Get a FREE Report of the Software Running in Your Environment - Including Risks & Countries of Origin
RESOURCE CENTER

Cybersecurity 101

a
a
a
ACL (Access Control List)

A list of permissions used to control network traffic.

a
Admin (Administrator) rights

The highest level of privileges a user has in the operating system (OS) of an organization; usually allowed to perform most or all functions.

a
Agent

A computer program that carries out a task in the background.

a
Air Gap/Wall

A barrier between an organization’s digital assets and the internet or other networks.

a
Algorithm

A specific set of instructions a computer must follow to perform a calculation or solve a problem.

a
Allowlisting

Historically referred to as whitelisting, Allowlisting is a ThreatLocker endpoint security module that blocks all applications from operating unless explicitly permitted.
Learn More About Application Allowlisting

a
Applications

Software that allows you to perform a specific function on your desktop or mobile devices. Applications can include word processors, internet browsers, and media players.

a
Application Access

When an application is running in an environment, it has access to everything in that environment, such as sensitive files, and on networked devices, this includes everything on the network.

a
Application Definition

An Application Definition is the set of files and any custom rules that make up a particular application.

a
Application Exploits

Occur when cyber threat actors take advantage of any vulnerabilities within an application, usually to enter your devices or organization.

a
Antivirus

A software designed to hunt and remove viruses from your device(s) or block viruses from entering in the first place.

a
Audit Event

An audit event refers to any security relevant occurrence within a system.

a
Audit File

A file containing a collection of audit events.

a
Authentication

Verifying the identity of a user or process.

b
b
b
Back Up

Short for “Data Back Up,” a Back Up is a method of saving your devices’ data in an a different online or offsite location.

b
Built-in Tools

Tools that are included in the basic platform functionality without any modifications.

b
Bring Your Own Device (BYOD)

Refers to a policy that allows employees within an organization to use their personal devices to connect to the organizations’ networks. The device is used to complete tasks necessary to complete their job which can potentially be sensitive or confidential.

c
c
c
Canaries

A physical or virtual device that can imitate most other physical and virtual devices. They can be used to lure attackers for users to study their behaviors.

c
Cloud-based

Systems, applications, and operations that are cloud-based are hosted or conducted via the internet.

c
Configurable

The ability to personalize settings to better fit a specific task/need.

c
Command and Control Server

A computer that an attacker will use to communicate with and control devices they have taken over.

c
Cyberattack

Any attempt to infiltrate an individual’s or organization’s data storage or information systems usually for destructive purposes or financial gain.

Sort Alphabetically
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.