Alt Text | Brief description of an image to help with searching |
APT | Advanced Persistent Threat |
IoT | Internet of Things, a collective network of connected devices and technologies that facilitates communication between devices and the cloud and also between the devices themselves |
Kill Chain | In cybersecurity, the term Kill Chain describes the sequence of steps that cybercriminals go through when attempting to carry out a successful cyberattack |
LMS | Learning Management System |
MOOC | Massive Open Online Courses, a modern form of distance education |
ROI | Return on Investment ratio, which helps calculate the return on investment in a project |
XDR | Extended Detection and Response, a class of information security systems for the extended detection and response to complex threats and targeted attacks |
Additive technologies | A method of creating three‑dimensional objects, parts, or things by adding material layer by layer |
APCS | Automated process control system |
Builder | A tool that can configure the parameters of malware before using it in a cyberattack |
Endpoints and end devices | Physical devices that connect to and exchange data with a computer network (mobile devices, desktop computers, virtual machines, embedded hardware, or servers) |
Neuromorphic processor | A processor whose functional principle and architecture are similar to the neural networks of living organisms |
GG | Greenhouse gases and gaseous substances of natural or manmade origin that absorb and re‑emit infrared radiation |
Reverse engineering | Reverse engineering is the process of analyzing the machine code of a program in order to understand the principle of operation, restore the algorithm, discover undocumented program capabilities, etc. |
MDR solutions | Managed Detection and Response solutions for the automatic detection and analysis of security incidents in infrastructure using telemetry and advanced machine learning technologies |
Technical attribution | The process of determining or uncovering identification information that can identify or link a specific attacker, group of attackers or source country to a specific cyberattack or cyber incident |
Unique user | A user who visited an Internet resource within a certain period of time (usually within 24 hours) |
Data exfiltration | The process during which an attacker extracts sensitive data from another computer’s system and uses it for personal gain |