Archives: Glossary Terms

Credential stealing

From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials.

Read More

Credential stuffing

A type of attack in which hackers take credential combinations, typically username and password pairs, that have been exposed in earlier data breaches and try them against login sites. Credential...

Read More

Creepware

Malware that uses a device’s webcam to surreptitiously observe the device’s user or its environs, without the user’s knowledge or consent.

Read More

Crimeware 

Malware designed to automate cyber crime.

Read More

Cross-site request forgery

Also known as a “one-click attack” or “session riding,” a malicious website exploit where an attacker transmits unauthorized commands to a website from an ostensibly trusted user’s browser.

Read More

Crowd sourcing

Getting services, ideas, or content by soliciting contributions from a large group, especially from an online community, as opposed to employees, suppliers, or experts.

Read More

Cryptographic key

A parameter that defines the output of a cryptographic algorithm. A key affects how plaintext is to be encrypted by a given cryptographic algorithm, and how the resulting ciphertext is...

Read More

Cryptography

Literally, “secret writing”: the practice and study of techniques for securing communications in the presence of adversaries. In a typical instance of cryptography, plaintext data is converted through a cryptographic...

Read More

CSPM

“Cloud Security Posture Management,” tools that automate the identification and remediation of cloud misconfigurations.

Read More

CVE

Common Vulnerabilities and Exposures. Refers to publicly known vulnerabilities. The Mitre organization maintains a database of CVEs

Read More