top of page

Cyber Security Glossary

Learn about common terms in cyber security and threat management.

Account Takeover

Account Takeover (ATO) is a cybercrime in which an attacker gains unauthorized access to a victim's online account.

Brand Intelligence

Brand intelligence is the process of gathering, analyzing, and interpreting information about a brand.

Brand Monitoring

Brand monitoring is the process of tracking and analyzing a brand's presence and reputation online.

Brand Protection

Brand protection is the process of safeguarding a company's brand and reputation from threats such as counterfeiting, trademark infringement, and online brand abuse.

Business Email Compromise

Business email compromise (BEC) is a type of cybercrime that involves the unauthorized access and use of a business email account.

Cyber Security Awareness

Cybersecurity awareness refers to the knowledge and understanding of online security best practices and the potential risks associated with using the internet.

Cyber Threat Intelligence

Cyber threat intelligence (CTI) is information about current and potential threats to an organization's computer systems and networks.

Data Breach

A data breach is a security incident in which sensitive, confidential, or protected data is accessed and potentially disclosed without authorization.

Data Leak

A data leak is a security incident in which sensitive, confidential, or protected data is accidentally or improperly shared outside of an organization.

Digital Attack Surface

The digital attack surface refers to the various points of entry that attackers can use to access an organization's systems and data.

Digital Executive Protection

Digital executive protection refers to the measures taken to secure the online presence and reputation of executives, high-profile individuals, and organizations.

Domain Monitoring

Domain monitoring is the process of tracking and monitoring a domain name for potential threats or abuse.

Domain Protection

Domain protection is a crucial aspect of online branding and identity. It ensures that your website's unique address (e.g. www.yourwebsite.com) is registered in your name and can only be used by you.

Domain Spoofing

Domain spoofing refers to the act of creating a fake website or email that appears to be legitimate, but is actually designed to trick users into giving away personal information or infecting their devices with malware.

Geopolitical Intelligence

Geopolitical intelligence refers to the collection and analysis of online data and information to understand and anticipate the political, economic, and social trends and developments in different regions of the world.

Malicious Domains

Malicious domains refer to websites or other online resources that are used to spread malware or engage in other malicious activities.

OSINT

Gathering information and intelligence from publicly available sources.

Passsive DNS

Passive DNS (Domain Name System) is a technology that is used to track the relationships between domain names and IP addresses over time.

Phishing Attack

A phishing attack is a type of online scam in which attackers send fake emails or create fake websites in an attempt to trick people into divulging personal information, such as passwords, credit card numbers, and bank account details

Phishing Campaign

A phishing campaign is a coordinated series of phishing attacks that are carried out over a period of time with the goal of tricking people into divulging sensitive information or infecting their devices with malware.

Social Engineering

Social engineering is the use of psychological manipulation and deception to influence people to divulge sensitive information or perform actions that may not be in their best interests.

Social Media Impersonation

Social media impersonation refers to the act of creating fake social media accounts or using someone else's name or image on social media without their permission.

Social Media Risk

Social media risk refers to the potential negative consequences that may arise from the use of social media by individuals and organizations.

Threat Hunting

Threat hunting is the proactive process of searching for and identifying potential security threats within an organization's networks and systems.

Vulnerability Intelligence

Vulnerability intelligence refers to the process of collecting, analyzing, and disseminating information about vulnerabilities in software, systems, and networks.

bottom of page