Archives: Glossary Terms

Doxing

The practice of finding and retrieving, typically in a non-cooperating system, private and usually sensitive or discreditable information about a person or an organization, and then publishing that information.

Read More

Drive

A computer storage device: a hard drive, a USB drive, etc. (Not to be confused with driver.)

Read More

Drive-by download

A malicious download that occurs when a victim visits a site infested with an exploit kit designed to install its payload in devices that visit that site.

Read More

Driver 

Software that interfaces a hardware device with an operating system. (Not to be confused with drive.)

Read More

Dumpster diving 

An information-gathering technique in which an attacker roots through the physical garbage of a potential target, looking for information that might be useful in subsequent attacks. It might be used...

Read More

Dwell time

<!-- wp:list {"ordered":true} --> <ol><!-- wp:list-item --> <li>The amount of time a visitor spends on a website.</li> <!-- /wp:list-item --> <!-- wp:list-item --> <li>The amount of time an attacker spends within the systems under attack,...

Read More

Dynamic analysis 

A method of testing software that does so in real time, while the software is running.

Read More

East-West

Refers to network traffic within an IT environment (distinct from north-south traffic)

Read More

EDR

Endpoint Detection and Response. Tools that detect actual and/or traces of suspicious activity on end points such as servers and PCs.

Read More

Electromagnetic attack

A side-channel attack that exploits the electromagnetic emissions of a system, commonly, the emissions of a cryptographic system.

Read More