Archives: Glossary Terms

((HASP)) Hardware against software piracy

A hardware item intended to protect software from unauthorized copying or installation.

Read More

(AES) Advanced Encryption Standard (AES)

A US Government standard (commonly known as “AES”) for electronic data encryption. AES describes a symmetric-key algorithm: the same key is used to both encrypt and decrypt data.

Read More

(AET) advanced evasion technique

Combination of several distinct evasion tactics to create a new evasion method delivered simultaneously over multiple network layers. Advanced evasion techniques can enable an attacker to gain undetected access to...

Read More

(AI) artificial intelligence

The ability of computers to execute tasks usually associated with natural, human intelligence: especially natural language processing, problem-solving, and pattern recognition.

Read More

(APT) advanced persistent threat

A cyberattack characterized by stealth and long duration, and also a threat actor that carries out such attacks. Advanced persistent threats (usually refered to by the acronym “APT”) typically interact...

Read More

(ATA) Advanced Technology Attachment

A specific interface standard for connecting storages devices in computers. Sometimes known as Integrated Drive Electronics (IDE).

Read More

(BEC) Business email compromise 

A form of social engineering in which an attacker spoofs an email from a corporate officer and directs a member of the statf, usually in finance or accounts payable, to...

Read More

(BYOD) Bring-Your-Own-Device

An enterprise practice or policy that allows employees to use their own mobile devices on the enterprise’s networks. Commonly referred to by the acronym BYOD.

Read More

(BYOE) Bring-Your-Own-Encryption

A cloud security model in which cloud service customers use their own encryption software and manage their own encryption keys. Commonly referred to by the acronym BYOE.

Read More

(CA) certificate authority

An entity that issues digital certificates. Commonly abbreviated CA.

Read More