0 A B D E I R S T W Z
Ap As At

Application Control

A cybersecurity technology that prevents the installation and execution of unauthorized applications. See also AppLocker.

AppLocker

AppLocker is an application whitelisting technology introduced with Microsoft’s Windows 7 operating system. It allows restricting which programs users can execute based on the program’s path, publisher, or hash, and in an enterprise can be configured via Group Policy.

Assume Breach

A cybersecurity strategy based on the assumption that an organization is already breached or will be breached.

Attack Path

A visualization of the chain of vulnerabilities an attacker exploits to infiltrate an organization.

Attack Surface

The sum of an organization’s IT assets exposed to threat actors, whether knowingly or unknowingly, and that could offer entry into an organization.

Attack Vector

A method an attacker can use to gain unauthorized access to an IT infrastructure. Attack vectors are also known as threat vectors. Common attack vectors include compromised credentials, insider threats, and phishing.