Archives: Glossary Terms

Buffer 

A physical memory storage location in a device where data are temporarily stored.

Read More

Buffer overflow

An anomaly in which a program overruns a buffer’s boundary while writing data to that buffer, and so overwrites adjacent memory. A buffer overflow violates memory safety.

Read More

Building Security In Maturity Model

A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. Commonly known by its acronym, BSIMM.

Read More

Bulletproof hosting 

Cloud services intended for the use of cyber criminals and other threat actors; the services are designed to obstruct law enforcement and other kinds of government investigations, and to provide...

Read More

Byte

A digital unit of information. In standard usage, a byte consists of 8 bits, and can store integer values between 0 and 255. A byte is usually the smallest addressable...

Read More

C&C

Command and Control. Generally used when referring to a C&C Server: i.e. the server configured by Threat Actors to communicate with machines that have been hacked/compromised. C&C servers are generally...

Read More

Catfish

A fictitious online identity created for the purpose of seduction, misdirection, or fraud.

Read More

CEO fraud

A form of business email compromise in which a spoofed email appears to originate with a company’s chief executive.

Read More

Certification 

A credential attesting to an individual’s knowledge, in this context, knowledge in the field of cybersecurity. A certification is usually obtained by passing an examination or a series of examinations...

Read More

Certified Signing Request

In public key infrastructure systems, a message an applicant for a digital certificate sends to a certificate authority.

Read More