Archives: Glossary Terms

anomoly detection

The practice of looking for and recognizing unusual behavior against the background of an established baseline as a means of detecting hostile or otherwise dangerous activity in a network or...

Read More

anonymizer

Any tool that attempts to make Internet activity anonymous or untraceable, normally a proxy server interposed between a client device and the rest of the Internet. Such a proxy server...

Read More

anti-cheat software 

Software designed to prevent cheating in video games.

Read More

anti-malware

Any resource—software, device, process, etc.—that protects systems or networks against some form of malware.

Read More

Apple Lockdown Mode

An optional security mode for macOS and iOS that reduces the attack surface of the operating system by disabling certain commonly attacked features.

Read More

application

Software designed to perform certain specific tasks (such as a word processor).

Read More

APT

Advanced Persistent Threat. i.e. a Threat Actor capable of gaining unauthorized access to a network and remain undetected for an extended period.

Read More

APT side hustle

A nation-state hacking group’s practice of funding its own activities through cybercrime or cyber mercenary work. Compare cyber privateering.

Read More

Astroturf

An artificially created advocacy community, generally centrally directed, that poses as a spontaneous grassroots movement arising from genuine popular demand.

Read More

Asymmetric Encryption

Data encryption where the coding key (the public key) and the corresponding decryption key (private key) are different. It is mathematically impossible to derive the private key from the public...

Read More