Archives: Glossary Terms

Cyber vandalism

A cyber attack without any obvious rational criminal, political, or ideological motive, usually defacement of a vulnerable website to display the hacker’s prowess.

Read More

Cyber vigilantism

A hack directed against a cyber criminal site or organization. While extralegal (and often illegal) cyber vigilantism is conducted to impede or punish cyber crime, and not necessarily crimes of...

Read More

Cybersecurity skills gap

The difference between organizational employee job requirements and the skillsets available in the labor market.

Read More

CZ

Another name for C&C

Read More

Daemon definition

An operating system program running in the background designed to perform a specific task when certain conditions or events occur.

Read More

Dark Patterns

<!-- wp:list {"ordered":true} --> <ol><!-- wp:list-item --> <li>https://www.wired.com/story/how-to-spot-avoid-dark-patterns/</li> <!-- /wp:list-item --></ol> <!-- /wp:list -->

Read More

Dark web

A part of the Internet inaccessible by conventional means. Small, friend-to-friend, peer-to-peer networks form part of the dark web, as do such large anonymizing networks as Tor.

Read More

Darknet 

A subset of the internet where communications between two parties or client-server transactions are obscured from search engines and surveillance systems by layers of encryption.

Read More

Data breach

Release of secure information into an insecure environment. A data breach may be intentional or unintentional. Physical loss of a device can constitute a data breach—not all data breaches are...

Read More

Data compromise

Same as “data breach”—the loss or exposure of information meant to be secure, private, or otherwise restricted.

Read More