Access Control
Security techniques that regulate who or what can view or use resources in a computing environment.
Access a comprehensive list of cybersecurity and darknet terms used across DarkScout workflows.
Security techniques that regulate who or what can view or use resources in a computing environment.
A prolonged and targeted cyberattack where an intruder gains undetected access to a network to steal data.
The total sum of vulnerabilities and entry points that a threat actor could exploit to gain unauthorized access.
A program designed to detect, prevent, and remove malware from a computer or network.
The process of verifying the identity of a user, device, or system (e.g., via passwords or biometrics).
The practice of tracking and managing an organization's devices, software, and data to ensure security visibility.
A hidden method for bypassing normal authentication controls to gain unauthorized remote access to a system.
A security team responsible for defending the organization's network against internal and external threats.
A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
A security incident that results in unauthorized access to data, applications, services, or devices.
A trial-and-error method used to guess login credentials or encryption keys.
A reward program offered by organizations to individuals who report security exploits and vulnerabilities.
A server controlled by an attacker to send commands to systems compromised by malware.
The three pillars of information security: Confidentiality, Integrity, and Availability.
An attack where stolen username/password pairs are automatically entered into other websites to gain access.
The practice of securing information by transforming it into an unreadable format.
A public glossary of known cybersecurity vulnerabilities, each assigned a unique identification number.
Routine practices (like patching and password changes) that maintain the health and security of users and devices.
Encrypted overlay networks that use the internet but require specific software (like Tor) for access.
Strategies and tools used to ensure sensitive data is not lost, misused, or accessed by unauthorized users.
An attack that attempts to disrupt traffic to a server or network by overwhelming it with a flood of internet traffic.
Parts of the World Wide Web whose contents are not indexed by standard web search-engines.
Using multiple layers of security controls (defense) to protect information technology assets.
The trail of data you create while using the internet, including emails, social media, and browsing history.
The conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people.
The process of securing the various endpoints (laptops, mobiles, IoT) that connect to a network.
Tools designed to detect and remove malware or other malicious activities on end-user devices.
Code or a technique that takes advantage of a software vulnerability or security flaw.
The unauthorized transfer of data from a computer or other device.
A security alert that incorrectly indicates a vulnerability or threat exists.
A network security device that monitors and filters incoming and outgoing network traffic based on security rules.
Malicious software that exists exclusively in computer memory (RAM) rather than on the hard drive.
The investigation and analysis of evidence from digital devices related to computer crime.
A testing technique that inputs invalid or random data to a system to find coding errors and security loopholes.
A network point that acts as an entrance to another network, often hosting security checkpoints.
General Data Protection Regulation; a legal framework that sets guidelines for the collection and processing of personal info.
A hacker who may violate laws or ethical standards but does not have the malicious intent typical of a black hat hacker.
A comparison of actual performance with potential or desired performance, often used in security compliance.
The act of identifying and exploiting weaknesses in a computer system or network.
A fixed-size string of text generated from a file; used to verify data integrity and identify malware signatures.
A decoy system designed to attract cyberattackers to detect, deflect, or study hacking attempts.
Hypertext Transfer Protocol Secure; the secure version of HTTP, where traffic is encrypted.
The process of securing a system by reducing its vulnerability surface (e.g., removing unnecessary software).
A framework of policies and technologies for ensuring that the right users have the appropriate access to technology resources.
The organized approach to addressing and managing the aftermath of a security breach or cyberattack.
Artifacts observed on a network or in an operating system that indicate a computer intrusion with high confidence.
A security risk that originates from within the targeted organization, such as an employee or contractor.
A network security tool that continuously monitors network traffic for malicious activity and takes action to prevent it.
The process of removing software restrictions imposed by the manufacturer (common in mobile devices), which can introduce security risks.
A secure computer that administrators connect to before accessing other sensitive servers, acting as a bridge.
A standard method for securely representing claims between two parties, often used for authentication in web apps.
A malicious technique of tricking a user into clicking on something different from what the user perceives.
Malicious software that records every keystroke made by a user to steal passwords and sensitive data.
A model that describes the stages of a cyberattack, enabling defenders to stop the attack at various points.
A network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity.
A security flaw that has been documented and for which a patch or mitigation typically exists.
Techniques used by attackers to move deeper into a network from an initial entry point to search for sensitive data.
The principle that users should only be granted the minimum levels of access needed to perform their job functions.
The collective processes and policies used to administer and facilitate the generation, transmission, and analysis of audit logs.
A piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
A domain name that closely resembles a legitimate domain, often used in phishing attacks (Typosquatting).
Short for malicious software; software designed to disrupt, damage, or gain unauthorized access to a computer system.
An authentication method that requires the user to provide two or more verification factors to gain access.
An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are communicating directly.
A security technique that enables fine-grained security policies to be assigned to data center applications.
Data that describes other data; in security, it can be used to track communications without reading the content.
Dividing a computer network into smaller parts to improve performance and security by limiting the spread of attacks.
A set of guidelines and best practices for managing cybersecurity risk, developed by the National Institute of Standards and Technology.
Assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender's identity.
A firewall that adds application-level inspection and intrusion prevention to traditional port-based blocking.
Data collected from publicly available sources to be used in an intelligence context.
The Open Web Application Security Project; a foundation that works to improve the security of software.
The practice of making code difficult for humans to understand to conceal its purpose or logic (often used by malware authors).
A process that identifies critical information to determine if friendly actions can be observed by enemy intelligence.
A cybercrime in which a target is contacted by email, telephone, or text message by someone posing as a legitimate institution.
A simulated cyberattack against your computer system to check for exploitable vulnerabilities.
The process of distributing and applying updates to software to correct errors (bugs) or security vulnerabilities.
Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred.
The part of the malware code that executes the malicious action, such as destroying data or stealing passwords.
The isolation of a file or device suspected of being infected with malware to prevent the spread of infection.
A social engineering attack that uses malicious QR codes to direct victims to fraudulent websites.
Using physics principles to create secure communication channels that are theoretically unhackable.
In security, ensuring that software is free of vulnerabilities before it is deployed to production.
Malware that employs encryption to hold a victim's information at ransom.
A group of ethical hackers that simulates real-world attacks to test an organization's detection and response capabilities.
A collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed.
The process of identifying, estimating, and prioritizing information security risks.
A vulnerability that allows an attacker to run arbitrary code on a machine from a remote location.
A centralized unit that deals with security issues on an organizational and technical level.
Security Information and Event Management; software that provides real-time analysis of security alerts generated by applications and hardware.
The psychological manipulation of people into performing actions or divulging confidential information.
Information technology systems built and used within organizations without explicit approval from the IT department.
A code injection technique used to attack data-driven applications by inserting malicious SQL statements.
An isolated environment used to run and test suspicious programs without risking the host machine.
Evidence-based knowledge about existing or emerging menaces or hazards to assets.
A type of malware that is often disguised as legitimate software.
A subset of Multi-Factor Authentication that requires exactly two different forms of identification.
The practice of proactively searching for cyber threats that are lurking undetected in a network.
The process of intercepting and examining messages in order to deduce information from patterns in communication.
A security flaw in a software program or system that has not yet been fixed by the vendor or administrator.
The tracking, collecting, and assessing of user data and activities using monitoring systems to detect insider threats.
A security feature that prevents users from accessing websites known to be malicious.
When a person gains access to a computer, network, file, or other resource without permission.
A weakness which can be exploited by a threat actor, such as an attacker, to perform unauthorized actions.
A service that protects your internet connection and privacy online by creating an encrypted tunnel for your data.
A type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another.
Voice phishing; the criminal practice of using social engineering over the telephone system to gain access to private personal and financial information.
The process of managing the risks associated with third-party vendors and suppliers.
A firewall that filters, monitors, and blocks HTTP traffic to and from a web application.
A list of entities (users, IP addresses, applications) that are granted access or privileges, while all others are blocked.
A standalone malware computer program that replicates itself in order to spread to other computers.
The act of searching for Wi-Fi wireless networks, usually from a moving vehicle, using a laptop or smartphone.
Errors in software, hardware, or processes that can lead to vulnerabilities.
A vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
A security tool that integrates data from multiple security products into a centralized system for threat detection.
A standard defining the format of public key certificates, used widely in TLS/SSL web security.
A simple encryption method often used by malware authors to obfuscate data or code.
A tool used to identify and classify malware samples based on textual or binary patterns.
Builders and software architects who are responsible for designing and developing secure systems (the "Builders").
A hardware authentication device that protects access to computers, networks, and online services (Hardware Token).
Ensuring configuration files (YAML) used in cloud infrastructure are free from misconfigurations that could lead to breaches.
A vulnerability in a system or device that has been disclosed but is not yet patched.
A security model based on the principle of maintaining strict access controls and not trusting anyone by default.
A computer connected to the internet that has been compromised by a hacker, computer virus, or trojan horse.
A DNS mechanism for replicating DNS databases, which, if misconfigured, can allow attackers to map the internal network.
A cryptographic method where one party can prove to another that they know a value without conveying any information apart from the fact that they know the value.