Confidentiality, integrity and availability (CIA triad)

The CIA triad is a security model consisting of the three components of confidentiality, integrity, and availability. The model is used to guide security efforts and assess the security of an information system. The confidentiality component ensures that information is only accessible to authorized users. The integrity component ensures that information is accurate and complete. … Read more

SIGINT (signals intelligence)

SIGINT (signals intelligence) is a category of intelligence that deals with the interception and analysis of enemy communications and electronic signals. It is a critical tool in modern warfare, as it can provide information on the enemy’s plans, movements, and intentions. SIGINT can be used to track the movements of enemy forces, and to intercept … Read more

Performance crime

A performance crime is defined as any illegal act committed in order to obtain or maintain a competitive advantage over others. These types of crimes are usually motivated by financial gain, but can also be motivated by power, prestige, or other personal gain. Performance crimes can be divided into two main categories: economic crimes and … Read more

Romance scam

A romance scam is a type of online fraud whereby a person pretends to be interested in a romantic relationship with another person in order to obtain financial gain. The scammer typically uses false identities and fake photos in order to create an attractive online persona, and will often spend weeks or months building up … Read more

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP) is a website that allows Internet users to check whether their personal data has been compromised by data breaches. The website was created in 2013 by Australian security researcher Troy Hunt. HIBP maintains a database of known data breaches, which is sourced from public data breach notifications, as well as … Read more

COMINT (communications intelligence)

COMINT is short for Communications Intelligence. This type of intelligence deals with the interception and analysis of communications in order to glean information about an adversary. COMINT can be used to track the movements of an adversary, to understand their intentions and capabilities, and to monitor their communications in order to disrupt their plans. What … Read more

POODLE attack

The POODLE attack is a type of security exploit that takes advantage of the way some SSL/TLS implementations handle padding. By manipulating the padding, an attacker can decrypt data that would otherwise be encrypted. The POODLE attack was first described by a team of security researchers in 2014. The name “POODLE” is an acronym for … Read more

Double blind test

A double blind test is a test in which neither the subjects nor the researchers know which subjects are receiving the experimental treatment and which are receiving the control treatment. This is done to prevent any bias on the part of either the subjects or the researchers that could influence the results of the test. … Read more

Counterintelligence

Counterintelligence is the process of identifying, assessing, and taking action to counter intelligence threats. It includes activities like identifying and countering espionage, sabotage, and subversion. What is the meaning of counter intelligence? The definition of counterintelligence is “information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or … Read more

ELINT (electronic intelligence)

ELINT is short for electronic intelligence. It refers to intelligence gathering by interception of electromagnetic radiation (such as radar signals) emitted by electronic devices. ELINT can be used to gather information about the capabilities and intentions of an adversary. ELINT gathering can be performed passively, by simply intercepting and analyzing emissions from adversary electronic devices, … Read more