Archives: Glossary Terms

iOS

An operating system designed primarily for mobile devices, like tablets and smartphones. Developed and sold by Apple.

Read More

IoT botnet

A group of hacked computers, smart appliances and Internet-connected devices co-opted for illicit purposes.

Read More

IPS

Intrusion Prevention System. An IPS is an IDS with the ability to execute real-time responses to active attacks and violations. Also see Next Gen Firewall.

Read More

Jailbreak

To remove limitations of an operating system, particularly iOS, from a device running that operating system. Jailbreaking is a form of privilege escalation. Since users commonly jailbreak devices they own,...

Read More

JDIC

Joint Cyber Defense Collaborative (q.v.).

Read More

Junk hack

A low-grade hack of some improbable item (a piece of soft candy, a potato chip bag, a novelty item lying around the house) that demonstrates the possibility of obtaining information...

Read More

Keylogger

Malware that performs keylogging, recording the keys struck on a keyboard without the knowledge or consent of the user, to monitor the user’s activities or compromise information.

Read More

Keylogging 

Recording the keys struck on a keyboard, typically without the knowledge or consent of the user, in order to monitor the user’s activities or compromise the user’s information.

Read More

Kinetic

Referring to the real, physical world, as contrasted with the virtual world of cyberspace.

Read More

Lateral movement

A family of techniques threat actors use to move across a victim’s network.

Read More