Register today for Zero Trust World 2026!
RESOURCE CENTER

Cybersecurity 101

f
f
f
Footholds

A method threat actors use to reinstall malware onto a device after it is cleaned and rebooted. The program leaves vulnerabilities within the device for malware to relaunch.

f
FISMA (Federal Information Security Management Act)

A federal act put into effect in 2020 that requires federal entities to implement strict information security measures.

f
Firewall-Like Application Policies

Once an application matches a policy, it stops processing so no further policies will take effect on that application. Care must be taken when creating and ordering policies to ensure that policies apply as intended.

f
Firewall

A security program or software that filters your network traffic and prevents outsiders, including malicious threat actors, from entering your organization.

f
Fileless Malware

A type of malicious software that infects computers using legitimate programs. It exists without relying on files and leaves no trace that it was ever there, making it difficult to detect and remove.

g
g
g
Golden Ticket Attack

A golden ticket attack is an attack that targets Windows Active Directory access control. Threat actors bypass normal authentication by taking advantage of a Kerberos weakness. Attackers must have access to the system before a Golden Ticket Attack can be performed.

h
h
h
HIPAA (Health Insurance Portability and Accountability Act)

A US federal act established in 1996 that restricts access to individuals’ private medical information.

h
Human Error

Actions taken by users/employees that unintentionally result in the infiltration of malware, viruses, and more into an organization.

h
Host

Another word for computer, particularly references a computer that is connected to a network.

h
Hash

A file hash is a unique numerical value calculated using a specific algorithm. The hash of a file can help validate the integrity of a file. If a single value within the file is changed, the hash will be completely different. For example, changing a period to a question mark in a word document will result in a completely different hash value.

h
Hardware

The physical portions of a computer or machine: wiring, circuit boards, storage drives, etc.

h
Hacker

Generally, someone who uses technical skills to overcome technical problems. In cybersecurity, a hacker is referred to as a threat actor with malicious intent to access an individual’s or organization’s data unauthorized.

i
i
i
IP (Internet Protocol) Address

An arrangement of characters numbers that act is the identification number of any internet-connected device. Each device has its own unique IP Address.

i
Integrations

When different computers work together in some way, often exchanging data between them.

i
InfoSec (Information Security)

Policies and standard procedures set into place to protect sensitive data from unauthorized access.

i
Incident Response

A strategy developed for organizations to respond to cyber threats and attacks in their network.

j
j
j
Just-in-time

Another way of saying on demand, something is enabled exactly when needed and disabled when no longer needed.

k
k
k
Kerberos

An authentication protocol used to verify the identity of a host or user.

l
l
Sort Alphabetically
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.