Archives: Glossary Terms

Honey Pot

A deliberate vulnerability and/or fake data intended to attract malicious actors. Generally monitored, a honeypot is often used as an early warning sign of malicious activity. Sometimes used as a...

Read More

HRU

High Risk Users

Read More

Hunt forward operation

A defensive cyber operation carried out by US Cyber Command’s Cyber National Mission Force (CNMF) at the request of an allied nation.

Read More

HVA

High Value Asset

Read More

iCloud KeyChain

A cloud based sensitive information management system that allows users access across multiple devices.

Read More

Identity fabric

A set of services for managing identity and access management (IAM) across all of an organization’s data islands.

Read More

Identity management

Management, authentication, and authorization of identities, including their privileges, in an enterprise.

Read More

Identity orchestration

A subset of security orchestration, identity orchestration is the management of identities across an organization’s digital islands.

Read More

Identity theft 

The theft of a natural person’s identity for purposes of fraud.

Read More

IDS

Intrusion Detection System. Monitors networks and systems for malicious activities or policy violations

Read More