Archives: Glossary Terms

Jailbreak

To remove limitations of an operating system, particularly iOS, from a device running that operating system. Jailbreaking is a form of privilege escalation. Since users commonly jailbreak devices they own,...

Read More

JDIC

Joint Cyber Defense Collaborative (q.v.).

Read More

Junk hack

A low-grade hack of some improbable item (a piece of soft candy, a potato chip bag, a novelty item lying around the house) that demonstrates the possibility of obtaining information...

Read More

Keylogger

Malware that performs keylogging, recording the keys struck on a keyboard without the knowledge or consent of the user, to monitor the user’s activities or compromise information.

Read More

Keylogging 

Recording the keys struck on a keyboard, typically without the knowledge or consent of the user, in order to monitor the user’s activities or compromise the user’s information.

Read More

Kinetic

Referring to the real, physical world, as contrasted with the virtual world of cyberspace.

Read More

Lateral movement

A family of techniques threat actors use to move across a victim’s network.

Read More

Lateral Movement

Refers to Threat Actors obtaining access to other machines after their initial infiltration of one machine

Read More

Least privilege access

A principle by which users are given the minimal level of access to a system or network necessary to do their jobs, and no more.

Read More

Linux

A Unix-like operating system assembled under the model of free and open source software development and distribution.

Read More