Related Concepts
Ethical Hacker: A person who acts as an attacker and evaluates the security of an application, system, or computer network to minimize risk
Cyberwarfare: Using technology to penetrate and attack another nation’s computer systems and networks to cause damage or disrupt services
Hacktivists: Kind of threat actor that further their beliefs, using cybercrime as their method of attack. The most common is for political purposes
APT: Advanced Persistent Attack, multi-phase, long-term, stealthy, and advanced operation against a specific target
Risk Management: Formal process of continuously identifying and assessing risk to reduce the impact of threats and vulnerabilities
Pen-Testing: Involves using the same tools, techniques, and methodologies that someone with malicious intent to report system vulnerabilities
Offensive Security: Proactive security strategies that use the same tactics that malicious actors use in real-world attacks to strengthen the security of a system
Defensive security: Protecting an organization's network and computer systems by analyzing and securing any potential digital threats
Behavior-based security: A form of threat detection that captures and analyzes the communication between a user on a network. Any changes in normal patterns of behavior are regarded as anomalies and may indicate an attack
CSIRT: Computer Security Incident Response Team, specialized in receiving, reviewing, and responding to computer security incident reports
Security Playbook: Collection of repeatable queries or reports that outline a standardized process for incident detection and response
Vulnerability: Defect or malfunction of an application that makes it easy to attack
Exploit: Program specifically created to attack a vulnerability
PoC: Proof of Concept, technique, or tool that demonstrates the exploitation of a vulnerability
CVSS: Common Vulnerabilities Score System, an open industry standard for assessing the severity of computer system security vulnerabilities
VPR: Vulnerability Priority Rating, a modern framework in vulnerability management that focuses on the risk that could affect directly an organization
IPS: Intrusion Prevention System, uses a set of traffic signatures that match and block malicious traffic and attacks
IDS: Intrusion Detection System, detects unauthorized network and system intrusions. It will not take action and won't prevent attacks from happening just detect, log, and report
DLP: Data Loss Prevention, a system designed to stop sensitive data from being stolen from or escaping a network
SIEM: Security Information and Event Management, the system collects and analyzes security alerts, logs, and other real-time and historical data
Defense-In-Depth: Practice of putting different layers of security control together in a system to guarantee security
PIM: Privileged Identity Management, translates a user's role within an organization into an access role on a system
PAM: Privileged Access Management, management of the privileges a system's access role has
Vetting: A screening process where applicants' backgrounds are examined to establish the risk they pose to an organization
Threat modeling: Process of reviewing, improving, and testing the security protocols
Bug bounty program: Allows a company to offer a reward for anyone who discovers a security vulnerability in the company’s systems
Non-Repudiation: Allows to guarantee the participation of both parts of a communication
Malicious formatted package: Collection of data improperly formatted that an application is unable to identify causing crashing or slowing down in the functions
Cryptocurrency: Digital money that can be used to buy goods and services, using strong encryption techniques to secure online transactions
Hardening: Process of securing a system by reducing its vulnerabilities or security holes, for which it is more prone
CWE: Common Weakness Enumeration, a list of software weaknesses to create a common language to describe software security weaknesses that are the root causes of given vulnerabilities
Last updated
Was this helpful?