Fingerprint
Secure your business with CyberHoot Today!!! Sign Up Now Fingerprints used in cryptography are short keys that help identify a longer public key. Fingerprints are used for key authentication and …
A Cyber Library of 300+ Cybersecurity Terms.
Secure your business with CyberHoot Today!!! Sign Up Now Fingerprints used in cryptography are short keys that help identify a longer public key. Fingerprints are used for key authentication and …
Secure your business with CyberHoot Today!!! Sign Up Now Lossless Compression is when file size is reduced with no loss of quality or data. This seemingly magical method of reducing …
Secure your business with CyberHoot Today!!! Sign Up Now Lossy Compression is when data is lost or quality is reduced from the original version while compressing data. Lossy compression is …
Secure your business with CyberHoot Today!!! Sign Up Now The Master Boot Record (MBR) is the information in the first sector of any hard disk that identifies how and where an operating …
Secure your business with CyberHoot Today!!! Sign Up Now Information Disclosure, also known as Information Leakage, is when a website unintentionally reveals sensitive information. Depending on the context, websites may …
Secure your business with CyberHoot Today!!! Sign Up Now Privilege Escalation Attacks are when attackers acquire access to elevated (administrative) rights, or privileges, beyond a simple regular unprivileged user. Privilege …
Secure your business with CyberHoot Today!!! Sign Up Now Tornado Cash is an Ethereum (ETH) mixer protocol that is used to improve transaction privacy by obscuring the on-chain link between the …
Secure your business with CyberHoot Today!!! Sign Up Now Remote Code Execution (RCE) is an attack that allows hackers to remotely execute malicious code on a computer. The impact of …
Secure your business with CyberHoot Today!!! Sign Up Now A Wide Area Network (WAN) is a large computer network that connects groups of computers over large distances. WANs are often used …
Secure your business with CyberHoot Today!!! Sign Up Now A Metropolitan Area Network (MAN) is a computer network that connects computers within a metropolitan area, such as a single large …
Secure your business with CyberHoot Today!!! Sign Up Now A Local Area Network (LAN) is a group of devices connected together in one physical location, such as a building, office, …
Secure your business with CyberHoot Today!!! Sign Up Now Error Detection in cybersecurity refers to techniques that enable reliable delivery of digital data over unreliable communication channels, protecting the integrity of the data. Many communication …
Secure your business with CyberHoot Today!!! Sign Up Now A Network Interface Card (NIC) provides networking capabilities for a computer. It may enable a wired connection (Ethernet) or a wireless connection (Wi-Fi) …
The Open Systems Interconnection (OSI) Model is a conceptual model created by the International Organization for Standardization that allows various communication systems to communicate using standard protocols. In simpler terms, …
Layer 2 Networks refers to the second layer of the Open Systems Interconnection (OSI) Model, which is the data link layer. Layer 2 Network is the link layer (second-lowest layer) …
A Layer 3 Network is the third layer of the Open Systems Interconnection (OSI) Model, or network layer. Layer 3 provides the network’s routing and switching logic that creates network …
Private Virtual Local Area Network (PVLAN), also known as port isolation, is a network segmentation technology for layer 2 networks, which allows for separate sub-networks, or private VLANs under the main …
Fleeceware is a malicious application that tricks users into paying money for simple apps with functionality that’s readily available for free elsewhere. Fleeceware is successful on Google’s Play Store (rather …
Peer-to-Peer (P2P) Networks exist where groups or “peers” of computer systems are linked to each other through the Internet for a common purpose usually with a common application directing their …
Mean Time To Respond (MTTR) is the average time required to return a system to operational condition after receiving notification of a failure or cyberattack. MTTR represents the security of …
Mean Time To Detect (MTTD), also known as Mean Time To Identify (MTTI), is one of the main key performance indicators in Incident Management. MTTD refers to the mean (average) …
Security Orchestration, Automation, and Response (SOAR) is a stack of compatible software programs that enables an organization to collect data about security threats and respond to security events without human intervention. …
For decades now, Periodic Backups have been used to backup and safeguard critical data. Periodic backups are performed on a set schedule, rather than event-driven, such as whenever new data …
Backup Versioning is when a backup solution allows a computer file to exist with several archived versions. Most common backup versioning file systems keep a number of old copies of the …
Castle-And-Moat refers to a network security model in which no one outside the network is able to access data on the inside, but everyone inside the network can. Imagine an …
Network Attached Storage (NAS) is high-capacity storage that connects to your home or office network so that you and other trusted users can access your files from mobile devices and …
Monero Coin (XMR) is a cryptocurrency focused on ‘Privacy and Anonymity’. The privacy token runs on its own blockchain, which hides virtually all transaction details. The identity of the sender …
A Vulnerability Alert Management Policy (VAMP) is created within an organization to establish consistent rules for the review, evaluation, application, and verification of system updates to alleviate vulnerabilities in one’s …
Vulnerability Scanning is the process of identifying security weaknesses and coding flaws in systems and software running on them. This is a vital component of a vulnerability alert management program, …
A Hardware Security Module (HSM) is a physical security device that safeguards and manages digital keys, performs encryption and decryption services, strong authentication, and often have tamper detection and prevention built …
An Out-Of-Band (OOB) Patch is a security update released outside of the normal frequency. Typically, Microsoft releases patches on the second Tuesday of each month, called Patch Tuesday. When there …
A Managed Service Provider (MSP) is a third-party business that provides network, application, and system management services to companies. MSPs allow businesses without IT expertise to improve their cybersecurity framework …
Full-Disk Encryption (FDE) is the encryption of all data on a disk drive. It’s often done by disk encryption software installed on the hard drive during manufacturing. Users who operate …
On-Access Scanning refers to a security tool configured to deliver real-time scans of each file for malware as the file is downloaded, opened, or executed. Many different vendors offer on-access …
Quarantine in the cybersecurity world happens when files containing malware are placed into isolation for future disinfection or examination. This strategy puts the malware in a specific area of the …
A Transaction Lock refers to the step taken by mobile payment app users to secure their accounts and help prevent fraudulent activity. A form of Transaction Lock is commonly seen when …
Knowledge-Based Verification (KBV) is a strategy used to verify identities based on knowledge of private information associated with the claimed identity. This is often referred to as knowledge-based authentication (KBA) or …
Tactics, Techniques, and Procedures (TTP) is the method used by IT and military professionals to determine the behavior of a threat actor (hacker). These three elements help you understand your …
Stalkerware refers to tools, apps, software programs, and devices that let another person (a stalker) secretly watch and record information on another person’s device. Parents use this type of tool …
A Cryptocurrency Wallet, also known as a Crypto Coin Wallet, is an application that allows cryptocurrency users to store and retrieve their digital assets. With traditional currency, you don’t need a wallet …
A Service Set Identifier (SSID) is a series of characters that uniquely names a Wireless Local Area Network (WLAN). An SSID is often referred to as a “network name.” This name …
Input Validation, also known as data validation, is the testing of any input (or data) provided by a user or application against expected criteria. Input validation prevents malicious or poorly …
Business Email Compromise (BEC) is when an email account, often in a company’s finance department, is broken into and controlled by a hacker. This is often accomplished through a phishing …
A Quick Response (QR) Code is a type of barcode that contains a pattern of dots and lines. It can be scanned using a QR scanner or on a smartphone camera. …