The Glossary contains several hundred definitions of terms that you might come across in our articles and blogs, or on other information security sites. Unlike the in-depth articles in the Knowledge Base, every definition in the Glossary is succinct, while remaining highly informative.
(This section is currently under construction)
In the Knowledge Base, you will find various articles about common threats, a general classification of malware and unwanted messages, and a brief historical overview of the evolution of these and many other threats.
The Knowledge Base now has three main sections:
– The Detectable Objects section gives detailed information about malicious and potentially dangerous programs that we protect users against every single day all around the world, as well as advice on what to do in case of infection.
– In the Spam and Phishing section, you will learn about phishing and spam mailings, how their creators earn money from them, and how this type of threat has evolved since the 1990s to the present day.
– The articles in the Vulnerabilities and Hackers section is devoted to the topic of software vulnerabilities and how cybercriminals exploit them, as well as legislation and hackers in the broad sense of the word.
A service model for outsourcing remote equipment with specified parameters. Under the IaaS model, the provider grants the client access to a virtual server with an installed operating system, or to several hosts connected into a network. The user can… Read Full Article
An ICO is the initial sale of a limited amount of cryptocurrency to investors. It is a way to raise financing (often through crowdfunding) and issue coins for the first time. Besides tokens, the issuer can offer buyers additional services… Read Full Article
Identity theft occurs when a fraudster obtains enough personal information from the victim (name, address, date of birth, etc.) to enable them to commit identity fraud – i.e. the use of stolen credentials to obtain goods or services by deception.… Read Full Article
An intrusion detection system (IDS) is a software product or device that detects unauthorized and malicious activity in a computer network or on a separate host. An IDS’s purpose is to detect cybercriminal attempts to penetrate the infrastructure and to… Read Full Article
A standard describing the authorization process and delimitation of access rights in most modern network systems. The IEEE 802.1x specification prohibits a client that does not pass the authentication procedure from fully using the router. The standard is developed and… Read Full Article
A transport protocol for retrieving messages from a mail server, created as an alternative to POP3. IMAP provides flexible management of messages, maintains the connection to the server during the entire session, and downloads only user-selected messages onto the client… Read Full Article
Incident management in cybersecurity is a set of measures designed to combat cyberthreats and minimize the consequences of attacks. Incident management covers monitoring of security events, as well as incident response, investigation, and prevention. Incident management breakdown The incident management… Read Full Article
Incident response in the field of information security is a set of measures to detect and stop a cyberattack or a data leak from an organization’s infrastructure, and to clear up any consequences. The primary goal of incident response is… Read Full Article
In the field of computer security, an Indicator of compromise (IoC) is an object or activity that, observed on a network or on a device, indicates a high probability of unauthorized access to the system — in other words, that… Read Full Article
Infection chain is the infosec term for a set of multistage attack tools, each of which downloads the next to an infected system with the goal of installing and running a payload. In the realm of information security, the term… Read Full Article
A random or pseudorandom sequence of characters added to an encryption key to enhance security. An initialization vector (IV) complicates determining patterns in a series of data containing cryptographic signatures, and makes it more resistant to hacking. The IV does… Read Full Article
An insider threat is a risk for an organization that comes from people inside the security loop. These people, known as insiders, can include either current or former employees of the company, as well as contractors or partners — that… Read Full Article
A type of telephone fraud that utilizes technical means to make unauthorized calls to premium numbers. Cybercriminals use hacked phones, stolen SIM cards, and compromised corporate PBXs to direct calls to their own or leased lines with billing of incoming… Read Full Article
The term Internet of things (often abbreviated to IoT) is used to describe everyday objects that are connected to the Internet and are able to collect and transfer data automatically, without the need for human interaction. The Internet of things… Read Full Article
A company that provides Internet access and other related services to individuals and organizations. In addition to broadband or dialup connections, ISPs can offer: hosting domain name registration virtual server leasing and other services
The unique address of a computer or other device online. An IP address consists of several groups of numeric (IPv4) or alphanumeric (IPv6) characters. A public or external IP address identifies hardware connected to the Internet. An internal address is… Read Full Article
An intrusion prevention system (IPS) is a program or device for detecting and blocking suspicious activity on a network or individual computer. Read Full Article
The fourth version of the Internet Protocol, used to transfer data between devices online. It defines the IP address format and the structure of packets, or standard blocks of information. IPv4 addresses are written in the form of four values… Read Full Article
An improved version of IPv4 for the transfer of information between devices in local and global networks. Its 128-bit identifier gives IPv6 a larger address space. IPv6 addresses consist of eight groups of characters, separated by a colon. The format… Read Full Article
A computer protocol for transmitting SCSI commands over TCP/IP. iSCSI is used to create distributed data storage systems and dynamically connect additional disk space to the server. The storage can be located at a considerable distance from the server and… Read Full Article