AnalysisAbuse Box feedAn email box where users may submit complaints against any concerned domain. Mandated according to IEEE's regulations.
AnalysisBack links / Inward linksA backlink is any link received by a web node (web page, directory, website, or top level domain) from another web node.
AnalysisDomain Registration AlertsCTM360 Domain Registration Alerts to detect typosquatting, cybersquatted or potential phishing or cyber evil twin websites
AnalysisMail bounce back feedMail bounce back are system generated files when emails are not sent due to a wrong email or there is an inbox space issue. The same mail bounce back feed may also be leveraged by attackers
AnalysisMonitoring Domain for up/downMonitoring the availability and performance of web pages of web applications. When not accessible, notifications are sent and corrective actions can be triggered. Website performance monitoring feature checks for various attributes such as response time, etc.
AnalysisMonitoring URL for contentChecks a single URL for its availability, and then continues to search the page for a predefined string of text. If an identical text string isn't identified, an alert is sent to the Monitoring Team. Ideal for sites that demand uptime, contain several critical pages, dynamic content or complex applications/environments.
AnalysisPassive honey potA method of acquiring spam for analysis, via planting of bogus email addresses which are rigged to forward emails to a specific mailbox.
AnalysisPhish taggingDatabase with phish links
AnalysisSpam Feed Processing Scoring various aspects of a spam email, often with a different weightage.
AnalysisReverse WHOISThe Reverse whois will do a reverse IP lookup. If an IP address is typed, it will attempt to locate a DNS PTR record for that IP address. Reverse WHOIS provides clients with ownership and relationship information for entities on the Internet, including domain names, IP addresses, registrars, registries and ISPs.
AnalysisWHOISPronounced "WHO IS," this is a query and response protocol that is widely used for querying databases that store information on registered users
AnalysisSearch Engine rankingRefers to the position at which a particular site appears in the results of a search engine query
AnalysisText sharing sitesWebsites that provide online storage of text, similar to an online Notepad. Often, a source for copywrite infringement
AnalysisWRLAWeb Referral Log Analyzer: This is a small & simple tool, used for the early detection of Phish attacks. This tool extracts Suspicious URLs from the web server's referral logs, compares it with white list & sends the rest of the URL' to a specified email. The SOC team may analyze those emails & take necessary actions if required.
AttackBrand InfringementBrand infringement is an encroachment, violation, misappropriation, and/or disparagement of a message, identity, goodwill, talent, work, products, and intellectual property rights of a brand.
AttackBrand jackingActivity whereby someone acquires or otherwise assumes the online identity of another entity for the purposes of acquiring that person's or business's brand equity.
AttackCybersquattingDomain name similar to any of client domains with slight variations in spelling
AttackData leakageClient's confidential data being published anywhere on the internet inclusive of Email addresses
AttackDDoSIn computing, a denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users.

Distributed denial-of-service attacks are sent by two or more persons, or bots, whereas denial-of-service attacks are sent by one person or system.
AttackDefacementWebsite defacement is an attack on a website that changes the visual appearance of the site or a webpage. These are typically the work of system crackers, who break into a web server and replace the hosted website with one of their own. Defacement is generally meant as a kind of electronic graffiti, although recently it has become a means to spread messages by politically motivated "cyber protesters" or hacktivists.
The most common method of defacement is using SQL injections which allows gaining administrative access. Another method of defacement is through FTP once the username and password are obtained.
AttackDNS poisoningDNS spoofing (or DNS cache poisoning) is an attack whereby data is introduced into a Domain Name System (DNS) name server's cache database, causing the name server to return an incorrect IP address, diverting traffic to another computer.
AttackDomain SquattingRegistering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark.
AttackDoS or DDoSIn computing, a denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users.
AttackDoS layer 3A denial of service attack that targets the Network layer. This attack, similar to DoS Layer 4, depends on flooding the attacker with very high volume of data to reduce the system's perfomance and users from accessing the system.
AttackDoS layer 4A denial of service attack that targets the Transport layer. This attack depends on flooding the attacker with very high volume of data to reduce the system's perfomance and users from accessing the system.
AttackDoS layer 7A denial of service attack that targets the Application layer. This attack targets features such as HTTP, SNMP, FTP. Additionally, this type of attack is hard to detect as the traffic resembles real users.
AttackDrive by malware Malware delivery technique that is triggered simply because the user visited a website.
AttackHijacking accountsAccount hijacking is a process through which an individual's email account, computer account accessed by an unauthorized user
AttackHost File poisoningInjecting new entries for Internet sites
AttackHigh-yield investment program (HYIP) fraudAn investment scam that promises unsustainably high return on investment by paying previous investors with the money invested by new investors
AttackImpersonationAct of pretending to be another person for the purpose of entertainment or fraud.
AttackInframe hijackingHijacking nested browsing context, effectively embedding another HTML page into the current page.
AttackJob ScamA suspicious job posting associated with the client on job sites
AttackMITB Man in the browserA proxy Trojan horse that infects a web browser by taking advantage of vulnerabilities in browser security to modify web pages, modify transaction content or insert additional transactions, all in a completely covert fashion invisible to both the user and host web application.
AttackMITM Man in the middleAttacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
AttackMtoken AppA software once activated, displays a new eight-digit tokencode once every minute.
Attack419 EmailEmail address being used in Advance Fee Fraud scams that reflect an association with client's organization/Staff
AttackNTP based DDoSNetwork Time protocol Denial of Service Attack
AttackPay Per Click (PPC)An internet advertising model used to direct traffic to websites, in which advertisers pay the publishers
AttackPharmingDNS poisoning to redirect legitimate internet traffic of your websites to a fraudulent page
AttackPhishingWebpage impersonating the client with the objective of collecting their customers' information
AttackSmishingSMS as the carrier of Phish URL
AttackSpear PhishingSpear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. Spear phishing attempts are not typically initiated by "random hackers" but are more likely to be conducted by perpetrators out for financial gain, trade secrets or military information.
AttackTilde PhishTilde Phish use a unique style of multiple URLs that point to websites on several domains, when in reality they send the user to the same phishing website. This method uses the fact that some web servers are configured to all al-low file path viewing on any virtual domain hosted on that server. The URLs contain a tilde (~), hence the name
AttackTraffic diversionChanging Site Traffic
AttackUnauthorized affiliationDeclaring affiliation to a company or individual without consent
AttackUnauthorized Job postingPosting a job declaring affiliation to a company or individual without consent
AttackUnauthorized Mobile ApplicationCreating an app declaring affiliation to a company without consent
AttackUnauthorized profileCreating a profile displaying affiliation to a company or individual without consent
AttackUnauthorized usage of trademark/logoUsing company's trademark, logo, without consent of the company
AttackVishingVoIP termination as collector
AttackWatering hole attackAn attack strategy targeting a large group of individuals by observing the websites most visited and infecting them with malware
AttackWhalingWhaling is a type of fraud that targets high-profile end users such as C-level corporate executives, politicians and celebrities.
AttackBusiness email compromise (BEC)Business email compromise (BEC) scams that attempt to trick senior staff at medium and large corporations into transferring large sums of money typically rely on the same formats - either compromising the CEO's account, spoofing the CEO's email address, or using a form of typo-squatting where the email address uses a domain which resembles the targeted company's actual domain
DataA-recordAddress Record
DataDNS recordList of DNS record types is an overview of resource records (RRs) permissible in zone files of the Domain Name System (DNS)
DataMX recordMail Exchange Record
DataPhish hostPhish Creator
DataRBLRealtime Blackhole List
DataSecurity News feedsA security news feed is list of newly published security news content on a website
DataSpam feedA feed of identified spam mails
DataTwitter feeds Tweet the last posts published via RSS feed.
DataWeb Referral LogLogs to help analyze traffic to a site
DataWHOIS recordDatabases that store the registered users
DataZone filesA DNS zone is a subset, often a single domain, of the hierarchical domain name structure of the DNS
RegistryAccredited domain registrars of a registryRegistrars that are officially recognized by a Registry to provide domain-related services
RegistryDonuts.coDiverse group of new, relevant and expressive Internet domain names.
RegistryVeriSignService provider of domain names
RegulatoryDMCADigital Millennium Copyright Act
RegulatoryIANAInternet Assigned Numbers Authority
RegulatoryICANNThe Internet Corporation for Assigned Names and Numbers
RegulatoryInter-NICThe Internet's Network Information Center
Regulatory.ARPAA top-level domain (TLD) in the Domain Name System of the Internet
ResponseAccount suspensionRemoval of emails or accounts
ResponseBrand CastingPromoting a brand, product or service by streaming video of events, product demonstrations and other offline experiences through online media channels.
ResponseCease & DesistA document sent to an individual or business to halt purportedly unlawful activity ("cease") and not take it up again later ("desist")
ResponseDe-indexing in search enginesRemoving fradulent sites from search engine rankings
ResponseDelist domains from RBLsRemoving links/emails from Blackhole list
ResponseDefensive (Domain) RegistrationBuy more domain names, "just in case."
ResponseDilutionFalse data is submitted to phish sites to dilute the quality of information collected by the phisher
ResponseDomain suspensionGoing to a domain authority and requesting the suspension of a domain
ResponseFraudcastingProviding security vendors fraudulent IP and Domains to be blocked in real-time through browsers, email firewalls, ISPs, proxies and any other relevant security products
ResponseReclaim AccountsA process to regain control over a hijacked account
ResponseShutdownShutting down of Content and Websites related to Phishing Activities. Asking host to takedow certain content
ResponseTakedownShutting down of specific fraudulent profiles (not the full website) that affect a brand or individual including cybersquatting.
ResponseUDRPUniform Domain-Name Dispute-Resolution Policy
Service SuiteBrand ManagementThe activity of supervising the promotion of a particular brand of goods.
Service SuiteBrand ProtectionThe ​act of preventing someone from ​illegally making and ​selling a ​product using a ​brand ​name ​owned by another ​company
Service SuiteDomain ManagementDomain portfolio management services are dedicated services offered to help companies to manage big portfolio of domain name
Service SuiteIP ManagementIP address management (IPAM) is a means of planning, tracking, and managing the Internet Protocol address space used in a network.
Service SuitePatent Portfolio managementA patent portfolio is the list of patents owned by an individual or a company. Managing your patent portfolio and comparing it to those of other companies is essential to helping you better determine the economic value of your own patents and remaining competitive.
TerminologyApp permissionsAn app asking the user to grant permission to be able to execute tasks on thier device without consent or without informing the user.
TerminologyAPTAdvanced Persistent Threats are attacks in which the attacker stays inside the system to spy and steal information rather than penetrate the network to cause damage.
TerminologyAS numberAutonomous system
TerminologyBGP peersWhen BGP runs between two peers in the same autonomous system (AS), it is referred to as Internal BGP (iBGP or Interior Border Gateway Protocol). When it runs between different autonomous systems, it is called External BGP (EBGP or Exterior Border Gateway Protocol).
TerminologyBGP routeWhen BGP runs between two peers in the same autonomous system (AS), it is referred to as Internal BGP (iBGP or Interior Border Gateway Protocol). When it runs between different autonomous systems, it is called External BGP (EBGP or Exterior Border Gateway Protocol).
TerminologyBlack Hat SEOIn search engine optimization (SEO) terminology, Black Hat SEO refers to the use of aggressive SEO strategies, techniques and tactics that focus only on search engines and not a human audience, and usually does not obey search engines guidelines.
TerminologyBotnetBotnet comprises of multiple Internet-connected devices, each of which is running one or more bots. Botnets may be used to perform Distributed Denial-of-Service (DDoS) attacks, steal data, send spam, and allows the attacker to access the device and its connection.
TerminologyBullet proof hostingBulletproof hosting (sometimes known as bulk-friendly hosting) is a service provided by some domain hosting or web hosting firms that allows their customer considerable leniency in the kinds of material they may upload and distribute.
TerminologyC&C Command and ControlCommand and control refers to the main server used by a DDoS attacker to control the botnets used in a DDoS attack.
TerminologyCC TLDCountry Code Top Level Domain
TerminologyCousin DomainA registered domain name that is deceptively similar to a target name, which can be a domain name or the name of a known entity
TerminologyCyber espionageThe use of computer networks to gain illicit access to confidential information, typically that held by a government or other organization.
TerminologyCyber WarThe use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of communication systems by another state or organization.
TerminologyDNSSECThe Domain Name System Security Extensions (DNSSEC)
TerminologyDomain expiryThe expiration of a domain (after which it will no longer be online)
TerminologyDomain RegistrarA domain name registrar is an organization or commercial entity that manages the reservation of Internet domain names.
TerminologyDomain tastingThe practice of a domain name registrant using the five-day “grace period” (the Add Grace Period or AGP) at the beginning of the registration of an ICANN-regulated second-level domain to test the marketability of the domain.
TerminologyFast FluxFast flux is a DNS technique used by botnets to hide phishing and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies.
TerminologyFraudulent Unjustifiably claiming or being credited with particular accomplishments or qualities.
TerminologygTLDA generic top-level domain (gTLD) is one of the categories of top-level domains (TLDs) maintained by the Internet Assigned Numbers Authority (IANA) for use in the Domain Name System of the Internet. It is visible to Internet users as the suffix at the end of a domain name
TerminologyHacktivistThe subversive use of computers and computer networks to promote a political agenda.
TerminologyIDN tablesIANA maintains the collection of “IDN tables”, which represent permitted code points (letters) allowed for Internationalised Domain Name registrations in particular registries.
TerminologyMoney MuleA money mule or sometimes referred to as a "smurfer" is a person who transfers money acquired illegally (e.g., stolen) in person, through a courier service, or electronically, on behalf of others. The mule is paid for their services, typically a small part of the money transferred. Money mules are often dupes recruited on-line for what they think is legitimate employment, not aware that the money they are transferring is the product of crime. The money is transferred from the mule's account to the scam operator, typically in another country. Similar techniques are used to transfer illegal merchandise.
TerminologyName Based Virtual HostingConfiguring DNS servers to map each hostname to the correct IP address and then configure the HTTP Server to recognize the different hostnames
TerminologyNigerian 419The scam typically involves promising the victim a significant share of a large sum of money, which the fraudster requires a small up-front payment to obtain
TerminologyPatent A patent is a set of exclusive rights granted by a sovereign state to an inventor or assignee for a limited period of time in exchange for detailed public disclosure of an invention. An invention is a solution to a specific technological problem and is a product or a process. Patents are a form of intellectual property. The procedure for granting patents, requirements placed on the patentee, and the extent of the exclusive rights vary widely between countries according to national laws and international agreements. Typically, however, a granted patent application must include one or more claims that define the invention. A patent may include many claims, each of which defines a specific property right. These claims must meet relevant patentability requirements, such as novelty and non-obviousness. The exclusive right granted to a patentee in most countries is the right to prevent others from commercially making, using, selling, importing, or distributing a patented invention without permission
TerminologyPhish hopping
TerminologyReserved domainsDomain has been reserved via the dropcatcher service. Incase the user decides not to renew the domain, another person can take it.
TerminologyRoot ZoneRoot Zone refers to the highest level of the Domain Name System (DNS) structure. It contains the names and the numeric IP addresses for all the top level domain names such as the gTLDs (.com, .net, .org, .jobs), and all the country code top level domains (ccTLDs), for example (.us, .uk .ph), including the entire list of all the root servers. The DNS root zone contains only 280 delegations of generic, country code and internationalized top level domain names (TLD)s and its size is more or less 80,000 bytes. It also changes slowly and absorbs only one minor change per TLD every year. The National Telecommunications Information Administration (NTIA), ICANN, Verisign and the Root Server Operators play significant roles in the management and process of the root zone. NTIA is an agency under the United States Department of Commerce, which represents the federal government in a contract entered in with ICANN and Verisign, which grants the organizations separate functions in managing the performance of the root zone. NTIA is responsible in reviewing and approving whatever changes that need to be implemented within the root zone. ICANN is the operator of the Internet Assigned Numbers Authority (IANA), which is responsible for the day-to-day management of the DNS root zone. IANA assigns the operators of the top level domain and ensures the maintenance and the administrative details of the TLDs. It is also responsible for the coordination of the Internet Protocol (IP) and Autonomous System Numbers (ASN) to the Regional Internet Registries (RIR). Verisign, and formerly Network Solutions, serves as the root zone administrator under a cooperative agreement entered with the United States government; this has been in effect since 1998. The Root Server Operators' primary role is to make sure that the operations of the root zone is always accurate, available, reliable and secure. There are thirteen Root Server Operators in the database of the root zone, which include: A - Verisign Global Registry Services B - Information Sciences Institute C - Cogent Communications D - University of Maryland E - NASA Ames Research Center F - Internet Systems Consortium, Inc. G - U.S. DOD Network Information Center H - U.S. Army Research Lab I - Autonomica/NORDUnet K - RIPE NCC L - ICANN M - WIDE Project
TerminologySCADASupervisory control and data acquisition
TerminologySearch Engine Optimization SEOThe process of affecting the visibility of a website or a web page in a search engine's unpaid results
TerminologySocial Media FraudSuspicious Profiles on any social media websites that have association with the client
TerminologySuspicious Mobile AppMobile App published on the internet claiming to be published by client's organization
TerminologyTLDTop Level Domain
TerminologyTrademarkAny word, name, symbol, or design, or any combination thereof, used in commerce to identify and distinguish the goods of one manufacturer or seller
TerminologyWater MarkIs an identifying image or pattern in paper that appears as various shades of lightness/darkness when viewed by transmitted light, caused by thickness or density variations in the paper.
TerminologyIP PaymentsIP Payments is a PCI Level 1 compliant financial services organisation that provides payments, accounts receivable automation and PCI DSS compliance solutions.
TerminologyPatent CitationWhen referenced in a document, patents must be cited like books, journal articles, or any other resource. While its presentation varies according to individual style requirements, a citation for a patent should enable your reader to locate the patent and understand the basics (title, inventor, date, whether it is an application or a patent). The citation should enable readers to distinguish the patent in question from similar or related patents.
TerminologyUDRPUniform Domain-Name Dispute-Resolution Policy
TerminologyURSUnited Research Service
TerminologyAn encrypted network that is not indexed by normal search engines. Can only be accessed using specialized software.An encrypted network that is not indexed by normal search engines. Can only be accessed using specialized software.
TerminologyDark WebDark Web is a small part of the Deep Web.
TerminologyDeep WebParts of the WWW which have not been indexed by search engines as they are encrypted. Requires certain software to be able to access the Deep Web.
TerminologyClear NetThe unencrypted part of the internet which is accessible by everyone using standard browsers.
TerminologyTrollingThe act of trash talking or annoying someone using the internet for fun. Trolling usually involves using sarcasm to get on the nerves of that person.
TerminologyDoxingDoxing simply refers to the process of gathering or deducing other people’s information such as name, age, email, address, telephone number, photographs etc. using publicly available sources such as the Internet.
TerminologyShadow ITOr Stealth IT, is a term often used to describe information-technology assets without explicit IT approval.
TerminologyBusiness Email Compromise (BEC)Business Email Compromise (BEC) is a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. The scam is carried out by compromising legitimate business e-mail accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.
TerminologyEmail Wire FraudThe purpose of this type of email is very simple—to get the recipient to process a payment for non-existent goods or services by way of a wire or credit transfer. The scammers send an email to a target recipient, usually pretending to be from the CEO or a senior executive of an organization. The scammers will usually send the fake wire transfer emails to employees working in the finance department of a company, as those employees will have the ability to action payment requests.
TerminologyTailored Trustworth SpaceA cyberspace environment that provides a user with confidence in its security, using automated mechanisms to ascertain security conditions and adjust the level of security based on the user’s context and in the face of an evolving range of threats.
TerminologyTRAP10Binary Trading (commonly also known as Binary Options Trading or Binary Options) is a type of option where the trader takes a yes or no position on the price of a stock or other assets, with the resulting payoff being all or nothing. Questionable activities such as brand infringement, unregistered establishments, identity theft, misrepresentation of potential gains and back-end manipulation of software to cheat users is common in the name of BOT. As there does not appear to be an explicit legal framework to govern binary trading, online companies continue to operate and trap victims. This type of scam is known as TRAP10.
TerminologyBitsquattingRefers to the registration of a domain names one bit different than a popular domain. The name comes from typo-squatting: the act of registering domain names one key press different than a popular domain.
TerminologyDomain Validation certificateIs an X.509 digital certificate typically used for Transport Layer Security (TLS) where the identity of the applicant has been validated by proving some control over a DNS domain
TerminologyOrganization Validation certificateIs a certificate that confirms the existence of the organisation.
TerminologyExtended validation certificateAn Extended Validation Certificate (EV) is a certificate used for HTTPS websites and software that proves the legal entity controlling the website or software package
TerminologyTypopiracy/typosquattingTyposquatting, also called URL hijacking, a sting site, or a fake URL, is a form of cybersquatting, and possibly brandjacking which relies on mistakes such as typos made by Internet users when inputting a website address into a web browser.
TerminologyURL shorteningIs a technique on the World Wide Web in which a Uniform Resource Locator (URL) may be made substantially shorter and still direct to the required page.
TerminologyURL redirectionA URL Redirection Attack is a kind of vulnerability that redirects you to another page freely out of the original website when accessed, usually integrated with a phishing attack.
TerminologyAFFAdvance Fee Fraud is a fraud in which the scammer convinces the victim to send an upfront money in return for services or higher pay back.
Credit CardsAcquirerThe acquiring bank (also merchant bank or acquirer) is the financial institution that maintains the merchant’s bank account. The contract with the acquirer enables merchants to process credit and debit card transactions. The acquiring bank passes the merchant’s transactions along to the applicable issuing banks to receive payment.
Credit CardsIssuerThe issuing bank is the financial institution that issues credit cards to consumers on behalf of the card networks (Visa, MasterCard). The issuer acts as the middle-man for the consumer and the card network by contracting with the cardholders for the terms of the repayment of transactions.
TerminologyBuffer OverflowWhen data being entered exceeds a buffer's fixed length, the data then starts overflowing adjacent memory space causing system shutdown, data corruption, or give the attacker access to the rest of the system.
TerminologyTailgate/PiggybackingIllegally accessing a service/system using another persons's authorized credintials.
TerminologyZero-Day VulnerabilityA vulnerability in the system that the developer does not know about. These vulnerabilites are difficult to detect as they do not have a signature which anti malware or intrusion prevention systems depend on to find vulnerabilities. The vulnerability is called Zero-Day because it takes zero days for the first attack to occur since the vulnerability has been made public.
AttackDowngrade AttackAn attack in which the victim is negotiated into using older and more vulnerable security protocols, making it easier for the attacker to launch the attack.
TerminologyDead Man's SwitchA system that requires often human interaction to prevent a process from being triggered. Extortionists use a Dead Man's Switch to force the victim to comply and not go to the authorities. In case the extortionist gets arrested, the process will be triggered and the information will be released to the public.
TerminologyRed Team - Blue TeamAn exercise in which a system's security is tested by security experts. Red team is in charge of attacking and gaining access/control of an objective while the blue team is responsible for defending it. This exercise is meant to test the system and reveal vulnerabilites and measure the readiness of the security team responsible for defending it.
TerminologyBlackbox Testing - Whitebox testing - Graybox TestingScenarios that an ethical hacker will face while performing penetrations testing.
Blackbox testing: the hacker does not know the in/outs of the IT infrastructure. Usually launches a full scale brute force attack to reveal vulnerabilities. Can be very time consuming.
Whitebox testing: attacker has full knowledge and access to the source code and infrastructure. A more thorough test can be performed in this type of pen testing.
Graybox testing: attacker has partial knowledge/access, and can focus on specific weaknesses and discover more as he moves along.
TerminologySkill SquattingAn attack which takes advantage of speech recognition systems' errors. Example: A person with bad intent can create a malicious mobile application called Ramazon. When a user tries to install Amazon application on their phone using voice commands, the voice recognition system might hear "Ramazon" instead of "Amazon" and end up downloading the malicious application.
TerminologyCCD-COECooperative Cyber Defense - Center of Excellence. A military organization that falls under the NATO umbrella. This organization is responsible for training NATO members and protecting NATO nations from cyberattacks. Additionally, CCD-COE created a manual, the Tallinn Manual, that explains how a nation can respond to cyberattacks while taking international laws in cosideration.
TerminologyCyber DeterrentA factor which disencourages the attacker from initiating the attack.
TerminologyLayered SecurityAlso known as layered defense, it is the practice of having multiple layers of security protecting the data.
TerminologyUnified Threat ManagementUTM is a software or hardware that combines several network security functions such as IDS/IPS, VPN, Firewall, Gateway Anti-Virus and others under one platform, making it easier to manage and monitor through a single interface.
TerminologyAngler PhishingAn attack in which the fraudster will masquerade as a customer support representative on social media to send phishing links to customers in order to get their information such as username and password as well as other personal information.
TerminologySocialbotsSocialbots are softwares programmed to behave like humans on social media by posting pictures, retweeting, and even chatting with people. Socialbots can be used for malicious purposes such as distorting public opinion during political campaigns, marketing, and spreading scams.
TerminologyDolphin Attack (Inaudible Voice Commands) An attack where hackers use ultrasonic frequencies to launch a voice command to phones to unlock them and steal information.
TerminologyScarewareA form of social engineering where victims are tricked into thinking that their device is infected with a virus, encouraging them to download an anti virus software, which in fact is malicious.
TerminologyPotentially Unwanted ProgramPUP is a program that piggybacks software downloaded by the user. It is an unwanted program that downloads with the user's consent such as spyware, adware, or toolbars for browsers.
TerminologyPhishing KitsPhishing kits are kits provided by hackers for people with basic computer skills to launch phishing attacks. The kit includes several items which make launching a wide scale phishing attack easy such as spamming software, source code, and script to launch the attack.
TerminologyDoppelganger domainA doppelganger domain is similar to typosquatting domain. It is a domain which is missing "." (dot) in a domain name. For example, an instance of Doppelganger domain for mail.google.com is mailgoogle.com (notice the missing dot). When the content on these domain matches branding and content of the original website, users are not able to tell the difference and are more likely to be tricked by an attacker (e.g., for credential harvesting or financial fraud).
TerminologyPagejackingIf you click on a link and find yourself at an unexpected website, you may have been ‘pagejacked’. This happens when someone steals part of a real website and uses it in a fake site. If they use enough of the real site, Internet search engines can be tricked into listing the fake site and people will visit it accidentally. The fake site could contain unwanted or offensive material. As an online merchant trading via a website, you need to know that your site isn’t being stolen in this way. Unfortunately you can’t prevent pagejacking; you can only deal with it after you know it’s a problem.
TerminologyChange of BillingA form of fraud where a criminal who gained access to a victim's bank account changes the billing address to prevent the victim from receiving the monthly bills, thus allowing the fraudster to remain undetected.
TerminologyAstroturfingAstroturfing is abusing the power of customer reviews on sites like Yelp, Facebook, Amazon and others. Either a place of business will post rave reviews from fake customers about their product, or a business will post bad reviews about a competitor.
TerminologyBlended AttackA cyber attack that comprises multiple attack vectors and malware is known as a blended attack. Such attacks usually cause severe damage to targeted systems.
TerminologyForm GrabberMalware designed to record sensitive information that the targeted user provides in forms on the Internet. These malware particularly target the victim’s financial information.
TerminologyPolymorphic VirusA polymorphic virus is a malicious program that modifies itself when it replicates. This technique enables it to evade detection by security software.
TerminologyTwishingTwishing refers to phishing scams that are carried over Twitter. The attacker might tweet a post interesting or strange enough to trick users into visiting a fraudulent website and logging in with their credentials.
TerminologyWeb SkimmerWeb skimming is when a malicious code is inserted into a payment page. Whenever the customer attempts to pay online, the malicious code will steal the payment information (card number, expiry date, holder namer, security code...) and send it to the attacker.
TerminologyTTPsTactics (or Tools), Techniques, and Procedures is the behavior of attackers or adversaries in the cyber space. TTPs are usually deeply analyzed to understand how the adversary works and how to expect and prepare for future attacks.
TerminologyAir GapHaving a critical computer or machine in a physically isolated location as well as disconnecting it from the internet.
TerminologyCVECommon Vulnerabilities and Exposures is a database that contains all known vulnerabilities. These vulnerabilities have been tagged by a specific code such as: CVE-2019-5736
TerminologyRandom ForestGrouping the output of multiple decision trees together into a final result. This should be used when a single decision tree does not provide accurate results for all scenarios.
TerminologyPassword SprayingIt is an advanced brute-force technique that attempts to attack multiple user accounts with commonly used passwords
TerminologyPrivilege EscalationAn attack in which the user will attempt to exploit bugs in the system allowing them to reach and use resources which should not be accessed by them.
TerminologyDefang URLThe process of rewriting the URL into a form that cannot be clicked.
TerminologySteganography It is a technique used to hide the existence of a message, files, or any other information. For example, hiding a text message inside an image file to avoid being discovered (Data hidden within data).
Terminology Inference AttackAn inference attack is a data mining technique used to illegally access information about a subject or database by analyzing data. This is an example of breached information security. Such an attack occurs when a user is able to deduce key or critical information of a database from trivial information without directly accessing it.
TerminologyBastion hostA host with very few services/applications running on it, usually put between the internal network and the internet. This point acts as a proxy and is the only entry point to the internal network.