Skip to content
SynAc
Discovery

Recently updated

Published entries ordered by most recent updates.

  1. Additional or alternative systems, sub systems, assets, or processes that maintain a degree of overall functionality in case of loss or failure of another system, sub system, asset, or process.

  2. A colloquial term for penetration test or penetration testing.

  3. A list of entities that are blocked or denied privileges or access.

  4. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.

  5. A document that sets forth procedures for the continued performance of core capabilities and critical operations during any disruption or potential disruption.

  6. A technique to breach the security of a network or information system in violation of security policy.

  7. In the NICE Framework, cybersecurity work where a person: Oversees the information assurance program of an information system in or outside the network environment; may include procurement duties (e.g., Information Systems Security Office

  8. ACRONYMSoC

    an intelligence hub for the company, gathering data from across the organization's networks, servers, endpoints and other digital assets and using intelligent automation to identify, prioritize and respond to potential cybersecurity threats

  9. A backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application

  10. an individual who participates in cyberwarfare, motivated either by personal, patriotic, or religious reasons, but not due to professional requirement

  11. a category of malware designed to suspend operations within a target through the compromise of the availability, integrity, and confidentiality of the systems, networks, and data

  12. An electronic information and communications systems and services and the information contained therein.

  13. ACRONYMIoC

    clues and evidence of a data breach

  14. An information system used to control industrial processes such as manufacturing, product handling, production, and distribution or to control infrastructure assets.

  15. To revoke the authentication of; to cause no longer to be authenticated.

  16. ACRONYMGeoIP

    a technique allowing to locate a web user based on their IP address

  17. a high speed, low latency interconnect standard used in high performance computing (HPC), supercomputers, and AI data centers

  18. The automated, on the fly changes of an information system's characteristics to thwart actions of an adversary.

  19. Blockchain is a decentralized ledger that records and verifies transactions across a network of computers. It's a database that stores data in blocks that are linked together in a chain.

  20. ACRONYMDevSecOps

    an approach to culture, automation, and platform design that integrates security as a shared responsibility throughout the entire IT lifecycle

  21. an attack is a method that uses trial and error to crack passwords, login credentials, and encryption keys

  22. Program code intended to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or availability of an information system.

  23. An evaluation methodology whereby assessors search for vulnerabilities and attempt to circumvent the security features of a network and/or information system.

  24. Neuromorphic computing is a method of computing that uses artificial neurons to mimic the human brain's structure and function. The word "neuromorphic" means "characteristic of the shape of the brain or neurons"

  25. obtain (information or input into a particular task or project) by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.

  26. a form of testing that is performed with no knowledge of a target system's internals

  27. A discussion based exercise where personnel meet in a classroom setting or breakout groups and are presented with a scenario to validate the content of plans, procedures, policies, cooperative agreements or other information for managing an incident.

  28. the spectrum of possible cybersecurity threats

  29. A NICE Framework category consisting of specialty areas responsible for specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence.

  30. is malware that encrypts data on the targets device and demands a ransom to restore it

  31. the practice of monitoring computer networks and systems for threats, while surveillance is the act of observing them. In the context of cybersecurity, "surveillance" refers to the continuous monitoring of a network to detect and respond to cyberattacks

  32. to provide someone, such as an employee, with more advanced skills through additional education and training

  33. An actual assault perpetrated by an intentional threat source that attempts to learn or make use of information from a system, but does not attempt to alter the system, its resources, its data, or its operations.

  34. To convert into a Trojan

  35. A cryptographic key that is used for both encryption and decryption, enabling the operation of a symmetric key cryptography scheme.

  36. ACRONYMEoL

    that the app has reached the end of its useful life. It may mean that a new version is available that supersedes the existing product or that the product is no longer supported.

  37. the process where hackers familiarize themselves with their targets in order to obtain credentials based on their activity

  38. A bootkit is a type of malware that infects a computer's boot process, giving the attacker control over the system. Bootkits are a major security threat because they can bypass standard security measures and remain hidden.

  39. monitoring other competitor organizations and nations to gather information

  40. an anonymous proxy is a tool that attempts to make activity on the Internet untraceable

  41. ACRONYMLangSec

    a design and programming philosophy that focuses on formally correct and verifiable input handling throughout all phases of the software development lifecycle

  42. Doxxing can be illegal, but its legality depends on the specific circumstances, such as the intent behind it and the jurisdiction. While doxxing itself isn't always explicitly illegal everywhere, it often falls under existing laws like those against harassment, stalking, and incitement to violence, and new anti doxxing laws are being enacted in various places. The act is often considered a crime when it involves sharing personal information with the intent to cause harm, threats, or incite illegal actions.

  43. Repositories that contain cryptographic artifacts like certificates and private keys that are used for cryptographic protocols such as TLS

  44. TERMAppSec

    the process of finding, fixing, and preventing security vulnerabilities at the application level, as part of the software development processes

  45. a network set up with intentional vulnerabilities hosted on a decoy server to attract hackers

  46. to develop an exploit against a vulnerability into an attack tool that can be deployed against a target

  47. is data that looks attractive to cyber criminals but is actually false or of no value

  48. The ability of two or more systems or components to exchange information and to use the information that has been exchanged.

  49. An exchange of data, information, and/or knowledge to manage risks or respond to incidents.

  50. A structured approach to managing risks to data and information by which an organization selects and applies appropriate security controls in compliance with policy and commensurate with the sensitivity and value of the data.