0 A B D E I R S T W Z

0-Day

This will be the main description for the zero day entry.

Application Control

A cybersecurity technology that prevents the installation and execution of unauthorized applications. See also AppLocker.

AppLocker

AppLocker is an application whitelisting technology introduced with Microsoft’s Windows 7 operating system. It allows restricting which programs users can execute based on the program’s path, publisher, or hash, and in an enterprise can be configured via Group Policy.

Assume Breach

A cybersecurity strategy based on the assumption that an organization is already breached or will be breached.

Attack Path

A visualization of the chain of vulnerabilities an attacker exploits to infiltrate an organization.

Attack Surface

The sum of an organization’s IT assets exposed to threat actors, whether knowingly or unknowingly, and that could offer entry into an organization.

Attack Vector

A method an attacker can use to gain unauthorized access to an IT infrastructure. Attack vectors are also known as threat vectors. Common attack vectors include compromised credentials, insider threats, and phishing.

Backdoor

An unauthorized way to access a computer system that bypasses the system’s security measures.

Backup

A copy of a system’s data. Having a backup means you can restore your data if it’s lost or stolen.  In the IT world, i is important to remember: 2=1 and 1=0.  This means that of you have two backups (one could be lost, damaged or compromised) and thus you really only have one backup.  […]

DDoS

A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers […]