time to live TTL cybrary

Time-To-Live (TTL)

Secure your business with CyberHoot Today!!! Sign Up Now Time-To-Live (TTL) is a value for the period of time that a packet, or data, should exist on a computer or network …

call admission control cac

Call Admission Control (CAC)

Secure your business with CyberHoot Today!!! Sign Up Now Call Admission Control (CAC) is the method or process of regulating traffic in voice communications, specifically in wireless mobile networks and …

voice firewall definition cybrary

Voice Firewall

Source: Mobileum Secure your business with CyberHoot Today!!! Sign Up Now A Voice Firewall logs, monitors, and controls all inbound and outbound voice network activity on a per-call basis through …

traceroute cybrary definition

Traceroute

Secure your business with CyberHoot Today!!! Sign Up Now Traceroute is a network diagnostic tool used to track the path taken by a packet on an IP network from source …

honeymonkey cybrary

HoneyMonkey

Secure your business with CyberHoot Today!!! Sign Up Now A HoneyMonkey is a system created by Microsoft Research that uses a network of computers or virtual machines to browse different …

Interpol

Secure your business with CyberHoot Today!!! Sign Up Now Interpol, also known as the International Criminal Police Organization, is the world’s largest international police organization, with seven regional bureaus worldwide …

infragard cybrary

InfraGard

Secure your business with CyberHoot Today!!! Sign Up Now InfraGard is a partnership between the FBI and the private sector. It’s an association of individuals who represent businesses, academic institutions, …

universal authentication framework UAF definition

Universal Authentication Framework (UAF)

Secure your business with CyberHoot Today!!! Sign Up Now The Universal Authentication Framework (UAF) is an authentication standard created by the FIDO Alliance. In UAF, a user who is authenticating to …

indicators of compromise IOC

Indicators of Compromise (IoC)

Secure your business with CyberHoot Today!!! Sign Up Now Indicators of Compromise (IoC) are pieces of forensic evidence, called IoCs for short, which show potential intrusions on a computer system …

extended detection and response (XDR) cybrary definition

Extended Detection and Response (XDR)

Secure your business with CyberHoot Today!!! Sign Up Now Extended Detection and Response (XDR) is touted as a consolidation of technologies and disparate system monitoring into a single tool or …

fido cybrary definition

Fast Identity Online (FIDO)

Secure your business with CyberHoot Today!!! Sign Up Now Fast Identity Online (FIDO) is a set of technology security specifications for strong authentication. FIDO is developed by the FIDO Alliance, …

active directory (AD) cybrary definition

Active Directory (AD)

Secure your business with CyberHoot Today!!! Sign Up Now Active Directory (AD) is Microsoft’s proprietary directory service. It runs on Windows Server and enables administrators to manage permissions and access …

scareware cybrary definition

Scareware

Secure your business with CyberHoot Today!!! Sign Up Now Scareware is a type of malware tactic used to manipulate victims into downloading or buying malware-infested software. Scareware attacks are used …

oauth cybrary definition

OAuth

Secure your business with CyberHoot Today!!! Sign Up Now OAuth, also known as Open Authorization, is an open standard authorization framework for token-based authorization on the internet. OAuth enables an end-user’s account …

web3 cybrary definition

Web3

Secure your business with CyberHoot Today!!! Sign Up Now Web3, also referred to as Web 3.0, is the next evolution of the internet. The new phase is predicted by some …

Geofencing

Geofencing

Secure your business with CyberHoot Today!!! Sign Up Now Geofencing is a technology for setting virtual boundaries and triggering events when these boundaries are crossed by a mobile device on which …

html smuggling cybrary

HTML Smuggling

Secure your business with CyberHoot Today!!! Sign Up Now HTML Smuggling is an evasive malware delivery technique that leverages legitimate HTML5 and JavaScript features to deploy banking malware, Remote Access …

check digits cybrary

Check Digits

Secure your business with CyberHoot Today!!! Sign Up Now A Check Digit is a digit added to a string of numbers for error detection purposes. Normally, the check digit is …

3des encryption

3DES Encryption

Secure your business with CyberHoot Today!!! Sign Up Now 3DES Encryption, also known as Triple Data Encryption Standard (DES), is a type of cryptography where block cipher algorithms are applied …

assembly language cybrary

Assembly Language

Secure your business with CyberHoot Today!!! Sign Up Now Assembly Language is the most basic programming language available for any processor. With assembly language, a programmer works only with operations that …

doxxing cybrary

Doxxing

Secure your business with CyberHoot Today!!! Sign Up Now Doxxing is the act of revealing identifying information about someone online, such as their real name, home address, workplace, phone, financial, …

moore's law cybrary

Moore’s Law

Secure your business with CyberHoot Today!!! Sign Up Now Moore’s Law is a 1965 observation made by Intel co-founder Gordon E. Moore that the number of transistors placed in an …

command line interface cybrary

Command Line Interface (CLI)

Secure your business with CyberHoot Today!!! Sign Up Now A Command Line Interface (CLI) is a text-based user interface (UI) used to run programs, manage computer files and interact with …

endpoint protection and response edr cybrary

Endpoint Detection and Response (EDR)

Secure your business with CyberHoot Today!!! Sign Up Now Endpoint Detection and Response (EDR), also referred to as Endpoint Detection and Threat Response (EDTR), is an endpoint security solution that …

controlled unclassified information CUI cybrary

Controlled Unclassified Information (CUI)

Secure your business with CyberHoot Today!!! Sign Up Now Controlled Unclassified Information (CUI) is federal non-classified information (information the federal government creates or possesses, or that an entity creates or …

checksum cybrary

Checksum

Secure your business with CyberHoot Today!!! Sign Up Now A Checksum is a value used to verify the integrity of a file or a data transfer. In other words, it …

lossless compression cybrary

Lossless Compression

Secure your business with CyberHoot Today!!! Sign Up Now Lossless Compression is when file size is reduced with no loss of quality or data. This seemingly magical method of reducing …

lossy compression cybrary

Lossy Compression

Secure your business with CyberHoot Today!!! Sign Up Now Lossy Compression is when data is lost or quality is reduced from the original version while compressing data. Lossy compression is …

information disclosure cybrary

Information Disclosure

Secure your business with CyberHoot Today!!! Sign Up Now Information Disclosure, also known as Information Leakage, is when a website unintentionally reveals sensitive information. Depending on the context, websites may …

wide area network WAN cybrary

Wide Area Network (WAN)

Secure your business with CyberHoot Today!!! Sign Up Now A Wide Area Network (WAN) is a large computer network that connects groups of computers over large distances. WANs are often used …

metropolitan area network MAN cybrary

Metropolitan Area Network (MAN)

Secure your business with CyberHoot Today!!! Sign Up Now A Metropolitan Area Network (MAN) is a computer network that connects computers within a metropolitan area, such as a single large …

local area network LAN cybrary

Local Area Network (LAN)

Secure your business with CyberHoot Today!!! Sign Up Now A Local Area Network (LAN) is a group of devices connected together in one physical location, such as a building, office, …

error detection cybrary

Error Detection

Secure your business with CyberHoot Today!!! Sign Up Now Error Detection in cybersecurity refers to techniques that enable reliable delivery of digital data over unreliable communication channels, protecting the integrity of the data. Many communication …

network interface card nic

Network Interface Card (NIC)

Secure your business with CyberHoot Today!!! Sign Up Now A Network Interface Card (NIC) provides networking capabilities for a computer. It may enable a wired connection (Ethernet) or a wireless connection (Wi-Fi) …

osi model cybrary

Open Systems Interconnection (OSI) Model

The Open Systems Interconnection (OSI) Model is a conceptual model created by the International Organization for Standardization that allows various communication systems to communicate using standard protocols. In simpler terms, …

Layer 2 Network

Layer 2 Networks refers to the second layer of the Open Systems Interconnection (OSI) Model, which is the data link layer. Layer 2 Network is the link layer (second-lowest layer) …

layer 3 network cybrary

Layer 3 Network

A Layer 3 Network is the third layer of the Open Systems Interconnection (OSI) Model, or network layer. Layer 3 provides the network’s routing and switching logic that creates network …

pvlan cybrary

Private Virtual Local Area Network (PVLAN)

Private Virtual Local Area Network (PVLAN), also known as port isolation, is a network segmentation technology for layer 2 networks, which allows for separate sub-networks, or private VLANs under the main …

fleeceware cybrary

Fleeceware

Fleeceware is a malicious application that tricks users into paying money for simple apps with functionality that’s readily available for free elsewhere. Fleeceware is successful on Google’s Play Store (rather …

md5 hash

MD5 Hash

An MD5 Hash is a hashing algorithm that is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length digest value …

peer to peer network cybrary

Peer-to-Peer (P2P) Network

Peer-to-Peer (P2P) Networks exist where groups or “peers” of computer systems are linked to each other through the Internet for a common purpose usually with a common application directing their …

torrent cybrary

Torrent

A Torrent is a file type used by the BitTorrent file-sharing protocol. The protocol authorizes and points to a remote server that contains the location of different remote hosts with …

Mean Time To Respond (MTTR)

Mean Time To Respond (MTTR) is the average time required to return a system to operational condition after receiving notification of a failure or cyberattack. MTTR represents the security of …

periodic backups cybrary

Periodic Backups

For decades now, Periodic Backups have been used to backup and safeguard critical data. Periodic backups are performed on a set schedule, rather than event-driven, such as whenever new data …

backup versioning cybrary

Backup Versioning

Backup Versioning is when a backup solution allows a computer file to exist with several archived versions. Most common backup versioning file systems keep a number of old copies of the …