A LAN is a group of electronic devices that are in the same physical location and are connected via a network.
A.K.A. “Doxware” is ransomware that threatens to release a victim’s sensitive data if the ransom is not paid by a certain deadline.
When a user within an organization is given the minimum access to files, applications, software, or systems they need to conduct their job.
A.K.A “Data Libraries” is a large collection of organizational data; usually in archives or repositories to keep safe from unauthorized access.
When a threat actor uses software already existing in the environment to carry out malicious activities without being detected by security solutions like antivirus.
Online storage services for confidential data. These file-storing and sharing services act as a “virtual locker”, giving them their name.
A single programming instruction that expands into a set of instructions to automate actions in your device, tools, or software in order to provide a certain output per user input. Macros are commonly found in office applications like Word and Excel.
Software that is built for the sole purpose of malicious intent, usually for destructive purposes or financial gain (ransomware).
A method of authentication that utilizes two or more factors of providing proof of identification and authorization.
A third-party organization that provides outsourced services, usually in IT, for organizations.
A third-party organization that provides outsourced services in security for organizations.
An endpoint firewall that enables you to have total control over all network traffic, using dynamic ACLs, all managed from a central location.
NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.
The ability to understand the inner workings of a system by observing only its external manifestations
The gathering, appraisal, and assessment of publicly accessible data to answer a particular inquiry related to intelligence.
The ability to manage users’ admin rights within your organization on a timed basis to mitigate risk by giving users the minimum access needed.
A third-party tool that stores, saves, and protects your confidential information like usernames, passwords, and credit card numbers.
Updates to systems, software, hardware, websites, etc. That, as the name implies, patch over known vulnerabilities before they can be exploited by threat actors.
A security application organizations implement to protect themselves from outside, internet threats. Firewalls act as a barrier of protection that holds a “wall” between the private and public networks.
Also referred to as rights and privileges, permissions are a set level of actions a user can take in their organization’s network. Permissions are usually established by a “higher-level” user with admin rights.
Like Perimeter Firewalls, Personal Firewalls defend a private network from the public internet. The key difference between these two is that Perimeter Firewalls are meant for businesses, organizations, and other large-scale networks, whereas Personal Firewalls are meant for a small network like someone’s home.