top of page

Cyber Terminologies and Fundamentals

Definitions 

Multi-Factor Authentication (MFA)

A security method requiring multiple forms of verification for access.

Malware Analysis

The process of examining malicious software to understand its behavior and impact.

Man-in-the-Middle Attack (MitM)

A cyberattack where an attacker intercepts and alters communications between parties.

Machine Learning in Cybersecurity

The use of AI to detect threats, anomalies, and enhance security defenses.

Memory Corruption

A vulnerability where unintended modifications to memory lead to crashes or exploits.

Mobile Device Management (MDM) Security

Solutions ensuring secure access, compliance, and protection for mobile devices.

Macros in Malware

Malicious scripts embedded in documents to execute unauthorized actions.

Metasploit Framework

A popular penetration testing tool for discovering and exploiting vulnerabilities.

Malvertising

The use of malicious online ads to distribute malware or launch attacks.

Mimikatz

A hacking tool used to extract passwords and credentials from Windows systems.

Memory Dump Analysis

Examining system memory snapshots to detect malware or forensic evidence.

Microservices Security

Protecting decentralized application components from cyber threats and vulnerabilities.

Message Authentication Code (MAC)

A cryptographic checksum ensuring data integrity and authenticity.

Malware Persistence Mechanisms

Techniques used by malware to maintain access and survive reboots.

Macro Virus

A type of malware that exploits macros in applications like Microsoft Office.

Mobile Spyware

Malicious software designed to secretly monitor and steal mobile device data.

Malicious Code Obfuscation

Techniques to disguise malware code to evade detection and analysis.

Managed Security Services (MSS)

Outsourced security solutions providing monitoring and threat response.

Memory Forensics

Analyzing volatile memory for evidence of cyber threats and malicious activity.

Malware-as-a-Service (MaaS)

A cybercrime model where malware is sold or rented to attackers.

bottom of page