Cybersecurity and Infrastructure Security Agency (CISA)

The Cybersecurity and Infrastructure Security Agency (CISA) is a United States federal agency within the Department of Homeland Security (DHS) charged with improving the security of the United States’ critical infrastructure and cyber infrastructure. CISA’s mission is to protect the nation’s critical infrastructure from physical and cyber threats. CISA was established in November 2018 by … Read more

Regulation of Investigatory Powers Act (RIPA)

The Regulation of Investigatory Powers Act (RIPA) is a United Kingdom law regulating the powers of public bodies to carry out surveillance and investigation, and covers the interception of communications. It was passed in 2000, and came into force in 2001. The Act provides a legal framework for the use of investigatory powers by public … Read more

Leaky app

A leaky app is a term used to describe an application that sends sensitive data over the network without proper security measures in place. This can include sending data in clear text or using outdated encryption methods. A leaky app can also refer to an app that fails to properly validate input, which can lead … Read more

Image replay attack

An image replay attack is a type of network security attack in which an attacker captures an image of a legitimate user’s screen and then replay it back to the user in order to gain access to the user’s system. This type of attack is usually carried out by malware that is installed on the … Read more

Active reconnaissance

Active reconnaissance is a type of security testing that involves actively interacting with a system in order to gather information about it. This can be done in a number of ways, such as trying to login to a system with various username and password combinations, or running a port scan to see which ports are … Read more

Presidential Policy Directive 21 (PPD-21)

Presidential Policy Directive 21 (PPD-21) is a directive issued by President Barack Obama on February 12, 2013, which establishes a comprehensive national cyber security policy. The directive sets forth a framework for securing cyberspace and critical infrastructure from cyber attacks, and sets out the roles and responsibilities of various federal agencies in carrying out the … Read more

Threat intelligence service (TI service)

A threat intelligence service is a subscription-based service that provides organizations with real-time data and analysis about the latest cyber threats. The service helps organizations to proactively defend against attacks by providing them with information about the latest malware, phishing campaigns, and other cyber threats. The service also provides guidance on how to respond to … Read more

Google dork query

A Google dork query is a specific search string that can be used to find information that has been made publicly available on the internet, but which is not necessarily easy to find using a standard search engine query. Google dorks are often used by security researchers and penetration testers to find information that can … Read more

Security theater

The term “security theater” refers to security measures that are implemented primarily for the purpose of creating an appearance of security, rather than providing actual security. These measures may make people feel more secure, but they do not actually provide any meaningful increase in security. In some cases, security theater can even decrease security, by … Read more

Blacklist

A blacklist is a list of entities that are not allowed to access a computer system or network. Blacklists are used to protect against unauthorized access, malicious software, and spam. Why is Blacklist Not on Netflix? There are a few reasons why Blacklist is not on Netflix. One reason is that the show is not … Read more