-
FIND ALL YOUR CYBER SECURITY ANSWERS ON OUR WIKI PAGE
The Cert2Connect wiki for a clear overview of terminology and the many abbreviations in the cyber, cloud and software security landscape.
Cynet
-
BEC or CEO fraud
Read moreBEC or CEO fraud is a form of cybercrime in which fraudulent emails are sent to employees of a company, where the sender poses as the CEO or other senior executive of the company. These emails often contain a request to transfer money to a specific bank account or to provide confidential information. This type of fraud can lead to financial losses for the company and the leakage of confidential information. To protect against BEC or CEO fraud, it is important to train employees to be critical of suspicious emails and to verify that a request for money transfer or information is actually from the manager from the company.
-
BlueTeam
Read moreA group of individuals who conduct information systems analysis to ensure security, identify security flaws, verify the effectiveness of each security measure, and ensure that all security measures remain effective once implemented. The Blue Team is also seen as the defending team.
-
Computer Emergency Response Team (CERT)
Read moreA Computer Emergency Response Team (CERT) is an organization or group responsible for responding to and coordinating cybersecurity incidents, providing security advice, and helping systems recover from a cyberattack. They work with government agencies, businesses and other organizations to ensure a rapid and effective response to cyber threats and incidents.
-
Computer Misuse Detection System (CMDS)
Read moreA "Computer Misuse Detection System" (CMDS) is a system designed to detect and prevent suspicious or malicious activity on computer systems and networks. It can use various techniques and methods to detect and signal potential intrusion attempts, malware attacks and other forms of cyber abuse to administrators or security teams so that appropriate measures can be taken to protect the systems.
-
Continuous Security Validation (CSV)
Read more"Continuous Security Validation" (CSV) refers to an approach in which a system's or organization's security measures and controls are continuously tested and evaluated to ensure consistent and effective protection.
Continuous security validation uses automated tools and techniques to regularly monitor and assess the security status of systems, networks, and applications. This includes simulating attacks, testing security measures and identifying potential weaknesses. By validating continuously, organizations can quickly respond to new threats, vulnerabilities and changes in IT infrastructure to ensure that security is maintained at all times.
-
DLP
Read moreDLP stands for "Data Loss Prevention". DLP refers to a set of technologies and processes used to prevent sensitive information from being accidentally or intentionally leaked, stolen or damaged. This may include personal data, financial information, trade secrets and intellectual property. By implementing DLP measures, organizations can protect their data and reduce the risks of security breaches.
-
DoS, DDoS
Read moreDoS (Denial of Service) and DDoS (Distributed Denial of Service) refer to a form of cyber attack in which the attacker attempts to overload a server or network with traffic, rendering the system unable to process legitimate requests and provide services. is interrupted.
-
Dynamic Behavioral Analysis
Read moreDynamic Behavioral Analysis is a method used to analyze the behavior of software programs and files to identify and block any threats. It is commonly used by security professionals to detect and prevent cyber-attacks.
-
EmailGateway
Read moreAn "Email Gateway" is a technology solution used to manage, filter and secure emails flowing in and out of an organization. It is a type of security and management platform designed to monitor and control email traffic, both to block unwanted content (such as spam and malicious attachments) and to ensure the security of the email communication.
-
Endpoint Detection and Response (EDR)
Read moreEndpoint Detection and Response (EDR) refers to an approach to security that continuously monitors, detects, and analyzes the activities and events on endpoints, such as individual computers, laptops, servers, and mobile devices, to identify and respond to potential security threats.
-
Endpoint Security
Read moreEndpoint Security refers to protecting individual devices (endpoints) such as computers, laptops, mobile devices, and servers against a wide variety of security risks and threats. The goal of endpoint security is to protect these devices against potential attacks, data leaks, malware infections and other forms of cyber threats.
-
General Data Protection Regulation (GDPR)
Read moreThe General Data Protection Regulation (GDPR) is an European privacy law that came into effect on May 25, 2018. The GDPR is designed to give individuals more control over their personal data and to regulate and harmonize the way organizations process and protect personal data.
-
Immediate Threat Intelligence (ITI)
Read more"Immediate Threat Intelligence" (ITI) refers to real-time information and data that identifies and reports immediate threats, attacks or risks. It is a type of cyber threat intelligence (CTI) that focuses on detecting and responding to current and immediate cyber threats.
-
Malware
Read moreMalware is short for "malicious software" and is also referred to as "malicious software". It is software designed to harm computer systems, networks or mobile devices and can take various forms, such as viruses, trojans, spyware, ransomware and adware.
-
Managed Detection and Response (MDR)
Read moreManaged Detection and Response (MDR) is a comprehensive cybersecurity service provided by specialist security companies. It focuses on detecting, investigating and responding to advanced cyberthreats and attacks within an organization. MDR goes beyond traditional security solutions by providing active monitoring, analytics and incident response to quickly and effectively respond to threats that might otherwise go undetected.
-
PII
Read morePII stands for "Personally Identifiable Information" and can be translated as "Personally Identifiable Data".
-
Purple Team
Read moreThe Purple Team is a term often used in the cybersecurity world to describe a team that represents both attackers and defenders. The team consists of red team members, who try to penetrate an organization's systems, and blue team members, who try to detect and prevent the attack.
-
Ransomware
Read moreRansomware is a type of malicious software (malware) that encrypts files on a computer and then demands a ransom from the owner of the computer to unlock the files. This type of malware can be spread through email attachments, hacked websites, infected software or USB sticks.
Ransomware can wreak havoc, especially if it spreads within a network. It can lead to data loss, business process disruption and financial loss. It is therefore important to regularly back up important files and keep up with software updates
-
Secure Email Gateways (SEGs)
Read moreSecure Email Gateways (SEGs) are secure email gateways used to scan incoming and outgoing emails for potential threats and ensure secure communications between email users. They are commonly used by organizations to protect their emails from spam, phishing attacks, malware and other forms of cyber threats.
-
Security Posture Management
Read more"Security Posture Management" refers to the process of assessing, analyzing and managing an organization's overall security posture and controls. This includes identifying vulnerabilities, evaluating security controls and policies, and taking steps to improve and maintain overall security. The goal of security posture management is to increase an organization's resilience to cyberthreats and maintain a strong security posture.
-
SIEM/SOAR processes
Read moreSIEM stands for Security Information and Event Management, while SOAR stands for Security Orchestration, Automation, and Response. Both processes play an important role in the security of IT systems and networks.
-
Sigma Rules
Read moreSigma is an open standard for defining detection rules for security information and event management (SIEM) and security analytics software. Sigma's goal is to provide a common language and syntax that allows security professionals to write detection rules that can be used across different SIEM systems and security tools.
Sigma rules describe patterns and conditions that can indicate potential security threats, such as attacks, intrusion attempts, malware infections, and other malicious activities. These rules are written in human-readable text format and can be interpreted by SIEM systems and other security tools that support Sigma.
-
SOC
Read moreA Security Operating Center (SOC) is a central location where security activities and procedures are monitored and controlled to protect an organization's IT infrastructure and data from potential threats. The SOC team works closely with the IT department and other stakeholders to ensure and improve the security of the organization.
-
Trojans
Read moreA trojan is a type of malware that hides in an innocent program or file. If you open such a program or file, the trojan can cause damage to your computer. For example, a trojan can steal, delete or change data, take over your computer or install other malware. A trojan is not a virus, because a trojan cannot spread itself to other computers. A trojan is often used to create a backdoor in your security, making it easier for hackers to gain access to your system.
-
Vulnerability management
Read moreVulnerability management is the process of identifying, analyzing and remediating vulnerabilities in systems, networks and applications. The goal of vulnerability management is to improve the security and resilience of the organization by reducing the risk of cyber-attacks. Vulnerability management includes regularly scanning the IT environment, prioritizing the vulnerabilities found based on their severity and impact, and implementing appropriate measures to fix or mitigate them.
-
Web Application Firewall (WAF)
Read moreA web application firewall (WAF) is a security solution used to protect web applications against various types of attacks, such as SQL injections, cross-site scripting (XSS), and other exploits that can compromise the application.
-
Worms
Read moreThis refers to a type of malicious software that can spread itself over a computer network without human intervention. A computer worm can replicate itself and move to other computers on the same network, posing a threat to the security and integrity of data on those computers.
-
Zero Day
Read moreZero day in the context of cybersecurity refers to the fact that there is no delay between the discovery of a vulnerability and its exploitation by malicious parties. This gives attackers a temporary advantage as defenders have not had time to prepare or protect against the attack. It is a term that emphasizes the acute threat and urgency of such attacks.