Archives: Glossary Terms

(CSPM) Cloud Security Posture Management

Tools that automate the identification and remediation of cloud misconfigurations.

Read More

(CTI) Cyber threat intelligence 

Analyzed information about threats used by leadership to make decisions regarding the cybersecurity posture of their organization.

Read More

(CVE) Common Vulnerabilities and Exposures

A comprehensive, continually updated, public list sponsored by the US government designed to uniquely identify, without the need for manual cross-referencing, known software vulnerabilities.

Read More

(DDoS) Distributed denial-of-service attack

A denial-of-service attack conducted by multiple systems flooding the bandwidth or resources of a targeted system. DDoS attacks commonly use botnets.

Read More

(DGA) Domain-generation algorithm

An algorithm that generates a large volume of domain names. Domain-generation algorithms are commonly used in domain fluxing.

Read More

(DMARC) Domain-based Message Authentication, Reporting and Conformance

An email authentication and reporting protocol that extends the Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM), allowing a domain owner to establish a policy in their DNS records...

Read More

(DNS) Domain Name System (DNS)

A hierarchical distributed naming system for computers, services, or other resources connected to the Internet (or to a private network). It associates information with domain names assigned to each participant....

Read More

(DPI) Deep packet inspection

Network packet filtering that examines a packet’s data as they cross an inspection point. Deep packet inspection can find protocol non-compliance, malware, spam, network intrusion attempts, etc. It can be...

Read More

(DrDoS) Distributed reflection denial-of-service attack 

A variety of denial-of-service attack in which spoofed packets are sent to a large number of destinations, all of which respond to the (spoofed) origin of the packets—the victim—who is...

Read More

(EaaS) Encryption-as-a-service

A model in which users subscribe to a cloud-based encryption service without having to install encryption in their own systems. Abbreviated EaaS.

Read More