The following terms have a precise meaning within the context of cybersecurity and threat mitigation.
What Is LLDP?
The LLDP (Link Layer Discovery Protocol) is a layer two protocol that allows network devices…
What Is the Cisco Discovery Protocol (CDP) and Why Use It
The Cisco Discovery Protocol (CDP) enables the discovery of directly connected devices on a network….
What Is NVRAM?
NVRAM (non-volatile random-access memory) is a type of computer memory with low power consumption and…
What Is a Hub?
A hub is a networking device that connects multiple devices together. Hubs are typically used…
What Is Data Integrity?
Data integrity is the accuracy and completeness of data. Maintaining data integrity is important to…
What Is a Security Perimeter?
A security perimeter is a physical or logical boundary that separates an organization’s internal network…
What Is Threat Assessment?
A threat assessment is a process of identifying, analyzing, and responding to threats to an…
What Is Blacklist?
A blacklist is a list of items, typically websites or IP addresses, that are considered…
What Is Eavesdropping?
Eavesdropping is the act of secretly listening to someone else’s conversation. Key Points Eavesdropping is…
What Is Decryption?
Decryption is a process of converting ciphertext back into plaintext.
What Is Cryptography?
Cryptography is the practice of secure communication in the presence of third parties. It is…
What Is Hacktivism?
Hacktivism is the use of technology to promote a political or social agenda. Hacktivists may…
What Is Block Cipher?
A block cipher is a method of encrypting data in which each data block is…
What Is BYOD?
Bring Your Own Device (BYOD) is a policy that allows employees to bring their own…
What Is Access Control?
Access control is a security measure that determines who or what can access a resource,…
What Is an Outsider Threat?
The term outsider threat refers to the danger posed by individuals who are not part…
What Is SCADA?
SCADA stands for Supervisory Control and Data Acquisition. It is an industrial control system that…
What Is BCP?
BCP is an acronym for “business continuity planning.” BCP is a process that helps organizations…
What Is Antivirus Software?
Antivirus software is designed to protect your computer against viruses and other malicious software. Antivirus…
What Is Data Mining?
Data mining is a process of extracting patterns from large data sets. It is a…
What Is a Digital Certificate?
A digital certificate is an electronic document that uses a digital signature to bind a…
What Is Identity Fraud?
Identity fraud is a type of fraud that involves using someone else’s identity to steal…
What Is a LAN?
A local area network (LAN) is a computer network that interconnects computers within a limited…
What Is Digital Forensics?
Digital forensics is the practice of collecting, analyzing and reporting on digital evidence in a…
What Is a Payment Card Skimmer?
A payment card skimmer is a device that can be attached to a point-of-sale terminal…
What Is a DMZ?
A DMZ is a network that exists between an organization’s internal network and the Internet….
What Is Link Jacking?
Link jacking is a type of internet fraud that occurs when a user clicks on…
What Is Outsourcing?
Outsourcing is the process of hiring a company or individual to perform a task or…
What Is Authentication?
Authentication is the process of verifying that someone or something is who or what they…
What Is Sandboxing?
A sandbox is a type of software testing environment that enables the isolated execution of…
"Amateurs hack systems, professionals hack people."
-- Bruce Schneier, a renown computer security professional