Archives: Glossary Terms

North-South

Refers to network traffic between an IT environment and the public internet. Diagrams tend to show the internet above the IT environment.

Read More

Obfuscation

The practice of deliberately rendering software obscure, difficult to analyze and reverse engineer, and, above all, difficult to discern its actual function.

Read More

Octave

A security framework for determining risk and planning appropriate cyber defenses. OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation) defines a method organizations can use to minimize their exposure to...

Read More

Open source

Software whose source code is made available through an open-source license in which the copyright holder grants the right to study, change, and distribute the software for free.

Read More

OS INT

Open Source intelligence in this context refers to publicly available threat intelligence (as opposed to threat intelligence that you pay for).

Read More

Phishing

A fraudulent attempt to get someone to take an action by pretending to be trustworthy via electronic message, most commonly email or SMS. See also Spear Phishing.

Read More

Powershell

A scripting language built into Microsoft Windows that allows for the automation of system administration tasks.

Read More

PUA

Potentially Unwanted Application.

Read More

SecOPS

Security Operations.

Read More

SIEM

Security information and event manager / management.

Read More