Quick Navigation

RED TEAM#1

A group that simulates cyber attacks to identify vulnerabilities in an organization's defenses.

BLUE TEAM#2

The defense team responsible for protecting an organization from cyber threats and responding to incidents.

CYBER ATTACK#3

An attempt to damage, disrupt, or gain unauthorized access to computer systems or networks.

INCIDENT RESPONSE#4

A structured approach to managing and addressing security breaches or cyber incidents.

DEFENSE MECHANISMS#5

Strategies and tools used to protect systems from cyber threats and attacks.

ATTACK VECTOR#6

The path or method used by an attacker to breach a system or network.

PENETRATION TESTING#7

An authorized simulated cyber attack to evaluate the security of a system.

VULNERABILITY ASSESSMENT#8

A systematic evaluation of security weaknesses in a system or network.

RISK ASSESSMENT#9

The process of identifying and analyzing potential risks to an organization's assets.

SOC (SECURITY OPERATIONS CENTER)#10

A centralized unit that monitors and analyzes an organization's security posture.

THREAT INTELLIGENCE#11

Information that helps organizations understand potential cyber threats and vulnerabilities.

TABLETOP EXERCISE#12

A discussion-based exercise to evaluate an organization's response to simulated incidents.

MITRE ATT&CK#13

A knowledge base of adversary tactics and techniques used in cyber attacks.

ADAPTIVE DEFENSE#14

A dynamic approach to cybersecurity that adjusts defenses based on emerging threats.

MOCK DRILL#15

A practice exercise simulating a cybersecurity incident to test response plans.

COMMUNICATION STRATEGY#16

A plan for effectively sharing information during a cybersecurity incident.

SECURITY POLICY#17

A formalized set of rules and guidelines governing an organization's security practices.

FIREWALL#18

A network security device that monitors and controls incoming and outgoing traffic.

ENCRYPTION#19

The process of converting information into a code to prevent unauthorized access.

LOG MANAGEMENT#20

The process of collecting, storing, and analyzing log data for security purposes.

SECURITY INCIDENT#21

Any event that compromises the integrity, confidentiality, or availability of information.

RESPONSE PLAN#22

A documented strategy outlining how to respond to specific types of security incidents.

POST-INCIDENT ANALYSIS#23

A review conducted after an incident to assess response effectiveness and improve future strategies.

CYBERSECURITY FRAMEWORK#24

A set of guidelines for managing cybersecurity risks and improving security posture.

SOCIAL ENGINEERING#25

Manipulative tactics used to trick individuals into divulging confidential information.

ZERO-DAY EXPLOIT#26

A cyber attack that occurs on the same day a vulnerability is discovered.