Glossary

Last updated February 13, 2025

Sort Alphabetically

A

ACL (Access Control List)

A list of permissions used to control network traffic.

Admin (Administrator) rights

The highest level of privileges a user has in the operating system (OS) of an organization; usually allowed to perform most or all functions.

Allowlisting

Historically referred to as whitelisting, Allowlisting is a ThreatLocker endpoint security module that blocks all applications from operating unless explicitly permitted.Learn more about Allowlisting

B

Back Up

Short for “Data Back Up,” a Back Up is a method of saving your devices’ data in a different online or offsite location.

C

Cloud-based

Systems, applications, and operations that are cloud-based are hosted or conducted via the internet.

D

Data Theft

The act of unauthorized, illegal transfer of confidential data, normally personal data like health records, financial data, and personal identifiable data.

Data Access Protection

A set of policies and technologies used to prevent unauthorized access to sensitive data. It includes methods like encryption, access control, and authentication to ensure only authorized users can access or modify critical data.

Data Loss (Leakage) Prevention (DLP)

Techniques and tools used to prevent the unauthorized transfer or leakage of sensitive data outside an organization’s network. DLP solutions monitor and control data flows to reduce the risk of data breaches or accidental exposure.

Data Masking

The process of obfuscating sensitive data to protect it during testing or development without compromising its integrity. Data masking helps prevent exposure of sensitive information while maintaining data accuracy for legitimate purposes.

Data Protection

Measures and strategies implemented to safeguard data from loss, unauthorized access, or corruption. Data protection involves encryption, backups, and access controls to ensure the privacy and integrity of data across its lifecycle.

Data Protection Centre/ Threat Monitoring

A dedicated facility or system that monitors data for potential security risks, ensuring that data is continuously protected. Threat monitoring involves the detection, analysis, and mitigation of cybersecurity threats to safeguard data integrity and availability.

Data Security

The practice of protecting data from unauthorized access, corruption, or theft. Data security involves encryption, user authentication, access control, and other safeguards to ensure data remains safe throughout its lifecycle.

Data Storage

Refers to the process of saving data in a secure and organized manner. Data storage systems include physical storage devices (e.g., hard drives) and cloud-based solutions, with security measures in place to protect against unauthorized access and loss.

Data-at-Rest Encryption

A technique used to protect stored data by encrypting it, ensuring that even if data is accessed by unauthorized users, it remains unreadable without the correct decryption key.

Database Security

Protecting databases from cyber threats and unauthorized access. This includes securing data from breaches, maintaining database integrity, and implementing user authentication and encryption to prevent data theft or manipulation.

Data-in-Motion/Transit (Network) Encryption and VPN

Techniques used to secure data while it is being transmitted over networks. Data-in-motion encryption ensures data is unreadable to unauthorized parties during transit, while VPNs provide secure and private connections between users and networks.

DDoS Protection

Measures and tools designed to prevent or mitigate Distributed Denial of Service (DDoS) attacks, which attempt to overwhelm systems or networks by flooding them with excessive traffic. DDoS protection helps maintain service availability.

E

EDR (Endpoint Detection and Response)

EDRs monitor and record activities and workloads taking place on a device. Using various techniques, EDRs will work to detect any suspicious activity and respond accordingly. EDR enables IT administrators to view suspicious activity in near real-time across an organization's endpoints. Focusing on behavioral patterns and unusual activity, EDRs will work to block threats and protect devices.

F

Firewall

A security program or software that filters your network traffic and prevents outsiders, including malicious threat actors, from entering your organization.

G

Golden Ticket Attack

A golden ticket attack is an attack that targets Windows Active Directory access control. Threat actors bypass normal authentication by taking advantage of a Kerberos weakness. Attackers must have access to the system before a Golden Ticket Attack can be performed.

H

Hacker

Generally, someone who uses technical skills to overcome technical problems. In cybersecurity, a hacker is referred to as a threat actor with malicious intent to access an individual’s or organization’s data unauthorized.

I

Incident Response

A strategy developed for organizations to respond to cyber threats and attacks in their network.

J

Just-in-time

Another way of saying on demand, something is enabled exactly when needed and disabled when no longer needed.

K

Kerberos

An authentication protocol used to verify the identity of a host or user.

L

LAN (Local Area Network)

A LAN is a group of electronic devices that are in the same physical location and are connected via a network.

M

Macros

A single programming instruction that expands into a set of instructions to automate actions in your device, tools, or software in order to provide a certain output per user input. Macros are commonly found in office applications like Word and Excel.

N

Network Control

An endpoint firewall that enables you to have total control over all network traffic, using dynamic ACLs, all managed from a central location.

O

Observability

The ability to understand the inner workings of a system by observing only its external manifestations

Operating System Security

The process of protecting an operating system (OS) from unauthorized access, malware, and system vulnerabilities. This includes techniques like patch management, access controls, system hardening, and encryption to ensure the integrity and confidentiality of OS data.

P

PAM (Privileged Access Management)

The ability to manage users’ admin rights within your organization on a timed basis to mitigate risk by giving users the minimum access needed.

Password Manager

A tool or software used to securely store and manage passwords for multiple accounts. Password managers help users generate strong, unique passwords and protect them from being easily accessed or stolen by unauthorized parties.

Patch Configuration and Management

The process of managing and applying updates (patches) to software, systems, and applications to fix vulnerabilities or improve functionality. Patch management ensures that systems are protected from known security threats and are kept up to date with the latest features.

Penetration Testing

A simulated cyberattack conducted to evaluate the security of an organization's systems, applications, and networks. Penetration testing identifies vulnerabilities that could be exploited by attackers and provides insights into improving security measures.

Pervasive Trust Services

A set of security measures that build and maintain trust across an organization’s entire digital ecosystem. Pervasive trust services involve ensuring secure communications, authentication, and data integrity across all systems and networks to foster confidence in digital operations.

Q

R

RaaS (Ransomware as a Service)

Business model in which a ransomware organization will develop and launch ransomware in exchange for payment by the party that wishes to target an organization.

Risk and Compliance Management

The process of identifying, assessing, and mitigating risks to an organization while ensuring compliance with regulatory requirements. This includes implementing controls, auditing systems, and developing policies to minimize legal, financial, and operational risks.

Risk and Vulnerability Assessment

A process of identifying, evaluating, and prioritizing potential risks and vulnerabilities within an organization’s IT systems and infrastructure. This assessment helps organizations understand their security posture and take necessary actions to mitigate threats.

Routers

Devices used to forward data packets between computer networks. Routers determine the best path for data transmission and play a critical role in managing network traffic, connecting different networks, and ensuring data is sent securely and efficiently.

S

Spear Phishing

Spear Phishing is a targeted Phishing attempt where a threat actor researches a specific person (usually someone with higher-level admin access to data and programs) and uses what they have learned to create a tailored phishing attempt specifically for that user.

Secure File Transfer

Methods and technologies used to transfer files over a network in a secure manner. Secure file transfer solutions use encryption and authentication protocols to ensure that sensitive files are protected during transmission and that only authorized users can access them.

Secure Web Gateway

A security solution designed to protect users from malicious websites and online threats by filtering web traffic and enforcing security policies. Secure web gateways block harmful content, protect against data leaks, and ensure safe web browsing for users.

Security Configuration Management

The process of establishing, implementing, and maintaining secure configurations for systems, applications, and networks. Security configuration management ensures that systems are set up in a secure manner to reduce vulnerabilities and potential attack surfaces.

Security Incident Management and Response

The practice of identifying, responding to, and recovering from security incidents or breaches. Security incident management ensures that an organization can quickly detect, contain, and mitigate threats, minimizing damage and restoring normal operations.

Security Information and Event Management (and Log Management)

A system that provides real-time monitoring and analysis of security events and logs across an organization’s IT infrastructure. SIEM solutions help detect threats, generate alerts, and provide insights into security incidents to facilitate faster response and investigation.

Security Operations Automation and Orchestration

The use of technology to automate and streamline security operations and incident response. Automation and orchestration help improve efficiency by enabling faster detection, response, and recovery from security threats and incidents.

Security Ratings

A system that evaluates and scores an organization’s security posture based on factors such as compliance, risk management, and cybersecurity practices. Security ratings help organizations assess their vulnerability to cyber threats and benchmark their performance against industry standards.

Security Solutions for Digital Payments

Security measures and technologies specifically designed to protect digital payment systems. This includes encryption, tokenization, and fraud detection tools to safeguard financial transactions and prevent payment fraud.

Security Training Software

Tools and platforms designed to educate employees on cybersecurity best practices and the latest threat landscape. Security training software helps organizations reduce the risk of human error by improving employee awareness and knowledge of security protocols.

SSL and Digital Certificate Authority and Management

SSL (Secure Sockets Layer) ensures secure communication over the internet through encryption. A digital certificate authority (CA) issues certificates that validate the identity of websites and organizations, enabling secure communications. Certificate management ensures certificates are properly issued, renewed, and revoked.

Storage Area Networks

A high-speed network that provides access to consolidated, block-level data storage. Storage Area Networks (SANs) enable efficient data storage management and provide increased data availability, security, and backup capabilities for enterprise environments.

Storage Security

The protection of data stored on physical or virtual storage devices. Storage security includes measures like encryption, access control, and data redundancy to prevent unauthorized access, loss, or corruption of stored data.

System Integration

The process of connecting various IT systems, applications, and hardware to work together within an organization. System integration ensures smooth data flow, enhances operational efficiency, and enables the implementation of cohesive security measures across platforms.

T

Two-Factor Authentication (2FA)

Identity and access management method that requires 2 unique forms of identification to successfully authenticate. Common authentication factors include something you know (password or passcode), something you have (hardware token or cell phone for SMS or OTC), and something you are (fingerprint, face ID). Combine 2 unique factors to create a more secure login such as a password and OTC or face ID and a passcode.

Theft Security

Security measures designed to prevent the theft of physical assets, such as hardware, equipment, or data. Theft security includes physical security measures like alarms, access control systems, and surveillance, as well as digital protection for sensitive data.

Threat Intelligence and Signature Feeds

Threat intelligence involves the collection and analysis of information about emerging or ongoing cyber threats to help organizations proactively defend against attacks. Signature feeds provide predefined patterns (signatures) of known threats to help security systems identify and block malicious activities.

U

Unified Audit

A unified audit combines multiple logs into a single location. The ThreatLocker® Unified Audit is the central location within the ThreatLocker® portal to view all logged application, storage, and network activity for your organization.

Unified Threat Management

An integrated security solution that combines multiple security technologies, such as firewalls, intrusion prevention systems (IPS), and antivirus protection, into a single platform. Unified threat management simplifies security management and improves efficiency by providing a comprehensive defense against various threats.

User Rights Management

The process of managing user access to systems, applications, and data based on their role and responsibility within the organization. User rights management ensures that users have appropriate access to resources while minimizing the risk of unauthorized access or data breaches.

V

Virtual Desktop Infrastructure (VDI)

VDIs are virtual desktops that are centrally hosted and managed. End users can log into the VDI from any location via a secure connection to further protect business data while permitting access to their work data. Physical hardware need not be supplied to employees, and businesses can easily maintain the security of the VDIs using the virtualization platform. The ThreatLocker® Testing Environment uses a VDI where admins can test untrusted applications without risking their critical business production environment.

Voice Encryption Devices

Devices designed to encrypt voice communications, ensuring that sensitive voice data remains secure during transmission. Voice encryption helps prevent eavesdropping and unauthorized access to private conversations, particularly in industries with high-security requirements.

Vulnerability Assessment

The process of identifying and evaluating vulnerabilities in a system, application, or network. Vulnerability assessments help organizations understand security weaknesses, prioritize risks, and take action to reduce the potential for exploitation by cybercriminals.

W

Weaponization

Weaponization is the act of using something that by itself is not harmful in a malicious manner to inflict harm, I.e., using a Word document to embed a macro that attempts to contact a command and control center on the internet.

Wireless/Mobile Security Systems

Security measures designed to protect wireless networks and mobile devices from cyber threats. Wireless and mobile security systems include encryption, access controls, VPNs, and threat detection tools to prevent unauthorized access and ensure data privacy.

X

Y

Z

Zero-Day Vulnerabilities

A zero-day attack occurs when the developers are unaware of a vulnerability within a software, device, or network that becomes exploited by threat actors. The vulnerability, in this case, is known as a zero-day vulnerability. These "zero-day" vulnerabilities get their name from developers having zero days to implement responses and solutions for the exploited vulnerability.

Zero Trust

Zero Trust is a cybersecurity philosophy in which nothing (no users, no devices, etc.) is trusted by default, and everything is verified. Instead, all users, applications, network connections will be blocked by default until verified and expressly permitted. Once permitted, users, applications and network connections will only be allowed what is needed to carry out business, and nothing more.

Copyright © 2024 Virtuthinko W. L. L. All right reserved.