About CTM360
CTM360 is a collaborative and resourceful platform which enables entities to leverage the power of collectiveness in order to address the ever-growing landscape of cyber attacks. We offer a broad-range of prevention, detection, analysis and response services.
Get in Touch
  •   Office 1002, 10th Floor
       Orchid Business Center, Seef
  •   +973 77 360 360
  •   +973 77 361 361
  •   info@ctm360.com
open

Threat Glossary

 Home / Resources / Threat Glossary
Term Definition
Dark Web
Restricted and non-indexed. The Dark Web (also called Darknet) is a subset of the Deep Web that is not only not indexed, but that also requires something special to be able to access it, e.g., specific proxying software or authentication to gain access. The Dark Web often sits on top of additional sub-networks, such as Tor, I2P, and Freenet, and is often associated with criminal activity of various degrees, including buying and selling drugs, pornography, gambling, etc. While the Dark Web is definitely used for those things more than the standard Internet or the Deep Web, there are many legitimate uses for the Dark Web as well.
Data leakage
Client's confidential data being published anywhere on the internet inclusive of Email addresses
DDoS
In computing, a denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. Distributed denial-of-service attacks are sent by two or more persons, or bots, and denial-of-service attacks are sent by one person or system.
De-indexing in search engines
Removing fradulent sites from search engine rankings
Deep Web
Accessible and non-indexed. The deep web is a subset of the Internet that is not indexed by the major search engines. This means that you have to visit those places directly instead of being able to search for them. So there aren
Defensive (Domain) Registration
Buy more domain names, "just in case."
Delist domains from RBLs
Removing links/emails from Blackhole list
DMCA takedown notice
Articles which are suspended on the basis of a DMCA notice
DNS poisoning
DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) name server's cache database, causing the name server to return an incorrect IP address, diverting traffic to another computer
DNS Record
List of DNS record types is an overview of resource records (RRs) permissible in zone files of the Domain Name System (DNS)
DNS record
List of DNS record types is an overview of resource records (RRs) permissible in zone files of the Domain Name System (DNS)
Domain expiry
The expiration of a domain (after which it will no longer be online)
Domain Management
Domain portfolio management services are dedicated services offered to help companies to manage big portfolio of domain name
Domain parking
Registration of an internet domain name without that domain being associated with any services
Domain Registrar
A domain name registrar is an organization or commercial entity that manages the reservation of Internet domain names.

Contact Us

  •   Office 1002, 10th Floor,
  •      Orchid Business Center, Seef 
  •   +973 77 360 360
  •   +973 77 360 361
  • info@ctm360.com