Frequently Used Terms

We do our best to try and minimize the use of jargon and fancy techie words in our blog posts.  Sometimes the jargon is inevitable due to the technical nature of what we are writing about.  We have come up with this list of frequently used terms.  We will reference these from time to time in our posts to enhance the clarity of the topic we are writing about.

Security Terms

Attack vector – Used to describe the method and pathway that a hacker uses to access or penetrate the target they are trying to reach and compromise. 

Business Email Compromise – Scams that usually involve a financial impact by impersonation of senior executives asking for what appears to be a legitimate request.  These targets of these requests are usually those that are responsible for accounting, finance or HR functions. 

Complex password – passwords that are constructed using a series of upper- and lower-case letters, numbers, and symbols.  An increasingly popular approach is to string together several phrases, usually unrelated, and separate them with symbols such as the dollar sign, and exclamation point, a hash tag or the ampersand symbol. 

Cyber Insurance – Insurance policies offered by many insurance carriers that offers financial protection in the event of a data breach.  The policies often include both liability protection as well as financial protection.  Keep in mind these policies usually require the policy holder to make “reasonable attempts” to protect their digital assets and network infrastructure and be able to prove it. 

Dark web – The dark web usually refers to pages that are not discovered by search engines, like Google and Bing, and contain content that are usually involved with illegal activities.  This term is often interchanged with the deep web, which is not accurate. 

Data breach – An incident is where information is stolen or taken from a system without the knowledge or authorization of the system’s owner.  Data breaches can happen to both small companies and large companies and involve many types of sensitive, proprietary, or confidential information. 

Deep Web – A term that refers to non-indexed pages, or pages that are not scanned and indexed by search engines.  Typically, dark web content is hidden from search engines in various technical ways and DOES NOT usually involve illegal activities.  Michael K. Bergman is credited with first using this term in 2001.  

Keylogger  Either a hardware device or software code that is used to capture the keystrokes that are entered by the user via the keyboard or in some cases via a touch screen. 

Threat actor  A threat actor is a person or entity that is responsible for an event or incident that impacts the safety or security of another entity.