Register today for Zero Trust World 2026!
RESOURCE CENTER

Cybersecurity 101

a
a
a
Authentication

Verifying the identity of a user or process.

a
Audit File

A file containing a collection of audit events.

a
Audit Event

An audit event refers to any security relevant occurrence within a system.

a
Antivirus

A software designed to hunt and remove viruses from your device(s) or block viruses from entering in the first place.

a
Application Exploits

Occur when cyber threat actors take advantage of any vulnerabilities within an application, usually to enter your devices or organization.

a
Application Definition

An Application Definition is the set of files and any custom rules that make up a particular application.

a
Application Access

When an application is running in an environment, it has access to everything in that environment, such as sensitive files, and on networked devices, this includes everything on the network.

a
Applications

Software that allows you to perform a specific function on your desktop or mobile devices. Applications can include word processors, internet browsers, and media players.

a
Allowlisting

Historically referred to as whitelisting, Allowlisting is a ThreatLocker endpoint security module that blocks all applications from operating unless explicitly permitted.
Learn More About Application Allowlisting

a
Algorithm

A specific set of instructions a computer must follow to perform a calculation or solve a problem.

a
Air Gap/Wall

A barrier between an organization’s digital assets and the internet or other networks.

a
Agent

A computer program that carries out a task in the background.

a
Admin (Administrator) rights

The highest level of privileges a user has in the operating system (OS) of an organization; usually allowed to perform most or all functions.

a
ACL (Access Control List)

A list of permissions used to control network traffic.

b
b
b
Bring Your Own Device (BYOD)

Refers to a policy that allows employees within an organization to use their personal devices to connect to the organizations’ networks. The device is used to complete tasks necessary to complete their job which can potentially be sensitive or confidential.

b
Built-in Tools

Tools that are included in the basic platform functionality without any modifications.

b
Back Up

Short for “Data Back Up,” a Back Up is a method of saving your devices’ data in a different online or offsite location.

c
c
c
Cryptocurrency

Currency that exists digitally/virtually. Many ransomware attacks demand cryptocurrency payments, in Bitcoin for example, because it is decentralized and untraceable.

c
Cyber Threat

Anything with the ability to harm an individual or organization from an online source. Threats may damage or disrupt normal operations with malicious intents to cause destruction or financial loss.

c
CMMC (Cybersecurity Maturity Model Certification)

As the US DoD explains, the CMMC is designed to enforce protection of sensitive unclassified information that is shared by the Department with its contractors and subcontractors. The program provides the Department increased assurance that contractors and subcontractors are meeting the cybersecurity requirements that apply to acquisition programs and systems that process controlled unclassified information.

c
Cybersecurity

The defensive approach one takes to protect their data stores or information systems from online threats like ransomware.

c
Cybercriminals

Cybercriminals are anyone who makes the attempt to initiate a cyberattack on another individual or organization, also known as threat actors.

Sort Alphabetically
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.