Recently updated
Published entries ordered by most recent updates.
- integrated risk managementJan 06, 2026
The structured approach that enables an enterprise or organization to share risk information and risk analysis and to synchronize independent yet complementary risk management strategies to unify efforts across the enterprise.
- moving target defenseJan 06, 2026
The presentation of a dynamic attack surface, increasing an adversary's work factor necessary to probe, attack, or maintain presence in a cyber target.
- computer network defense analysisJan 06, 2026
In the NICE Framework, cybersecurity work where a person: Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network in order to protect information, information systems, and networks from threats.
- security program managementJan 06, 2026
In the NICE Framework, cybersecurity work where a person: Manages information security (e.g., information security) implications within the organization, specific program, or other area of responsibility, to include strategic, personnel, infrastructure, policy enforcement, emergency planning, security awareness, and other resources (e.g., the role of a Chief Information Security Officer).
- cloud computingJan 06, 2026
A model for enabling on demand network access to a shared pool of configurable computing capabilities or resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
- hashingJan 06, 2026
A process of applying a mathematical algorithm against a set of data to produce a numeric value (a 'hash value') that represents the data.
- MetaverseJan 06, 2026
A shared, immersive, persistent, 3D virtual space where humans experience life in ways they could not in the physical world
- data miningJan 06, 2026
The process or techniques used to analyze large sets of existing information to discover previously unrevealed patterns or correlations.
- ProxyjackingJan 06, 2026
a malicious technique where an attacker gains control over a target's proxy server, allowing them to intercept and manipulate the targets internet traffic
- consequenceJan 06, 2026
The effect of an event, incident, or occurrence.
- mitigationJan 06, 2026
The application of one or more measures to reduce the likelihood of an unwanted occurrence and/or lessen its consequences.
- capabilityJan 06, 2026
The means to accomplish a mission, function, or objective.
- attack signatureJan 06, 2026
A characteristic or distinctive pattern that can be searched for or that can be used in matching to previously identified attacks.
- threatJan 06, 2026
A circumstance or event that has or indicates the potential to exploit vulnerabilities and to adversely impact (create adverse consequences for) organizational operations, organizational assets (including information and information systems), individuals, other organizations, or society.
- public key infrastructureJan 06, 2026
A framework consisting of standards and services to enable secure, encrypted communication and authentication over potentially insecure networks such as the Internet.
- SIEMJan 06, 2026
a security solution that helps organizations detect threats before they disrupt business
- PaaSJan 06, 2026
a cloud computing model where a third party provider delivers hardware and software tools to users over the internet
- analyzeJan 06, 2026
A NICE Framework category consisting of specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.
- DorkingJan 06, 2026
Using search techniques to hack into vulnerable sites or search for information that is not available in public search results.
- private keyJan 06, 2026
A cryptographic key that must be kept confidential and is used to enable the operation of an asymmetric (public key) cryptographic algorithm.
- allowlistJan 06, 2026
A list of entities that are considered trustworthy and are granted access or privileges.
- wormJan 06, 2026
A self replicating, self propagating, self contained program that uses networking mechanisms to spread itself.
- de-perimeterizationJan 06, 2026
an information security strategy to strengthens an organization's security posture by implementing multiple levels of protection, including inherently secure computer systems and protocols, high level encryption, and authentication
- signatureJan 06, 2026
A recognizable, distinguishing pattern.
- computer network defense infrastructure supportJan 06, 2026
In the NICE Framework, cybersecurity work where a person: Tests, implements, deploys, maintains, reviews, and administers the infrastructure hardware and software that are required to effectively manage the computer network defense service provider network and resources; monitors network to actively remediate unauthorized activities.
- whiteboxJan 06, 2026
a form of testing that is performed with knowledge of a target system's internals
- investigationJan 06, 2026
A systematic and formal inquiry into a qualified threat or incident using digital forensics and perhaps other traditional criminal inquiry techniques to determine the events that transpired and to collect evidence.
- WeaponeeringJan 06, 2026
a term borrowed from military doctrine that refers to the process of analyzing target vulnerabilities and matching them with specific cyber capabilities (weapons) to achieve a desired effect or objective
- investigateJan 06, 2026
a NICE Framework category consisting of specialty areas responsible for the investigation of cyber events and/or crimes of IT systems, networks, and digital evidence
- blue TeamJan 06, 2026
A group that defends an enterprise's information systems when mock attackers (i.e., the Red Team) attack, typically as part of an operational exercise conducted according to rules established and monitored by a neutral group (i.e., the White Team).
- data lossJan 06, 2026
The result of unintentionally or accidentally deleting data, forgetting where it is stored, or exposure to an unauthorized party.
- CatphishJan 06, 2026
the fabrication of a false online identity by a cybercriminal for the purposes of deception, fraud, or exploitation
- IaCJan 06, 2026
The process of managing and provisioning an organization’s IT infrastructure using machine readable configuration files, rather than employing physical hardware configuration or interactive configuration tools.
- Cyber-biosecurityJan 06, 2026
an emerging field that addresses the intersection of cybersecurity and biosecurity, focusing on protecting biological data, processes, and systems from cyber threats and malicious activities
- incident managementJan 06, 2026
The management and coordination of activities associated with an actual or potential occurrence of an event that may result in adverse consequences to information or information systems.
- DecryptorJan 06, 2026
A tool, or set of tools, used to decrypt encrypted files. Either for recovery or anti ransomware purposes.
- exploitation analysisJan 06, 2026
In the NICE Framework, cybersecurity work where a person: Analyzes collected information to identify vulnerabilities and potential for exploitation.
- responseJan 06, 2026
The activities that address the short term, direct effects of an incident and may also support short term recovery.
- digital rights managementJan 06, 2026
A form of access control technology to protect and manage use of digital content or devices in accordance with the content or device provider's intentions.
- technology research and developmentJan 06, 2026
In the NICE Framework, cybersecurity work where a person: Conducts technology assessment and integration processes; provides and supports a prototype capability and/or evaluates its utility.
- all source intelligenceJan 06, 2026
In the NICE Framework, cybersecurity work where a person: Analyzes threat information from multiple sources, disciplines, and agencies across the Intelligence Community. Synthesizes and places intelligence information in context; draws insights about the possible implications.
- FootprintingJan 06, 2026
an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, an infrastructure and networks to identify opportunities to penetrate them
- risk analysisJan 06, 2026
The systematic examination of the components and characteristics of risk.
- NCCoEJan 06, 2026
A NIST public private partnership that enables the creation of practical cybersecurity solutions for specific industries or broad, cross sector technology challenges
- passwordlessJan 06, 2026
an authentication method in which a user can log in to a computer system without the entering a password or any other knowledge based secret
- IPSecJan 06, 2026
a set of communication rules or protocols for setting up secure connections over a network
The information that permits the identity of an individual to be directly or indirectly inferred.
- incident response planJan 06, 2026
A set of predetermined and documented procedures to detect and respond to a cyber incident.
- FedRAMP-compliantJan 06, 2026
a government wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services
- VirtualizationJan 06, 2026
creating virtual representations of servers, storage, networks, and other physical machines