Cybersecurity Terminology

ResourcesTerms & Definitions

capability
- The means to accomplish a mission, function, or objective.
Catphish
- the fabrication of a false online identity by a cybercriminal for the purposes of deception, fraud, or exploitation
ciphertext
- Data or information in its encrypted form.
cloud computing
- A model for enabling on-demand network access to a shared pool of configurable computing capabilities or resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
collect & operate
- A NICE Framework category consisting of specialty areas responsible for specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence.
collection operations
- In the NICE Framework, cybersecurity work where a person: Executes collection using appropriate strategies and within the priorities established through the collection management process.
computer network defense
- The actions taken to defend against unauthorized activity within computer networks.
computer network defense analysis
- In the NICE Framework, cybersecurity work where a person: Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network in order to protect information, information systems, and networks from threats.
computer network defense infrastructure support
- In the NICE Framework, cybersecurity work where a person: Tests, implements, deploys, maintains, reviews, and administers the infrastructure hardware and software that are required to effectively manage the computer network defense service provider network and resources; monitors network to actively remediate unauthorized activities.
confidentiality
- A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
consequence
- The effect of an event, incident, or occurrence.
continuity of operations plan
- A document that sets forth procedures for the continued performance of core capabilities and critical operations during any disruption or potential disruption.
CounterIntel (Counter Intelligence)
- monitoring other competitor organizations and nations to gather information
crimeware
- a class of malware designed specifically to automate cybercrime
critical infrastructure
- The systems and assets, whether physical or virtual, so vital to society that the incapacity or destruction of such may have a debilitating impact on the security, economy, public health or safety, environment, or any combination of these matters.
cryptanalysis
- The operations performed in defeating or circumventing cryptographic protection of information by applying mathematical techniques and without an initial knowledge of the key employed in providing the protection.
cryptocurrrency
- a digital currency in which transactions are verified and records maintained by a decentralized system using cryptography, rather than by a centralized authority.
cryptographic algorithm
- A well-defined computational procedure that takes variable inputs, including a cryptographic key, and produces an output.
cryptography
- The use of mathematical techniques to provide security services, such as confidentiality, data integrity, entity authentication, and data origin authentication.
Cryptojacking
- a type of cybercrime that involves the unauthorized use of a target's devices (computers, smartphones, tablets, or even servers) by cybercriminals to mine for cryptocurrency
cryptology
- The mathematical science that deals with cryptanalysis and cryptography.
cryptomalware
- is malware that encrypts data on the targets device and demands a ransom to restore it
Cryptominers
- Cryptomining is an online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” cryptocurrencies.
customer service and technical support
- In the NICE Framework, cybersecurity work where a person: Addresses problems, installs, configures, troubleshoots, and provides maintenance and training in response to customer requirements or inquiries (e.g., tiered-level customer support).
cyber ecosystem
- The interconnected information infrastructure of interactions among persons, processes, data, and information and communications technologies, along with the environment and conditions that influence those interactions.
cyber exercise
- A planned event during which an organization simulates a cyber disruption to develop or test capabilities such as preventing, detecting, mitigating, responding to or recovering from the disruption.
cyber infrastructure
- An electronic information and communications systems and services and the information contained therein.
cyber operations
- In the NICE Framework, cybersecurity work where a person: Performs activities to gather evidence on criminal or foreign intelligence entities in order to mitigate possible or real-time threats, protect against espionage or insider threats, foreign sabotage, international terrorist activities, or to support other intelligence activities.
cyber operations planning
- in the NICE Framework, cybersecurity work where a person: Performs in-depth joint targeting and cyber planning process. Gathers information and develops detailed Operational Plans and Orders supporting requirements. Conducts strategic and operational-level planning across the full range of operations for integrated information and cyberspace operations.
cyber threat intelligence (CTI)
- The collecting, processing, organizing, and analyzing data into actionable information that relates to capabilities, opportunities, actions, and intent of adversaries in the cyber domain to meet a specific requirement determined by and informing decision-makers.
Cyberattack
- a malicious and deliberate attempt to breach the information system
cyberespionage
- or cyber spying, is a type of cyberattack in which an unauthorized user attempts to access sensitive or classified data or intellectual property (IP) for economic gain, competitive advantage or political reasons
Cybersecuring
- the process of hardening technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks
cybersecurity
- The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
cybersecurity-aware
- knowing what security threats are and acting responsibly to avoid potential risks.
cyberthreats
- refers to anything that has the potential to cause serious harm to a computer system
cyberwarfare
- typically defined as a set of actions by a nation or organization to attack countries or institutions' computer network systems with the intention of disrupting, damaging, or destroying infrastructure by computer viruses or denial-of-service attacks
CyberWarrior
- an individual who participates in cyberwarfare, motivated either by personal, patriotic, or religious reasons, but not due to professional requirement
microsoft-logo
ibm-logo
dell-logo
hp-logo
sentinel-logo
vmware-logo
Skip to content