See What Foreign Software Is Running in Your Environment
RESOURCE CENTER

Cybersecurity 101

f
f
f
Fileless Malware

A type of malicious software that infects computers using legitimate programs. It exists without relying on files and leaves no trace that it was ever there, making it difficult to detect and remove.

f
Firewall

A security program or software that filters your network traffic and prevents outsiders, including malicious threat actors, from entering your organization.

f
Firewall-Like Application Policies

Once an application matches a policy, it stops processing so no further policies will take effect on that application. Care must be taken when creating and ordering policies to ensure that policies apply as intended.

f
FISMA (Federal Information Security Management Act)

A federal act put into effect in 2020 that requires federal entities to implement strict information security measures.

f
Footholds

A method threat actors use to reinstall malware onto a device after it is cleaned and rebooted. The program leaves vulnerabilities within the device for malware to relaunch.

g
g
g
Golden Ticket Attack

A golden ticket attack is an attack that targets Windows Active Directory access control. Threat actors bypass normal authentication by taking advantage of a Kerberos weakness. Attackers must have access to the system before a Golden Ticket Attack can be performed.

h
h
h
Hacker

Generally, someone who uses technical skills to overcome technical problems. In cybersecurity, a hacker is referred to as a threat actor with malicious intent to access an individual’s or organization’s data unauthorized.

h
Hardware

The physical portions of a computer or machine: wiring, circuit boards, storage drives, etc.

h
Hash

A file hash is a unique numerical value calculated using a specific algorithm. The hash of a file can help validate the integrity of a file. If a single value within the file is changed, the hash will be completely different. For example, changing a period to a question mark in a word document will result in a completely different hash value.

h
Host

Another word for computer, particularly references a computer that is connected to a network.

h
Human Error

Actions taken by users/employees that unintentionally result in the infiltration of malware, viruses, and more into an organization.

h
HIPAA (Health Insurance Portability and Accountability Act)

A US federal act established in 1996 that restricts access to individuals’ private medical information.

i
i
i
Incident Response

A strategy developed for organizations to respond to cyber threats and attacks in their network.

i
InfoSec (Information Security)

Policies and standard procedures set into place to protect sensitive data from unauthorized access.

i
Integrations

When different computers work together in some way, often exchanging data between them.

i
IP (Internet Protocol) Address

An arrangement of characters numbers that act is the identification number of any internet-connected device. Each device has its own unique IP Address.

j
j
j
Just-in-time

Another way of saying on demand, something is enabled exactly when needed and disabled when no longer needed.

k
k
k
Kerberos

An authentication protocol used to verify the identity of a host or user.

l
l
Sort Alphabetically
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.