Archives: Glossary Terms

Exfiltration

The unauthorized transfer of information from a system.

Read More

Expert system

A system that simulates the decision-making of a human expert by applying factual or heuristic rules generated by a human subject matter expert.

Read More

Exploit

Definition of exploit : noun Definition of exploit : verb

Read More

Exploit Kit

(Verb) To attack a weakness in an IT system to accomplish some malicious action. (Noun) Generally refers to a specific method/procedure/software used to exploit a known vulnerability.

Read More

False flag

An operation designed to deflect attribution to an uninvolved party. A cyber operation would be a false flag if the threat actor behind it took steps to impersonate or use...

Read More

Fast flux attack

An attack using a network designed to obfuscate the location of a cyber adversary’s command and control server by manipulating the domain name system (DNS) in a way that rotates...

Read More

File

A named collection of data, such as a document or a picture.

Read More

Fileless malware 

A kind of malware used in low-observable-characteristics attacks. Because it abuses legitimate programs and does not rely on storing files on a hard drive (instead going directly to memory) fileless...

Read More

Firewall

Definition of firewall : noun Definition of firewall : verb

Read More

Firmware

Persistent program code and data stored in a non-volatile memory device inside an embedded device or a computer. Changing firmware requires special procedures and is rarely done over a device’s...

Read More