adversarial machine learning

The term adversarial machine learning describes all possible defense measures against cyber attacks on machine learning models.

Adversarial ML Threat Matrix

The Adversarial ML Threat Matrix is a framework aimed at detecting and resolving cybersecurity threats in ML systems. The Adversarial ML Threat Matrix is based on the MITRE ATT&CK Matrix.

Authorization

Authorization Authorization works right after authentication, in order to grant access and permissions to an identity requesting access to IT resources. The most common authorization protocol is OAuth, now in OAuth 2.0 version. At least one and a resource owner are involved in the authorization process. Authorization works by having an authorization server assign access ... Read more

DDOS

DDOS DDOS stands for distributed denial-of-service attack (DoS attack). It uses similar approach to Denial of Service (DOS) but in this case, the DOS cyber attack is distributed from numerous source networks.

Dioptra

Dioptra is a software test platform for assessing the trustworthy characteristics of artificial intelligence (AI). Dioptra excels in the area of Adversarial Machine Learning (AML). More details can be found in the official project web site at: https://pages.nist.gov/dioptra/index.html.

DRaaS

DRaaS (Disaster Recovery As A Service) is a managed service in which disaster recovery is offered as a cloud service. Disaster recovery includes business continuity (BCDR) and backup as a service (BaaS). DRaaS management server can be either an on-premise or a cloud server. There are various DRaaS providers, most of which are already providing ... Read more

GDPR

GDPR stands for General Data Protection Regulation. It is a privacy-related set of regulations in the European Union (EU) which controls how personally identifiable data (PID) is stored, processed and deleted from computing systems. In GDPR the two basic roles in a system which are related to the processing of data are the GDPR controller ... Read more

Jasypt

Jasypt is a java library which allows developers to add basic encryption to applications.

MFA

MFA Multi-factor authentication (MFA) is the process of authenticating an identity into a computing system, application or service by providing at least two of the following authentication factors: The following list provides the most common MFA factor implemented today by security companies:

penetration test

A penetration test in cybersecurity is a test which uses security utilities to evaluate the levels of cybersecurity of an infrastructure and/or applications by executing an authorized attack on a number of systems.

PII

PII stands for personally identifiable information. This refers to information (data) which must be protected to ensure the privacy of the people described by that information.

principle of least privilege

The principle of least privilege is a cybersecurity principle by which a user is only given the permissions they need to do their job, and no more than that. For example, joining a Windows Server virtual machine to an Active Directory domain does not necessarily require an admin to be a domain administrator but rather ... Read more

privacy by design

Privacy by design is an approach to software development which takes privacy into account throughout every phase of development. This involves strict cybersecurity design rules embedded into the software development process, including proper unit testing.

QR code

QR code QR code (Quick Response code) is a type of two-dimensional (2D) matrix barcode.

SaaS

SaaS stands for Software As A Service or Security As A Service.

SOC

SoC stands for: System on a Chip. It is an integrated circuit design and manufacturing method in which all components of an autonomous electronic system are integrated into a single IC. Security Operations Center. It is the overall platform comprising services and tools which offer an end-to-end cybersecurity proactive protection and management solution. A SoC ... Read more

Strong Authentication

Strong Authentication (SA) Strong authentication assumes the usage of Multi-factor authentication (MFA) as a baseline, but goes beyond that with other authentication means. Strong authentication employs National Institute for Standards and Technology (NIST) assurance level-2 or assurance level-3. More details about strong authentication can be found at: https://www.yubico.com/resources/glossary/strong-authentication/.

Zero day exploit

Zero day exploit A zero day exploit (also called a zero-day threat) is an attack that takes advantage of a security vulnerability that does not have a fix in place. It is referred to as a "zero-day" threat because once the flaw is eventually discovered, the developer or organization has "zero days" to then come ... Read more

zerto

Zerto is a software development and cloud service provider company offering Disaster Recovery As A Service (DRaaS) solutions. They also offer a Disaster Recovery (DR) technical term dictionary at https://www.zerto.com/resources/a-to-zerto/.