Skip to content
SynAc
Discovery

Recently updated

Published entries ordered by most recent updates.

  1. DBaaSJan 06, 2026

    a cloud database offering that provides customers with access to a database without having to deploy and manage the underlying infrastructure

  2. In the NICE Framework, cybersecurity work where a person: Manages and administers processes and tools that enable the organization to identify, document, and access intellectual capital and information content.

  3. The methods and processes used to manage subjects and their authentication and authorizations to access specific objects.

  4. impersonizationJan 06, 2026

    An attack type targeted phishing attack where a malicious actor pretends to be someone else or other entities to steal sensitive data

  5. DevOpsJan 06, 2026

    the combination of cultural philosophies, practices, and tools that increases an organization's ability to deliver applications and services

  6. ENISAJan 06, 2026

    Established in 2004 and strengthened by the EU Cybersecurity Act, the European Union Agency for Cybersecurity contributes to EU cyber policy, enhances the trustworthiness of ICT products, services and processes with cybersecurity certification schemes, cooperates with Member States and EU bodies, and helps Europe prepare for the cyber challenges of tomorrow.

  7. preparednessJan 06, 2026

    The activities to build, sustain, and improve readiness capabilities to prevent, protect against, respond to, and recover from natural or manmade incidents.

  8. Any information technology, equipment, or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information.

  9. Comprehending information about the current and developing security posture and risks, based on information gathered, observation and analysis, and knowledge or experience.

  10. In the NICE Framework, cybersecurity work where a person: Develops and administers databases and/or data management systems that allow for the storage, query, and utilization of data.

  11. In the NICE Framework, cybersecurity work where a person: Develops and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs following software assurance best practices.

  12. weaknessJan 06, 2026

    A shortcoming or imperfection in software code, design, architecture, or deployment that, under proper conditions, could become a vulnerability or contribute to the introduction of vulnerabilities.

  13. BiosurveillanceJan 06, 2026

    A systematic process of gathering near real time biological information to detect, monitor, and characterize threats to human, animal, plant, and environmental health, enabling early warning and identification of potential outbreaks.

  14. The use of information technology in place of manual processes for cyber incident response and management.

  15. incident responseJan 06, 2026

    The activities that address the short term, direct effects of an incident and may also support short term recovery.

  16. botnetJan 06, 2026

    A collection of computers compromised by malicious code and controlled across a network.

  17. HoneyportJan 06, 2026

    a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information

  18. OAuthJan 06, 2026

    an open standard authorization protocol or framework that provides applications the ability for secure designated access

  19. threat agentJan 06, 2026

    An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.

  20. antiforensicJan 06, 2026

    a set of techniques used to conceal or destroy evidence to frustrate or deceive digital forensic investigations

  21. attack surfaceJan 06, 2026

    The set of ways in which an adversary can enter a system and potentially cause damage.

  22. A NICE Framework category consisting of specialty areas providing leadership, management, direction, and/or development and advocacy so that all individuals and the organization may effectively conduct cybersecurity work.

  23. eCrimeJan 06, 2026

    criminal activity that involves the use of computers or networks such as the internet

  24. FuzzerJan 06, 2026

    an automated software testing method that injects invalid, malformed, or unexpected inputs into a system to reveal software defects and vulnerabilities

  25. The systems and assets, whether physical or virtual, so vital to society that the incapacity or destruction of such may have a debilitating impact on the security, economy, public health or safety, environment, or any combination of these matters.

  26. malicious appletJan 06, 2026

    A small application program that is automatically downloaded and executed and that performs an unauthorized function on an information system.

  27. FaaSJan 06, 2026

    a cloud computing service that allows customers to execute code in response to events, without managing the complex infrastructure

  28. Counter-BiometricsJan 06, 2026

    refers to the methods used to bypass or spoof biometric security systems

  29. A branch of cryptography in which a cryptographic system or algorithms use two uniquely linked keys: a public key and a private key (a key pair).

  30. bot masterJan 06, 2026

    The controller of a botnet that, from a remote location, provides direction to the compromised computers in the botnet.

  31. knowing what security threats are and acting responsibly to avoid potential risks.

  32. An aggregate of directives, regulations, rules, and practices that prescribe how an organization manages, protects, and distributes information.

  33. A generic name for a computerized system that is capable of gathering and processing data and applying operational controls to geographically dispersed assets over long distances.

  34. antivirus softwareJan 06, 2026

    A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents. Sometimes by removing or neutralizing the malicious code.

  35. In the NICE Framework, cybersecurity work where a person: Develops and conducts tests of systems to evaluate compliance with specifications and requirements by applying principles and methods for cost effective planning, evaluating, verifying, and validating of technical, functional, and performance characteristics (including interoperability) of systems or elements of systems incorporating information technology.

  36. TimestompingJan 06, 2026

    a technique used in cybersecurity and digital forensics, where attackers modify the timestamps of files and directories on a computer system to hide their actions or impede investigations

  37. RemotingJan 06, 2026

    A technology that allows a program to interact with the internals of another program running on a different machine

  38. cyber exerciseJan 06, 2026

    A planned event during which an organization simulates a cyber disruption to develop or test capabilities such as preventing, detecting, mitigating, responding to or recovering from the disruption.

  39. CyberattackJan 06, 2026

    a malicious and deliberate attempt to breach the information system

  40. build security inJan 06, 2026

    A set of principles, practices, and tools to design, develop, and evolve information systems and software that enhance resistance to vulnerabilities, flaws, and attacks.

  41. digital forensicsJan 06, 2026

    The processes and specialized techniques for gathering, retaining, and analyzing system related data (digital evidence) for investigative purposes.

  42. in the NICE Framework, cybersecurity work where a person: Performs in depth joint targeting and cyber planning process. Gathers information and develops detailed Operational Plans and Orders supporting requirements. Conducts strategic and operational level planning across the full range of operations for integrated information and cyberspace operations.

  43. system integrityJan 06, 2026

    The attribute of an information system when it performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

  44. behaviourJan 06, 2026

    the extent to which an individual practices several types of cybersecurity measures to avoid or attenuate the types of cyber threats that they are vulnerable to

  45. spywareJan 06, 2026

    Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.

  46. work factorJan 06, 2026

    An estimate of the effort or time needed by a potential adversary, with specified expertise and resources, to overcome a protective measure.

  47. resilienceJan 06, 2026

    The ability to adapt to changing conditions and prepare for, withstand, and rapidly recover from disruption.

  48. BiohackingJan 06, 2026

    making small, strategic changes to habits and behaviors to improve things like cognitive function and weight management.

  49. DPIAJan 06, 2026

    A Data Protection Impact Assessment (DPIA) describes a process designed to identify risks arising out of the processing of personal data and to minimize these risks as far and as early as possible

  50. IDaaSJan 06, 2026

    a cloud based identity and access management (IAM) offered by a third party provider