See What Foreign Software Is Running in Your Environment
RESOURCE CENTER

Cybersecurity 101

l
LAN (Local Area Network)

A LAN is a group of electronic devices that are in the same physical location and are connected via a network.

l
Leakware

A.K.A. “Doxware” is ransomware that threatens to release a victim’s sensitive data if the ransom is not paid by a certain deadline.

l
Least Privilege

When a user within an organization is given the minimum access to files, applications, software, or systems they need to conduct their job.

l
Libraries

A.K.A “Data Libraries” is a large collection of organizational data; usually in archives or repositories to keep safe from unauthorized access.

l
Living Off the Land

When a threat actor uses software already existing in the environment to carry out malicious activities without being detected by security solutions like antivirus.

l
(Cyber)Lockers

Online storage services for confidential data. These file-storing and sharing services act as a “virtual locker”, giving them their name.

m
m
m
Macros

A single programming instruction that expands into a set of instructions to automate actions in your device, tools, or software in order to provide a certain output per user input. Macros are commonly found in office applications like Word and Excel.

m
Malware (Malicious Software)

Software that is built for the sole purpose of malicious intent, usually for destructive purposes or financial gain (ransomware).

m
MFA (Multi-Factor Authentication)

A method of authentication that utilizes two or more factors of providing proof of identification and authorization.

m
MSP (Managed Services Provider)

A third-party organization that provides outsourced services, usually in IT, for organizations.

m
MSSP (Managed Security Service Providers)

A third-party organization that provides outsourced services in security for organizations.

n
n
n
Network Control

An endpoint firewall that enables you to have total control over all network traffic, using dynamic ACLs, all managed from a central location.

n
NIST (National Institute of Standards and Technology)

NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.

o
o
o
Observability

The ability to understand the inner workings of a system by observing only its external manifestations

o
Open Source Intelligence (OSINT)

The gathering, appraisal, and assessment of publicly accessible data to answer a particular inquiry related to intelligence.  

p
p
p
PAM (Privileged Access Management)

The ability to manage users’ admin rights within your organization on a timed basis to mitigate risk by giving users the minimum access needed.

p
Password Management Tool

A third-party tool that stores, saves, and protects your confidential information like usernames, passwords, and credit card numbers.

p
Patching

Updates to systems, software, hardware, websites, etc. That, as the name implies, patch over known vulnerabilities before they can be exploited by threat actors.

p
Perimeter Firewall

A security application organizations implement to protect themselves from outside, internet threats. Firewalls act as a barrier of protection that holds a “wall” between the private and public networks.

p
Permissions

Also referred to as rights and privileges, permissions are a set level of actions a user can take in their organization’s network. Permissions are usually established by a “higher-level” user with admin rights.

p
Personal Firewalls

Like Perimeter Firewalls, Personal Firewalls defend a private network from the public internet. The key difference between these two is that Perimeter Firewalls are meant for businesses, organizations, and other large-scale networks, whereas Personal Firewalls are meant for a small network like someone’s home.

Sort Alphabetically
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.