Archives: Glossary Terms

Bulletproof hosting 

Cloud services intended for the use of cyber criminals and other threat actors; the services are designed to obstruct law enforcement and other kinds of government investigations, and to provide...

Read More

Byte

A digital unit of information. In standard usage, a byte consists of 8 bits, and can store integer values between 0 and 255. A byte is usually the smallest addressable...

Read More

C&C

Command and Control. Generally used when referring to a C&C Server: i.e. the server configured by Threat Actors to communicate with machines that have been hacked/compromised. C&C servers are generally...

Read More

Catfish

A fictitious online identity created for the purpose of seduction, misdirection, or fraud.

Read More

CEO fraud

A form of business email compromise in which a spoofed email appears to originate with a company’s chief executive.

Read More

Certification 

A credential attesting to an individual’s knowledge, in this context, knowledge in the field of cybersecurity. A certification is usually obtained by passing an examination or a series of examinations...

Read More

Certified Signing Request

In public key infrastructure systems, a message an applicant for a digital certificate sends to a certificate authority.

Read More

Chaos engineering

The resilience discipline of controlled stress-test experimentation in continuous integration or continuous delivery (CI/CD) environments to uncover systemic weaknesses.

Read More

ChatGPT 

A conversational language model developed by the company OpenAI.

Read More

CIRT

Cyber Incident Response Team (acronym).

Read More