Skip to content
SynAc
Discovery

Recently updated

Published entries ordered by most recent updates.

  1. The process of identifying, analyzing, and assessing supply chain risk and accepting, avoiding, transferring or controlling it to an acceptable level considering associated costs and benefits of any actions taken.

  2. RaaSJan 06, 2026

    a cybercrime business model in which ransomware developers sell ransomware code or malware to other hackers, called “affiliates,” who then use the code to initiate their own ransomware attacks.

  3. smishingJan 06, 2026

    the fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information

  4. virusJan 06, 2026

    A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.

  5. A field concerned with designing and developing artificial intelligence algorithms for automated knowledge discovery and innovation by information systems.

  6. cyberwarfareJan 06, 2026

    typically defined as a set of actions by a nation or organization to attack countries or institutions' computer network systems with the intention of disrupting, damaging, or destroying infrastructure by computer viruses or denial of service attacks

  7. risk assessmentJan 06, 2026

    The product or process which collects information and assigns values to risks for the purpose of informing priorities, developing or comparing courses of action, and informing decision making.

  8. vishingJan 06, 2026

    a hacking technique of defrauding target's over the phone, enticing them to divulge sensitive information

  9. In the NICE Framework, cybersecurity work where a person: Applies knowledge of priorities to define an entity.

  10. cryptocurrrencyJan 06, 2026

    a digital currency in which transactions are verified and records maintained by a decentralized system using cryptography, rather than by a centralized authority.

  11. data breachJan 06, 2026

    The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.

  12. In the NICE Framework, cybersecurity work where a person: Addresses problems, installs, configures, troubleshoots, and provides maintenance and training in response to customer requirements or inquiries (e.g., tiered level customer support).

  13. scarewareJan 06, 2026

    a cyberattack tactic that scares people into visiting spoofed or infected websites or downloading malicious software (malware)

  14. IoAJan 06, 2026

    a clue that a malicious entity has gained, or is attempting to gain, unauthorised access to the network or assets connected to the network

  15. a number of roles that have cybersecurity responsibilities which typically form only part of their overall responsibilities within an organization.

  16. precursorJan 06, 2026

    An observable occurrence or sign that an attacker may be preparing to cause an incident.

  17. IDPSJan 06, 2026

    Software that automates the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents and attempting to stop detected possible incidents

  18. bluesnarfingJan 06, 2026

    a hacking technique in which a hacker accesses a wireless device through a Bluetooth connection

  19. In the NICE Framework, cybersecurity work where a person: Conducts training of personnel within pertinent subject domain; develop, plan, coordinate, deliver, and/or evaluate training courses, methods, and techniques as appropriate.

  20. eventJan 06, 2026

    An observable occurrence in an information system or network.

  21. PIVJan 06, 2026

    an identification card issued by a federal agency that contains a computer chip, which allows it to receive, store, recall, and send information in a secure method

  22. incidentJan 06, 2026

    An occurrence that actually or potentially results in adverse consequences to (adverse effects on) (poses a threat to) an information system or the information that the system processes, stores, or transmits and that may require a response action to mitigate the consequences.

  23. DistrosJan 06, 2026

    A Linux distribution is an operating system made from a software collection that includes the Linux kernel and often a package management system.

  24. SecOpsJan 06, 2026

    a combination of the terms security and operations, is a methodology that IT managers implement to enhance the connection, collaboration and communication between IT security and IT operations teams

  25. attack patternJan 06, 2026

    Similar cyber events or behaviors that may indicate an attack has occurred or is occurring, resulting in a security violation or a potential security violation.

  26. spoofingJan 06, 2026

    Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.

  27. PentesterJan 06, 2026

    An information security expert who performs penetration tests

  28. SoDJan 06, 2026

    an internal control designed to prevent error and fraud by ensuring that at least two individuals are responsible for the separate parts of any task.

  29. A comprehensive approach to risk management that engages people, processes, and systems across an organization to improve the quality of decision making for managing risks that may hinder an organization’s ability to achieve its objectives.

  30. bluejackingJan 06, 2026

    an attack in which someone sends unsolicited messages to a Bluetooth enabled device

  31. IoAsJan 06, 2026

    refers to the series of behaviors that a cybercriminal exhibits prior to executing a cyberattack.

  32. IIoTJan 06, 2026

    the collection of sensors, instruments and autonomous devices connected through the internet to industrial applications

  33. In the NICE Framework, cybersecurity work where a person: Consults with customers to gather and evaluate functional requirements and translates these requirements into technical solutions; provides guidance to customers about applicability of information systems to meet business needs.

  34. outside( r) threatJan 06, 2026

    A person or group of persons external to an organization who are not authorized to access its assets and pose a potential risk to the organization and its assets.

  35. cyberespionageJan 06, 2026

    or cyber spying, is a type of cyberattack in which an unauthorized user attempts to access sensitive or classified data or intellectual property (IP) for economic gain, competitive advantage or political reasons

  36. red team exerciseJan 06, 2026

    An exercise, reflecting real world conditions, that is conducted as a simulated attempt by an adversary to attack or exploit vulnerabilities in an enterprise's information systems.

  37. DoxJan 06, 2026

    search for and publish private or identifying information about (a particular individual) on the internet, typically with malicious intent.

  38. hazardJan 06, 2026

    A natural or man made source or cause of harm or difficulty.

  39. red teamJan 06, 2026

    A group authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s cybersecurity posture.

  40. PhaaSJan 06, 2026

    A model where cybercriminals offer pre packaged phishing tools and resources, like malicious email templates, landing pages, and hosting, to others, effectively lowering the barrier to entry for launching phishing campaigns.

  41. A set of designations employing four colors (RED, AMBER, GREEN, and WHITE) used to ensure that sensitive information is shared with the correct audience.

  42. CryptominersJan 06, 2026

    Cryptomining is an online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” cryptocurrencies.

  43. bugJan 06, 2026

    An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.

  44. wardrivingJan 06, 2026

    attackers searching for wireless networks with vulnerabilities while moving around an area in a moving vehicle

  45. An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception).

  46. In the NICE Framework, cybersecurity work where a person: Executes collection using appropriate strategies and within the priorities established through the collection management process.

  47. protect & defendJan 06, 2026

    A NICE Framework category consisting of specialty areas responsible for the identification, analysis, and mitigation of threats to internal IT systems or networks.

  48. ClientsideJan 06, 2026

    refers to everything in a web application that is displayed or takes place on the client (end user device)

  49. intentJan 06, 2026

    A state of mind or desire to achieve an objective.

  50. TrojanJan 06, 2026

    a type of malware that conceals its true content to fool a user into thinking it's a harmless file