Archives: Glossary Terms
-
AES – Advanced Encryption Standard
AES (Advanced Encryption Standard) is a widely adopted symmetric block cipher algorithm used to encrypt electronic data. Here’s a breakdown Read more
-
API – Application Programming Interface
API refers to the Application Programming Interface, and API security is the practice of protecting these interfaces from attacks. Here’s Read more
-
Botnet
A Botnet is a network of computers or devices infected with malware and controlled by an attacker, often without the Read more
-
C2 Command & Control
Command and Control (C2) refers to the mechanisms that attackers use to communicate with and control compromised systems within a Read more
-
CEF – Common Event Format
Common Event Format. It is an open standard format for logging security events that is designed to help organizations aggregate Read more
-
CIA Triad
CIA Triad The CIA Triad is a foundational model in cybersecurity that defines the key principles for ensuring secure systems Read more
-
CVE – Common Vulnerabilities and Exposures
CVE is a publicly accessible list or dictionary that catalogs known security flaws (vulnerabilities) and security-related issues (exposures) in software Read more
-
CVSS – Common Vulnerability Scoring System
Common Vulnerability Scoring System In simpler terms: Imagine CVSS as a standardized scale for measuring the “danger” of a software Read more
-
DDOS – Distributed Denial of Service
Distributed Denial of Service attack is a malicious attempt to disrupt the normal functioning of a target—such as a website, Read more
-
DER – Distinguished Encoding Rules
Definition: In cybersecurity, DER – Distinguished Encoding Rules is a strictly defined subset of the Basic Encoding Rules (BER) used Read more
