracle is a mechanism for determining whether the program has passed or failed a test. The use of test oracles involves comparing the output of the system under …

Black Box Testing

Black Box Testing is a method of software testing that examines the functionality of an application without peering into its internal software structures (which is known as White Box Testing). …

Near Field Communications (NFC)

Near Field Communications (NFC) is a short-range wireless technology that enables simple and secure communication between electronic devices. It may be used on its own or in combination with other …

Radio Frequency Identification (RFID)

Radio Frequency IDentification (RFID) is a system used to track objects, people, or animals using tags that respond to radio waves. RFID tags are integrated circuits that include a small …

Dynamic Code Analysis

Dynamic Code Analysis is a method used to analyze an application during its execution. This Dynamic Code Analysis process is often broken up into these steps: Preparing input data; Running …

Voice over Internet Protocol (VoIP)

Voice over Internet Protocol (VoIP) is essentially a telephone connection over the Internet. The data is sent digitally, using the Internet Protocol (IP) instead of analog telephone lines. This allows people …

Content Delivery Network (CDN)

A Content Delivery Network (CDN) is a geographically distributed group of servers that work together to provide fast delivery of Internet content. A CDN allows for the fast transfer of …

Application Fuzzing

Application Fuzzing, originally developed by Barton Miller at the University of Wisconsin in 1989, is a testing method used to discover coding errors and security loopholes in software, operating systems …

Application Proxy

An Application Proxy is one of the most secure firewall types that can be deployed. The application proxy sits between the protected network and the rest of the world. Every packet …

Application Security Assessment

An Application Security Assessment is performed either manually or automatically, generally continuing throughout the software development life cycle. It will typically include focusing on using secure protocols, performing defined security …

Dwell Time

Dwell Time is the amount of time threat actors go undetected in an environment. In other words, when a hacker intrudes into your network or systems, the dwell time is …

Internet Protocol Security (IPSec)

Internet Protocol Security (IPSec) is a set of protocols that provides security for Internet Protocol using advanced cryptography. IPSec is similar to a Secure Socket Layer (SSL), except that SSLs …

ssl cybrary term

Secure Socket Layer (SSL)

A Secure Socket Layer (SSL) is a security protocol developed by Netscape in the 1990’s for sending information securely (encrypted) over the Internet. Once upon a time, websites could only …

Reverse Proxy

A Reverse Proxy is a server that sits in front of one or more web servers, intercepting requests from clients. This is different from a forward proxy, where the proxy …

Web Application Firewall (WAF)

A Web Application Firewall (WAF) is used to protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web applications from attacks …

Static Code Analysis

Static Code Analysis is the analysis of software code when the program is not running. The analysis of the running or compiled, executing code is called Dynamic Code Analysis. The …

Coronavirus Advisory

Last Updated: Sun. March 8th, 2020 The Coronavirus (COVID-19), has infected nearly 90,000 people worldwide as of March 2, 2020, killing more than 3,000 of those infected. The virus started …

Hacking with Google Dorks

A Google Dork query, sometimes just referred to as a dork, is a search string that uses advanced search operators to find information that is not readily available on a website. Google dorking, …

Point-to-Point Tunneling Protocol (PPTP)

A Point-to-Point Tunneling Protocol (PTTP) is a networking standard that is used when connecting to a Virtual Private Network (VPN). VPNs are a way to create online privacy and anonymity …

Drive-By Download

A Drive-By Download is the unintentional download of malicious code to your computer or mobile device that may compromise your computer leaving you open to further attack by hackers. Many …

Sandboxing

Sandboxing is a cybersecurity term relating to various techniques used to protect your network and computing infrastructure from compromise by malicious software (aka: Malware). In one method, sandboxing provides a …

Wireless Application Protocol (WAP)

A Wireless Application Protocol (WAP) is an old standard that allowed early mobile phones to access the Internet through something called a WAP Gateway. The WAP Gateway identified the device …

Wired Equivalent Privacy (WEP)

A Wired Equivalent Privacy (WEP) is a deprecated wireless security protocol that was designed to provide a wireless local area network (WLAN) with a high level of security and privacy …

linkjacking linkbuilding

Linkjacking

Linkjacking is a practice used to redirect one website’s links to another. Usually, this is accomplished by submitting someone else’s content to an aggregator website, which then drives traffic to the …

Media Access Control (MAC) Address

A Media Access Control (MAC) Address is a hardware identification number that is uniquely assigned to each device on a network. The MAC address is manufactured into every network card, …

Lightweight Directory Access Protocol (LDAP)

A Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. The networks …

Zero Day Vulnerabilities

A Zero Day Vulnerability is a security flaw that is unknown to the software vendor or the business it is found in and there isn’t a patch released yet for …

Responsible Disclosure

Responsible Disclosure refers to the best practice followed by most security researchers of not disclosing a critical vulnerability in a software product until a vendor patch or fix has been …

Revenge Porn

Revenge Porn is sexually explicit images or videos of a person posted online without that person’s consent especially as a form of revenge or harassment. Revenge Porn is typically seen …

Privileged User

A Privileged User is a user of a computer who is authorized to bypass normal access control mechanisms, usually to be able to perform system management functions. Cybersecurity governance policies …

Command and Control (C&C) Server

A Command and Control (C&C) Server is a computer being controlled remotely by a cyber criminal that is used as a command center to send commands to systems that have …

Honeypot

A Honeypot in cybersecurity refers to a strategy used to catch cyber criminals in the act of trying to exploit a vulnerability and compromise a company. A honeypot can be …

Computer Emergency Response Team (CERT)

A Computer Emergency Response Team (CERT) is a group of security experts who respond to cybersecurity incidents. These teams work on many unique cybersecurity incidents involving malware, viruses, and cyber …

Polyinstantiation

Polyinstantiation is a cybersecurity strategy where multiple instances of a shared resource are created to prevent a user without the correct privileges from seeing the more sensitive information. In simpler …

File Transfer Protocol (FTP)

File Transfer Protocol (FTP) is a communications protocol used for transferring or exchanging files between two computers. These transferring of files generally is authenticated by username and password credentials. Anonymous …

Kernel

A Kernel is the core component of an operating system. The kernel acts as a bridge between applications and the data processing performed at the hardware level. When an operating …

Flooding

Flooding is a Denial of Service (DoS) attack that is designed to bring a network or other service down due to large amount of traffic, hence the term “flooding”. These …

Transport Layer Security (TLS)

Transport Layer Security (TLS) is a security protocol made for privacy and data security for communications over the Internet. A primary use case of TLS is encrypting the communication between …

Information Dissemination

Dissemination of Information refers to the distributing of a company’s or customer specific information to the public, whether through printed or electronic documents, or other forms of media.  “Dissemination of information” …

Information Resources Management (IRM)

Information Resources Management (IRM) is the planning, budgeting, organizing, directing, training, and control associated with an organization’s information.  The term encompasses both information itself and the related resources, such as personnel, …

Packet Sniffing

Packet Sniffing is the practice of gathering, collecting, and logging the packets that pass through a computer network, regardless of how the packet is addressed. In this way, every packet …

Network Based Intrusion Detection System (NIDS)

A Network Based Intrusion Detection System (NIDS), or Network Based IDS, is security hardware that is placed strategically to monitor critical network traffic. Traditional Network Based IDS analyzes passing network …

Backdoor

A Backdoor in the world of cybersecurity refers to the strategy used to get around normal security measures and gain privileged user access on a computer system, network, or software …

Morris Worm

The Morris Worm goes down in history as the first worm in existence.  This self repeating computer program that was written by Robert Tappan Morris, a student at Cornell University, …

Stuxnet

Stuxnet is a computer worm that was uncovered in 2010, which many people believe was in development since at least 2005. Stuxnet was targeting supervisory control and data acquisition (SCADA) …

Crypto-Mining or Cryptojacking

Crypto-Mining, also known as Cryptocurrency Mining, is a process in which transactions of various forms of cryptocurrency are verified and added to the blockchain digital ledger. Each time a cryptocurrency transaction …

Brute Force Attack

A Brute Force Attack is a strategy used by hackers trying to break into your data, password, or network. In this attack a computer, or its Graphics Processing Unit (GPU) will …