Register for Zero Trust World 25!

Cybersecurity 101

c
Cybercriminals

Cybercriminals are anyone who makes the attempt to initiate a cyberattack on another individual or organization, also known as threat actors.

c
Cybersecurity

The defensive approach one takes to protect their data stores or information systems from online threats like ransomware.

c
CMMC (Cybersecurity Maturity Model Certification)

As the US DoD explains, the CMMC is designed to enforce protection of sensitive unclassified information that is shared by the Department with its contractors and subcontractors. The program provides the Department increased assurance that contractors and subcontractors are meeting the cybersecurity requirements that apply to acquisition programs and systems that process controlled unclassified information.

c
Cyber Threat

Anything with the ability to harm an individual or organization from an online source. Threats may damage or disrupt normal operations with malicious intents to cause destruction or financial loss.

c
Cryptocurrency

Currency that exists digitally/virtually. Many ransomware attacks demand cryptocurrency payments, in Bitcoin for example, because it is decentralized and untraceable.

d
d
d
Data Theft

The act of unauthorized, illegal transfer of confidential data, normally personal data like health records, financial data, and personal identifiable data.

d
Data Privacy

Determined by how you store your data and the policies you set on who or what can access it.

d
Data Protection

Determined what protective measures you implement to keep your safe from cyber threats.

d
Dependencies

In software, dependencies refer to other files that are required for the software to run, i.e., DLLs.

d
Default Deny

A strict policy that does not allow anything to operate unless it is specifically pre-approved.

d
Disaster Recovery (Plan)

A step-by-step procedure that lead to the recovery of an organization’s data and operations if it were to be impacted by a cyberattack.

d
Domain Admin Groups

Each member of this group holds administrative rights across all domains within an organization.

d
Doxware

Ransomware that threatens to release a victim’s sensitive data if the ransom is not paid by a certain deadline.

d
Dynamic ACLs

An advanced version of regular ACLs that requires users to authenticate themselves through tenant before that can access any resources.

e
e
e
EDR (Endpoint Detection and Response)

EDRs monitor and record activities and workloads taking place on a device. Using various techniques, EDRs will work to detect any suspicious activity and respond accordingly. EDR enables IT administrators to view suspicious activity in near real-time across an organization's endpoints. Focusing on behavioral patterns and unusual activity, EDRs will work to block threats and protect devices.

e
Elevation Control

Elevation Control enables users to run specific applications as a local administrator, even when they do not have local admin privileges.

e
Encryption

Converting data and information, sensitive or not, into code to protect it and prevent any unauthorized access.

e
Endpoint

Machines that connect to and communicate with an organization’s network. Examples include desktop computers, work phones, virtual machines, and servers.

e
Endpoint Detection

A cybersecurity solution that monitors endpoint devices for signs of compromise and sends alerts to IT admins.

e
End User

An individual using a product, device, or service.

e
Enterprise Solutions

Software solution designed to integrate multiple systems used within the enterprise environment to streamline processes and ease management burden.

e
Executables

Any code, file, or program that instructs a computer to perform an action or set of actions upon it being opened on said computer.

e
Exploit

Takes advantage of vulnerabilities within a system or software to perform malicious acts like installing ransomware.

Sort Alphabetically
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.