
Glossary of Terms
-
A targeted, long-term cyberattack in which an unauthorized user gains access to a network and remains undetected for an extended period, typically for espionage or data theft.
-
Description text goes hereA software solution that aggregates and analyzes security data from various sources to provide real-time monitoring, threat detection, and incident response.
-
A network security system designed to monitor and analyze network traffic for signs of unauthorized access or suspicious activities.
-
A security system that can detect and actively block or mitigate potential threats or attacks in real-time.
-
Information about potential cyber threats, vulnerabilities, and attack techniques collected from various sources to help organizations better understand and defend against potential risks.
-
Malicious software, including viruses, worms, Trojans, and ransomware, designed to compromise and damage computer systems or steal data.
-
A software vulnerability that is unknown to the vendor or the public, making it a prime target for exploitation by cybercriminals.
-
A method of threat detection that focuses on monitoring and analyzing user and system behaviors to identify anomalies or suspicious activities.
-
A documented set of procedures and guidelines to follow when a security incident or data breach occurs, with the goal of minimizing damage and recovering as quickly as possible.
-
The proactive process of actively searching for signs of malicious activities or security threats within an organization's network, often using advanced analytics and threat intelligence.
-
A cybersecurity technology that monitors and responds to suspicious activities and threats on individual devices, such as computers and mobile devices.
-
A centralized facility or team responsible for monitoring, analyzing, and responding to security events in real-time.
-
A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and financial data, by posing as a trustworthy entity in electronic communication, often through email.
-
A classification system used to categorize the severity of a security incident or breach, often used to prioritize incident response efforts.
-
An authentication method that requires users to provide two separate authentication factors (e.g., password and a one-time code sent to a mobile device) for increased security.
-
A decoy system or network designed to attract and detect unauthorized access or malicious activity in order to gather information about potential threats.
-
he practice of sharing information about cybersecurity threats and vulnerabilities among organizations or with government agencies to improve collective defense.
-
The process of regularly updating and applying security patches to software and systems to address known vulnerabilities and reduce the risk of exploitation.
-
An attack that overwhelms a target system or network with excessive traffic, rendering it unavailable to users.
-
A solution that combines security orchestration and automation to streamline incident response processes and improve efficiency.
-
The process of identifying the underlying causes of a security incident or breach to prevent similar incidents in the future.
-
A person, group, or organization responsible for initiating or carrying out a cyberattack.
-
Digital forensics involves the collection, analysis, and preservation of digital evidence to investigate and recover from security incidents or cybercrimes.
-
A security alert or warning that is generated by a detection system but does not represent an actual threat or incident.
-
Artifacts or pieces of information that suggest a system or network has been compromised and may be used to detect ongoing attacks.
-
Any event that compromises the confidentiality, integrity, or availability of data or information systems.
-
A group of cybersecurity experts who simulate cyberattacks to identify vulnerabilities and weaknesses in an organization's defenses.
-
A cyberattack in which attackers use stolen usernames and passwords from one breach to gain unauthorized access to multiple accounts, exploiting the commonality of users reusing passwords.
-
The overall security strength and readiness of an organization, including its policies, procedures, and security measures.
-
A security model that assumes no trust, even within an organization's network, and requires strict identity verification and continuous monitoring for all users and devices.
-
A dedicated team within an organization responsible for managing and responding to security incidents and breaches.
-
The practice of monitoring network traffic for patterns and behaviors that indicate potential security threats or anomalies.
-
An organization's ability to withstand and recover from cyberattacks while minimizing the impact on its operations.
-
The use of machine learning algorithms and models to identify and respond to security threats based on patterns and data analysis.
-
The collection and storage of all network packets for analysis, which can be useful for investigating security incidents.
-
A framework that describes the stages of a cyberattack, from initial reconnaissance to data exfiltration, helping organizations understand and defend against attacks at each stage.
-
Organizations or groups that facilitate the exchange of cybersecurity threat information among members in a specific industry or sector.
-
The categorization of security incidents based on their type, impact, and severity, which helps in prioritizing responses.
-
The process of evaluating an organization's vulnerabilities, assets, and threats to determine the likelihood and potential impact of security incidents.
-
A documented set of procedures and guidelines that security teams follow to respond to specific types of security incidents.
-
The total exposure and vulnerabilities that a system, network, or organization has, which can be targeted by potential attackers.
-
A specialized team within a security organization dedicated to actively seeking out security threats and vulnerabilities in an organization's network.
-
The evaluation of an organization's security controls, policies, and procedures to identify weaknesses and assess overall security effectiveness.
-
A technique that isolates and runs untrusted or suspicious files in a controlled environment to analyze their behavior and identify potential threats.
-
A documented strategy for responding to a ransomware attack, including steps for containment, recovery, and communication.
-
The analysis of volatile memory (RAM) in a computer system to uncover signs of an ongoing cyberattack or intrusion.
-
The practice of identifying, prioritizing, and mitigating vulnerabilities in an organization's systems and software.
-
Insurance policies that provide financial protection and coverage for organizations in the event of a cybersecurity incident, such as data breaches or ransomware attacks.
-
Manipulative techniques used to trick individuals into revealing sensitive information or performing actions that compromise security, often through impersonation or psychological manipulation.
-
Technologies and policies designed to prevent the unauthorized transfer or leakage of sensitive data from an organization.
-
predefined set of instructions and procedures for responding to specific security incidents, allowing for consistent and effective incident response.
-
NDR is a cybersecurity technology that focuses on monitoring and analyzing network traffic to detect and respond to threats and anomalies.