Passive attack

A passive attack is a type of network attack in which an attacker does not directly interact with the target system or network. Instead, the attacker observes and monitors the target system or network in order to gather information that can be used to launch a more sophisticated attack at a later time. Passive attacks … Read more

Session replay script

A session replay script is a piece of code that allows you to record and replay user sessions on your website. This can be useful for debugging purposes, or for recording user interactions for later analysis. Session replay scripts work by recording all of the user input and output during a session, and then playback … Read more

CERT-In (the Indian Computer Emergency Response Team)

The Indian Computer Emergency Response Team (CERT-In) is a nodal agency of the Government of India which deals with cyber security threats. It is responsible for coordinating and responding to computer security incidents, providing support and guidance to Indian businesses and individuals, and raising awareness of cybersecurity issues. CERT-In also works with international organisations to … Read more

Stingray (IMSI catcher)

An IMSI catcher is a piece of radio equipment that is used to track the location of mobile phones. It works by masquerading as a cell phone tower in order to intercept the signal from a mobile phone. The IMSI catcher then records the International Mobile Subscriber Identity (IMSI) of the phone, which can be … Read more

Critical infrastructure and key resources (CIKR)

Critical infrastructure and key resources (CIKR) are those physical and cyber systems and assets that are so vital to the United States that their incapacitation or destruction would have a debilitating impact on national security, economic security, public health and safety, or any combination thereof. CIKR includes, but is not limited to, the following 16 … Read more

Mobile security certification

A mobile security certification is a type of security certification that is specifically designed for mobile devices. These certifications are designed to ensure that mobile devices are able to meet certain security standards. Mobile security certification programs typically test for a variety of security risks, such as data loss, device theft, and malware infections. In … Read more

Security event

A security event is a network incident that represents a potential security threat. Security events can be generated by malicious activity, such as an attempted network intrusion, or by suspicious activity that may not be malicious but could still pose a security risk. Tracking and analyzing security events is an important part of any security … Read more

Air gapping (air gap attack)

Air gapping is the process of physically isolating a computer or network from unsecured networks, such as the Internet. Air gapping is used as a security measure to prevent sensitive data from being exposed to potential threats, such as malware or hackers. Air gapping can be achieved by physically separating the computer or network from … Read more

Offensive security

Offensive security is a security methodology that focuses on identifying, exploiting, and mitigating security vulnerabilities in order to protect systems and data from attack. Unlike traditional security approaches that focus on preventing attacks, offensive security proactively seeks to find and exploit vulnerabilities before they can be exploited by attackers. Offensive security can be used to … Read more

WIPS (wireless intrusion prevention system)

A WIPS is a system designed to detect and prevent unauthorized access to a wireless network. It typically consists of a hardware device, such as a router or access point, that is configured to monitor and analyze wireless traffic for signs of intrusion. If an intrusion is detected, the WIPS can take action to block … Read more