-
FIND ALL YOUR CYBER SECURITY ANSWERS ON OUR WIKI PAGE
The Cert2Connect wiki for a clear overview of terminology and the many abbreviations in the cyber, cloud and software security landscape.
Reflectiz
-
Application Security
Read moreApplication security is the practice of protecting computer applications from external security threats by using software, hardware, techniques, best practices and procedures. Application security encompasses the security considerations that take place during application development and design, as well as the systems and approaches to protect applications after they are deployed.
-
Attack Based Vulnerability Management (ABVM)
Read more"Attack Based Vulnerability Management" refers to an approach to vulnerability management that focuses on identifying, assessing, and prioritizing vulnerabilities based on their potential impact on potential attacks.
-
Attack Surface Management
Read more"Attack Surface Management" refers to the process of identifying, evaluating and mitigating the potential vulnerabilities and exposed entry points that an attacker can use to compromise a system, application or network.
In other words, attack surface management involves mapping out all the possible ways an attacker could try to gain access to an organization's systems and data. This can range from unused services and open ports on network devices to security weaknesses in applications and outdated software.
-
Compliance
Read moreCompliance is a term used to describe how well an organization complies with the laws and regulations that apply to it. Compliance means that an organization is aware of the risks it runs if it does not comply with the rules, and that it takes measures to limit or prevent those risks. Compliance helps an organization to protect its reputation, customer satisfaction and financial results.
-
Computer Emergency Response Team (CERT)
Read moreA Computer Emergency Response Team (CERT) is an organization or group responsible for responding to and coordinating cybersecurity incidents, providing security advice, and helping systems recover from a cyberattack. They work with government agencies, businesses and other organizations to ensure a rapid and effective response to cyber threats and incidents.
-
Computer Misuse Detection System (CMDS)
Read moreA "Computer Misuse Detection System" (CMDS) is a system designed to detect and prevent suspicious or malicious activity on computer systems and networks. It can use various techniques and methods to detect and signal potential intrusion attempts, malware attacks and other forms of cyber abuse to administrators or security teams so that appropriate measures can be taken to protect the systems.
-
Continuous Security Validation (CSV)
Read more"Continuous Security Validation" (CSV) refers to an approach in which a system's or organization's security measures and controls are continuously tested and evaluated to ensure consistent and effective protection.
Continuous security validation uses automated tools and techniques to regularly monitor and assess the security status of systems, networks, and applications. This includes simulating attacks, testing security measures and identifying potential weaknesses. By validating continuously, organizations can quickly respond to new threats, vulnerabilities and changes in IT infrastructure to ensure that security is maintained at all times.
-
DEVOPS
Read moreDEVOPS is a method in the software development and IT industry. It is a combination of development (Dev) and operations (Ops) that automates and integrates the processes between software developers and IT teams. The goal of DEVOPS is to increase the speed and quality of software delivery.
DEVOPS promotes collaboration, transparency, and continuous improvement among all roles involved in the software development lifecycle (SDLC).
-
DevSecOps
Read moreDevSecOps is a development approach that integrates security ("Sec" for "Security") into the entire software development process ("Dev" for "Development") using operational ("Ops") principles.
-
General Data Protection Regulation (GDPR)
Read moreThe General Data Protection Regulation (GDPR) is an European privacy law that came into effect on May 25, 2018. The GDPR is designed to give individuals more control over their personal data and to regulate and harmonize the way organizations process and protect personal data.
-
Magecart
Read moreMagecart is a form of cybercrime in which hackers steal credit card information from unsuspecting victims by injecting malicious code into third-party websites. This process is known as "web-skimming" or "formjacking".
-
Malware
Read moreMalware is short for "malicious software" and is also referred to as "malicious software". It is software designed to harm computer systems, networks or mobile devices and can take various forms, such as viruses, trojans, spyware, ransomware and adware.
-
SBOM
Read moreSBOM - Software Bill of Materials is a structured list of components used in building a piece of software. Just as a manufacturing bill of material lists all the parts and materials needed to make a product, an SBOM provides a comprehensive overview of all software components that make up a software application.
-
Security Posture Management
Read more"Security Posture Management" refers to the process of assessing, analyzing and managing an organization's overall security posture and controls. This includes identifying vulnerabilities, evaluating security controls and policies, and taking steps to improve and maintain overall security. The goal of security posture management is to increase an organization's resilience to cyberthreats and maintain a strong security posture.
-
Third party risks
Read moreThird party risks refer to the risks that arise when an organization engages a third party to perform certain tasks or provide services. These risks can relate to various areas, including legal issues, financial risks, reputational risks and operational risks.
-
TPRM
Read moreTPRM stands for Third Party Risk Management. This is a process by which organizations identify, assess and manage the risks associated with outsourcing activities or services to external parties.
TPRM helps organizations ensure the quality, compliance and performance of their suppliers and avoid potential reputational damage, financial loss or legal disputes.
-
Trojans
Read moreA trojan is a type of malware that hides in an innocent program or file. If you open such a program or file, the trojan can cause damage to your computer. For example, a trojan can steal, delete or change data, take over your computer or install other malware. A trojan is not a virus, because a trojan cannot spread itself to other computers. A trojan is often used to create a backdoor in your security, making it easier for hackers to gain access to your system.
-
Vulnerability management
Read moreVulnerability management is the process of identifying, analyzing and remediating vulnerabilities in systems, networks and applications. The goal of vulnerability management is to improve the security and resilience of the organization by reducing the risk of cyber-attacks. Vulnerability management includes regularly scanning the IT environment, prioritizing the vulnerabilities found based on their severity and impact, and implementing appropriate measures to fix or mitigate them.
-
WannaCry
Read moreWannaCry is a type of ransomware malware that infected more than 200,000 computers in 150 countries in May 2017. The malware used a vulnerability in the Microsoft Windows operating system to spread rapidly and encrypt files on the infected computers, making them inaccessible to their users. The attackers demanded payment in Bitcoin in exchange for the decryption key to unlock the files. The attack caused significant disruption to businesses, hospitals and government agencies around the world. It is believed to have been created by North Korean hackers.
-
Web skimming
Read moreWeb skimming, also known as "Magecart attacks", refers to a form of cyber attack in which attackers inject malicious code into e-commerce websites to steal customer payment information. These attacks target online shopping carts and payment pages of websites to pass sensitive information, such as credit card information, to the attackers.
-
“Watering Hole” Attack
Read moreA "Watering Hole" attack is a form of cyber-attack in which the attacker distributes malicious code or malware on websites likely to be visited by the intended victims. This approach focuses on infecting legitimate websites that are popular with a certain target group, so that when the targeted victims visit these websites, they are unknowingly infected with the malicious code.