A systematic evaluation of an organization's information systems, policies, and procedures to assess compliance with security standards and identify vulnerabilities. Security audits can be internal or...
Definition
Cybersecurity
Terms related to information security, cryptography, and network protection.
The psychological manipulation of people into performing actions or divulging confidential information. Rather than exploiting technical vulnerabilities, social engineering targets human behavior thro...
DefinitionMalicious software that secretly monitors and collects information about a user's activities without their knowledge or consent. Spyware can capture keystrokes, browsing history, login credentials, an...
DefinitionA cyberattack that targets an organization by compromising a trusted third-party vendor or supplier in its supply chain. Attackers infiltrate software updates, open-source libraries, or hardware compo...
DefinitionEvidence-based knowledge about existing or emerging threats to an organization's assets. Threat intelligence includes information about threat actors, their tactics, techniques, and procedures (TTPs),...
DefinitionA type of malware that disguises itself as legitimate software to trick users into installing it. Once activated, a Trojan can give attackers remote access to the infected system, steal data, or insta...
DefinitionVirtual Private Network: a technology that creates an encrypted tunnel between a user's device and a remote server, masking the user's IP address and securing data in transit. VPNs are used for privac...
DefinitionA weakness or flaw in a system's design, implementation, or configuration that can be exploited by a threat actor to gain unauthorized access or cause harm. Vulnerabilities are cataloged using identif...
DefinitionWeb Application Firewall: a security solution that filters, monitors, and blocks HTTP/HTTPS traffic to and from a web application. A WAF protects against common web exploits such as SQL injection, XSS...
DefinitionCross-Site Scripting: a web security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users. XSS attacks can steal session cookies, redirect users, or def...
DefinitionA security framework that requires all users, whether inside or outside the organization's network, to be authenticated, authorized, and continuously validated before being granted access to applicati...
DefinitionAn attack that targets a previously unknown vulnerability in software or hardware before the vendor has released a patch. The term "zero-day" refers to the fact that developers have had zero days to f...
Definition