top of page

Cyber Terminologies and Fundamentals

Definitions 

Gray Hat Hacker

A hacker who may break laws or ethical standards but without malicious intent.

Governance, Risk, and Compliance (GRC)

A framework for managing an organization's overall governance, enterprise risk management, and compliance with regulations.

Group Policy Security

Security settings in Microsoft Windows environments that control user and computer configurations.

Global Threat Intelligence

Real-time information sharing on cybersecurity threats and vulnerabilities across organizations and nations.

Geofencing Security

Using geographic boundaries to restrict or allow access to digital resources.

Google Dorking

A hacking technique that uses advanced Google search queries to find sensitive information.

Graph-Based Threat Analysis

Using graph theory to analyze relationships between cybersecurity threats and anomalies.

GNU Privacy Guard (GPG)

A free software implementation of the OpenPGP encryption standard.

Ground Truthing

The process of validating cybersecurity threat intelligence data to ensure accuracy.

GPU-Based Attacks

Exploiting graphics processing units (GPUs) to perform cryptographic attacks or accelerate password cracking.

Gateway Security

Protecting network gateways from cyber threats through firewalls, antivirus, and intrusion detection.

GPG Encryption

A method of encrypting and decrypting emails and files using GNU Privacy Guard.

Grandmaster Key Exploit

A vulnerability that allows attackers to gain complete control over a cryptographic system.

GSM Security

Measures to protect Global System for Mobile (GSM) communications from eavesdropping and attacks.

Ghost Phishing

A phishing attack that mimics legitimate communication channels to deceive victims.

GRC Automation

Using automation tools to streamline governance, risk management, and compliance processes.

Guest Network Security

Measures to protect guest Wi-Fi networks from cyber threats and unauthorized access.

Garbled Malware

Malware that has been intentionally obfuscated to evade detection by security tools.

Generative Adversarial Networks (GANs) in Security

AI models used in cybersecurity for both offensive and defensive applications.

Government Surveillance

Monitoring digital communications and online activities by government agencies for security purposes.

bottom of page