Archives: Glossary Terms

ATM skimming

Collection of ATM credentials by means of a small device physically inserted into the ATM’s card reader.

Read More

Attack Surface

A term used to characterize how vulnerable an IT environment is to potential attack. If it is said that an IT environment has a large attack surface, this means there...

Read More

Attack traffic

Generally, any network traffic carrying or constituting an attack. Often used specifically for denial-of-service traffic.

Read More

Attack Vector

An attack vector is a path or means by which a hacker can gain access to a computer or network server in order to deliver a payload or malicious outcome....

Read More

Attribution

<!-- wp:list {"ordered":true} --> <ol><!-- wp:list-item --> <li>Recognition of a set of repeatable attack patterns across the intrusion kill chain.</li> <!-- /wp:list-item --> <!-- wp:list-item --> <li>Determining responsibility for a cyberattack or other offensive cyber...

Read More

Backdoor

Any method by which authorized and unauthorized users are able to bypass normal security measures and gain access to an otherwise inaccessible system, especially an undocumented or publicly unknown method...

Read More

Baiting

A form of social engineering in which an attacker lures a victim with a false promise that appeals to greed or curiosity. A USB drive carrying a malicious payload and...

Read More

Baselining

A method of assessing network performance or behavior by comparing it to a historically derived baseline. The method is important to anomaly detection and behavior analysis.

Read More

Bashmob

A physical mob assembled rapidly and collaboratively by communication through social media.

Read More

Behavior analysis

Use of software tools to detect behavior on a network that is outside of norms. Compare baselining; contrast signature-based detection.

Read More