Archives: Glossary

Secure Sockets Layer (SSL) Certificate

Definition: a digital certificate that encrypts data between a web browser and a server. The certificate authenticates the identity of a website owner and establishes a secure connection. Without an [...]
Read more

Remote Administration Trojan (RAT)

Definition: also known as Remote Administration Tool – this is a type of malware in which is tricked into installing a malicious file onto their computer. Once installed, an attacker [...]
Read more

Remediation management

Definition: the process of identifying, prioritising and addressing issues, vulnerabilities or weaknesses in an organisation’s systems, networks or processes.
Read more

Red Team

Definition: a group of ethical hackers that are authorised and organised to simulate a cyber attack against an organisation’s security.
Read more

Ransomware

Definition: a type of malware which demands a ransom payment from the infected victim. Typically, the victim’s files are forcibly encrypted, and a payment is required to decrypt them.
Read more

Purple Team

Definition: a collaboration between both the red team and the blue team. Together, they can assess and improve an organisation’s security by simulating attacks and defenses.
Read more

Phishing

Definition: a form of social engineering in which a victim is deceived into giving up their personal information. That may be passwords, financial information, or other sensitive data. This typically [...]
Read more

Penetration testing

Definition: an ethical hacker simulates a cyber-attack on your computer system, network, or application, then provides a report on the weak points that are found.
Read more

Patch management

Definition: the process of identifying, acquiring, testing and applying software updates (patches) to fix security weaknesses. This is essential to remaining secure and requires daily scanning to ensure it remains [...]
Read more