Archives: Glossary Terms

active defense

Cyber defensive measures designed to inflict damage on an attacker, by exploiting vulnerabilities in attack toolkits, distributing disinformation, inflicting malicious code, etc. Enterprises may undertake active defense against threats to...

Read More

adversary group naming

A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.

Read More

adware

Software that automatically renders advertisements to generate revenue. Often loosely applied to any software that generates malicious or unwanted advertising.

Read More

agile software development

An approach to software development that emphasizes incremental delivery, team collaboration, continual planning, and continual learning. Agile development emphasizes requirement discovery (as opposed to initial requirement specification) and iteration on...

Read More

AI

Acronym for artificial intelligence.

Read More

alert fatigue

The tendency of watchstanders and security personnel to become blind to alerts because they’ve been subjected to so many of them, especially when the alerts are automated and include a...

Read More

algorithm

A specific set of instructions for carrying out a procedure or solving a problem, usually with the requirement that the procedure terminate at some point. “Algorithm” in common usage is...

Read More

anagram

A word, phrase, or sentence formed from another by rearranging its letters

Read More

Android

A Linux-based operating system designed primarily for mobile touch-screen devices, like tablets and smartphones. Sold by Google.

Read More

angler phishing

Masquerading as a customer service account in social media, hoping to attract and subsequently victimize disgruntled customers.

Read More