CERT-In (the Indian Computer Emergency Response Team)

The Indian Computer Emergency Response Team (CERT-In) is a nodal agency of the Government of India which deals with cyber security threats. It is responsible for coordinating and responding to computer security incidents, providing support and guidance to Indian businesses and individuals, and raising awareness of cybersecurity issues. CERT-In also works with international organisations to … Read more

Stingray (IMSI catcher)

An IMSI catcher is a piece of radio equipment that is used to track the location of mobile phones. It works by masquerading as a cell phone tower in order to intercept the signal from a mobile phone. The IMSI catcher then records the International Mobile Subscriber Identity (IMSI) of the phone, which can be … Read more

Critical infrastructure and key resources (CIKR)

Critical infrastructure and key resources (CIKR) are those physical and cyber systems and assets that are so vital to the United States that their incapacitation or destruction would have a debilitating impact on national security, economic security, public health and safety, or any combination thereof. CIKR includes, but is not limited to, the following 16 … Read more

Mobile security certification

A mobile security certification is a type of security certification that is specifically designed for mobile devices. These certifications are designed to ensure that mobile devices are able to meet certain security standards. Mobile security certification programs typically test for a variety of security risks, such as data loss, device theft, and malware infections. In … Read more

Security event

A security event is a network incident that represents a potential security threat. Security events can be generated by malicious activity, such as an attempted network intrusion, or by suspicious activity that may not be malicious but could still pose a security risk. Tracking and analyzing security events is an important part of any security … Read more

Air gapping (air gap attack)

Air gapping is the process of physically isolating a computer or network from unsecured networks, such as the Internet. Air gapping is used as a security measure to prevent sensitive data from being exposed to potential threats, such as malware or hackers. Air gapping can be achieved by physically separating the computer or network from … Read more

Offensive security

Offensive security is a security methodology that focuses on identifying, exploiting, and mitigating security vulnerabilities in order to protect systems and data from attack. Unlike traditional security approaches that focus on preventing attacks, offensive security proactively seeks to find and exploit vulnerabilities before they can be exploited by attackers. Offensive security can be used to … Read more

WIPS (wireless intrusion prevention system)

A WIPS is a system designed to detect and prevent unauthorized access to a wireless network. It typically consists of a hardware device, such as a router or access point, that is configured to monitor and analyze wireless traffic for signs of intrusion. If an intrusion is detected, the WIPS can take action to block … Read more

Owned

The term “owned” is used to describe a system that has been compromised by an attacker. This can mean that the attacker has complete control over the system, or simply that they have access to sensitive data or functionality that they should not have access to. Owned systems are often used as a foothold by … Read more

Adaptive security

Adaptive security is a type of security that is constantly changing and evolving in order to better protect against new threats. It is a proactive approach to security that uses a variety of techniques to stay one step ahead of attackers. Adaptive security begins with a strong foundation of security best practices. This includes things … Read more