Skip to content
SynAc
Discovery

Recently updated

Published entries ordered by most recent updates.

  1. redundancyJan 06, 2026

    Additional or alternative systems, sub systems, assets, or processes that maintain a degree of overall functionality in case of loss or failure of another system, sub system, asset, or process.

  2. pen testJan 06, 2026

    A colloquial term for penetration test or penetration testing.

  3. blocklistJan 06, 2026

    A list of entities that are blocked or denied privileges or access.

  4. cybersecurityJan 06, 2026

    The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.

  5. A document that sets forth procedures for the continued performance of core capabilities and critical operations during any disruption or potential disruption.

  6. exploitJan 06, 2026

    A technique to breach the security of a network or information system in violation of security policy.

  7. In the NICE Framework, cybersecurity work where a person: Oversees the information assurance program of an information system in or outside the network environment; may include procurement duties (e.g., Information Systems Security Office

  8. SoCJan 06, 2026

    an intelligence hub for the company, gathering data from across the organization's networks, servers, endpoints and other digital assets and using intelligent automation to identify, prioritize and respond to potential cybersecurity threats

  9. BackdoorJan 06, 2026

    A backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application

  10. CyberWarriorJan 06, 2026

    an individual who participates in cyberwarfare, motivated either by personal, patriotic, or religious reasons, but not due to professional requirement

  11. disruptionwareJan 06, 2026

    a category of malware designed to suspend operations within a target through the compromise of the availability, integrity, and confidentiality of the systems, networks, and data

  12. An electronic information and communications systems and services and the information contained therein.

  13. IoCJan 06, 2026

    clues and evidence of a data breach

  14. An information system used to control industrial processes such as manufacturing, product handling, production, and distribution or to control infrastructure assets.

  15. deauthenticationJan 06, 2026

    To revoke the authentication of; to cause no longer to be authenticated.

  16. GeoIPJan 06, 2026

    a technique allowing to locate a web user based on their IP address

  17. InfiniBandJan 06, 2026

    a high speed, low latency interconnect standard used in high performance computing (HPC), supercomputers, and AI data centers

  18. The automated, on the fly changes of an information system's characteristics to thwart actions of an adversary.

  19. BlockchainJan 06, 2026

    Blockchain is a decentralized ledger that records and verifies transactions across a network of computers. It's a database that stores data in blocks that are linked together in a chain.

  20. DevSecOpsJan 06, 2026

    an approach to culture, automation, and platform design that integrates security as a shared responsibility throughout the entire IT lifecycle

  21. bruteforceJan 06, 2026

    an attack is a method that uses trial and error to crack passwords, login credentials, and encryption keys

  22. malicious codeJan 06, 2026

    Program code intended to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or availability of an information system.

  23. An evaluation methodology whereby assessors search for vulnerabilities and attempt to circumvent the security features of a network and/or information system.

  24. NeuromorphicJan 06, 2026

    Neuromorphic computing is a method of computing that uses artificial neurons to mimic the human brain's structure and function. The word "neuromorphic" means "characteristic of the shape of the brain or neurons"

  25. CrowdsourcedJan 06, 2026

    obtain (information or input into a particular task or project) by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.

  26. blackboxJan 06, 2026

    a form of testing that is performed with no knowledge of a target system's internals

  27. tabletop exerciseJan 06, 2026

    A discussion based exercise where personnel meet in a classroom setting or breakout groups and are presented with a scenario to validate the content of plans, procedures, policies, cooperative agreements or other information for managing an incident.

  28. threatscapeJan 06, 2026

    the spectrum of possible cybersecurity threats

  29. collect & operateJan 06, 2026

    A NICE Framework category consisting of specialty areas responsible for specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence.

  30. cryptomalwareJan 06, 2026

    is malware that encrypts data on the targets device and demands a ransom to restore it

  31. SurveillingJan 06, 2026

    the practice of monitoring computer networks and systems for threats, while surveillance is the act of observing them. In the context of cybersecurity, "surveillance" refers to the continuous monitoring of a network to detect and respond to cyberattacks

  32. UpSkillJan 06, 2026

    to provide someone, such as an employee, with more advanced skills through additional education and training

  33. passive attackJan 06, 2026

    An actual assault perpetrated by an intentional threat source that attempts to learn or make use of information from a system, but does not attempt to alter the system, its resources, its data, or its operations.

  34. TrojanizeJan 06, 2026

    To convert into a Trojan

  35. secret keyJan 06, 2026

    A cryptographic key that is used for both encryption and decryption, enabling the operation of a symmetric key cryptography scheme.

  36. EoLJan 06, 2026

    that the app has reached the end of its useful life. It may mean that a new version is available that supersedes the existing product or that the product is no longer supported.

  37. SpideringJan 06, 2026

    the process where hackers familiarize themselves with their targets in order to obtain credentials based on their activity

  38. BootkitsJan 06, 2026

    A bootkit is a type of malware that infects a computer's boot process, giving the attacker control over the system. Bootkits are a major security threat because they can bypass standard security measures and remain hidden.

  39. CounterIntelJan 06, 2026

    monitoring other competitor organizations and nations to gather information

  40. anonymizersJan 06, 2026

    an anonymous proxy is a tool that attempts to make activity on the Internet untraceable

  41. LangSecJan 06, 2026

    a design and programming philosophy that focuses on formally correct and verifiable input handling throughout all phases of the software development lifecycle

  42. DoxxingJan 06, 2026

    Doxxing can be illegal, but its legality depends on the specific circumstances, such as the intent behind it and the jurisdiction. While doxxing itself isn't always explicitly illegal everywhere, it often falls under existing laws like those against harassment, stalking, and incitement to violence, and new anti doxxing laws are being enacted in various places. The act is often considered a crime when it involves sharing personal information with the intent to cause harm, threats, or incite illegal actions.

  43. KeystoresJan 06, 2026

    Repositories that contain cryptographic artifacts like certificates and private keys that are used for cryptographic protocols such as TLS

  44. AppSecJan 06, 2026

    the process of finding, fixing, and preventing security vulnerabilities at the application level, as part of the software development processes

  45. HoneynettingJan 06, 2026

    a network set up with intentional vulnerabilities hosted on a decoy server to attract hackers

  46. WeaponizeJan 06, 2026

    to develop an exploit against a vulnerability into an attack tool that can be deployed against a target

  47. HoneytokensJan 06, 2026

    is data that looks attractive to cyber criminals but is actually false or of no value

  48. interoperabilityJan 06, 2026

    The ability of two or more systems or components to exchange information and to use the information that has been exchanged.

  49. An exchange of data, information, and/or knowledge to manage risks or respond to incidents.

  50. A structured approach to managing risks to data and information by which an organization selects and applies appropriate security controls in compliance with policy and commensurate with the sensitivity and value of the data.