Recently updated
Published entries ordered by most recent updates.
- supply chain risk managementJan 06, 2026
The process of identifying, analyzing, and assessing supply chain risk and accepting, avoiding, transferring or controlling it to an acceptable level considering associated costs and benefits of any actions taken.
- RaaSJan 06, 2026
a cybercrime business model in which ransomware developers sell ransomware code or malware to other hackers, called “affiliates,” who then use the code to initiate their own ransomware attacks.
- smishingJan 06, 2026
the fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information
- virusJan 06, 2026
A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.
- machine learning and evolutionJan 06, 2026
A field concerned with designing and developing artificial intelligence algorithms for automated knowledge discovery and innovation by information systems.
- cyberwarfareJan 06, 2026
typically defined as a set of actions by a nation or organization to attack countries or institutions' computer network systems with the intention of disrupting, damaging, or destroying infrastructure by computer viruses or denial of service attacks
- risk assessmentJan 06, 2026
The product or process which collects information and assigns values to risks for the purpose of informing priorities, developing or comparing courses of action, and informing decision making.
- vishingJan 06, 2026
a hacking technique of defrauding target's over the phone, enticing them to divulge sensitive information
- strategic planning and policy developmentJan 06, 2026
In the NICE Framework, cybersecurity work where a person: Applies knowledge of priorities to define an entity.
- cryptocurrrencyJan 06, 2026
a digital currency in which transactions are verified and records maintained by a decentralized system using cryptography, rather than by a centralized authority.
- data breachJan 06, 2026
The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.
- customer service and technical supportJan 06, 2026
In the NICE Framework, cybersecurity work where a person: Addresses problems, installs, configures, troubleshoots, and provides maintenance and training in response to customer requirements or inquiries (e.g., tiered level customer support).
- scarewareJan 06, 2026
a cyberattack tactic that scares people into visiting spoofed or infected websites or downloading malicious software (malware)
- IoAJan 06, 2026
a clue that a malicious entity has gained, or is attempting to gain, unauthorised access to the network or assets connected to the network
- Cybersecurity adjacentJan 06, 2026
a number of roles that have cybersecurity responsibilities which typically form only part of their overall responsibilities within an organization.
- precursorJan 06, 2026
An observable occurrence or sign that an attacker may be preparing to cause an incident.
- IDPSJan 06, 2026
Software that automates the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents and attempting to stop detected possible incidents
- bluesnarfingJan 06, 2026
a hacking technique in which a hacker accesses a wireless device through a Bluetooth connection
- education and trainingJan 06, 2026
In the NICE Framework, cybersecurity work where a person: Conducts training of personnel within pertinent subject domain; develop, plan, coordinate, deliver, and/or evaluate training courses, methods, and techniques as appropriate.
- eventJan 06, 2026
An observable occurrence in an information system or network.
- PIVJan 06, 2026
an identification card issued by a federal agency that contains a computer chip, which allows it to receive, store, recall, and send information in a secure method
- incidentJan 06, 2026
An occurrence that actually or potentially results in adverse consequences to (adverse effects on) (poses a threat to) an information system or the information that the system processes, stores, or transmits and that may require a response action to mitigate the consequences.
- DistrosJan 06, 2026
A Linux distribution is an operating system made from a software collection that includes the Linux kernel and often a package management system.
- SecOpsJan 06, 2026
a combination of the terms security and operations, is a methodology that IT managers implement to enhance the connection, collaboration and communication between IT security and IT operations teams
- attack patternJan 06, 2026
Similar cyber events or behaviors that may indicate an attack has occurred or is occurring, resulting in a security violation or a potential security violation.
- spoofingJan 06, 2026
Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
- PentesterJan 06, 2026
An information security expert who performs penetration tests
- SoDJan 06, 2026
an internal control designed to prevent error and fraud by ensuring that at least two individuals are responsible for the separate parts of any task.
- enterprise risk managementJan 06, 2026
A comprehensive approach to risk management that engages people, processes, and systems across an organization to improve the quality of decision making for managing risks that may hinder an organization’s ability to achieve its objectives.
- bluejackingJan 06, 2026
an attack in which someone sends unsolicited messages to a Bluetooth enabled device
- IoAsJan 06, 2026
refers to the series of behaviors that a cybercriminal exhibits prior to executing a cyberattack.
- IIoTJan 06, 2026
the collection of sensors, instruments and autonomous devices connected through the internet to industrial applications
- systems requirements planningJan 06, 2026
In the NICE Framework, cybersecurity work where a person: Consults with customers to gather and evaluate functional requirements and translates these requirements into technical solutions; provides guidance to customers about applicability of information systems to meet business needs.
- outside( r) threatJan 06, 2026
A person or group of persons external to an organization who are not authorized to access its assets and pose a potential risk to the organization and its assets.
- cyberespionageJan 06, 2026
or cyber spying, is a type of cyberattack in which an unauthorized user attempts to access sensitive or classified data or intellectual property (IP) for economic gain, competitive advantage or political reasons
- red team exerciseJan 06, 2026
An exercise, reflecting real world conditions, that is conducted as a simulated attempt by an adversary to attack or exploit vulnerabilities in an enterprise's information systems.
- DoxJan 06, 2026
search for and publish private or identifying information about (a particular individual) on the internet, typically with malicious intent.
- hazardJan 06, 2026
A natural or man made source or cause of harm or difficulty.
- red teamJan 06, 2026
A group authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s cybersecurity posture.
- PhaaSJan 06, 2026
A model where cybercriminals offer pre packaged phishing tools and resources, like malicious email templates, landing pages, and hosting, to others, effectively lowering the barrier to entry for launching phishing campaigns.
- traffic light protocolJan 06, 2026
A set of designations employing four colors (RED, AMBER, GREEN, and WHITE) used to ensure that sensitive information is shared with the correct audience.
- CryptominersJan 06, 2026
Cryptomining is an online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” cryptocurrencies.
- bugJan 06, 2026
An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.
- wardrivingJan 06, 2026
attackers searching for wireless networks with vulnerabilities while moving around an area in a moving vehicle
- advanced persistent threatJan 06, 2026
An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception).
- collection operationsJan 06, 2026
In the NICE Framework, cybersecurity work where a person: Executes collection using appropriate strategies and within the priorities established through the collection management process.
- protect & defendJan 06, 2026
A NICE Framework category consisting of specialty areas responsible for the identification, analysis, and mitigation of threats to internal IT systems or networks.
- ClientsideJan 06, 2026
refers to everything in a web application that is displayed or takes place on the client (end user device)
- intentJan 06, 2026
A state of mind or desire to achieve an objective.
- TrojanJan 06, 2026
a type of malware that conceals its true content to fool a user into thinking it's a harmless file