This publication uses cookies

We use functional and analytical cookies to improve our website. In addition, third parties place tracking cookies to display personalised advertisements on social media. By clicking accept you consent to the placement of these cookies.

1. Advanced Threat Protection (ATP)
Software that offers protection against unsafe attachments and damaging links to unsafe websites.

2. Audit log
File containing information on when and who did what in your computer system.

3. Bot
A computer program that can carry out tasks autonomously. Bot is an abbreviation of robot.

4. Captcha
Acronym for “Completely Automated Public Turing test to tell Computers and Humans Apart”. Means of checking whether the user is human.

5. CEO/CFO fraud
Form of fraud in which an attacker sends e-mails to a financial department in the name of the CEO or CFO of a business. The attacker’s aim is to convince or pressure an employee to hand over money.

6. Cloud Access Security Broker (CASB)
A security solution for applications in the cloud whereby a link is inserted between the business network and the cloud.

7. Cyber insurance
Insurance that covers financial damage resulting from a cyber attack. The insurance not only pays for damage to the organization itself but also for damage to third parties.

8. Distributed Denial of Service (DDoS)
Attack that makes a service unavailable by overwhelming a server, application, network, etc., with useless data traffic.

9. Firewall
A collection of computer programs or apparatus that protects a network.

10. Insider threat
Threat originating from within the organization. For example, because employees, ex-employees and suppliers can gain access to information.

11. Managed security service
The remote management and monitoring of the cybersecurity environment of a business by a third party.

12. Multifactor authentication
Method for establishing whether a user or digital system is who or what it claims to be. There are various ways of implementing this. For example, a password and a code that the user receives by text message.

13. Mobile device management (MDM) / Unified Endpoint Management (UEM)
Ensures that mobile devices in an organization are well managed and secured. For example, by introducing a PIN number for smartphones and tablets. Or by ensuring that you can delete data on those devices remotely.

14. Network access control  
Means of better securing a network by only allowing known and authorized devices on the network.

15. Phishing  
Attack in which the attacker seduces someone into handing over important information, such as login or credit card details. Phishing often occurs via e-mail, but also by phone, text message or other messaging channel.

16. Privacy Impact Assessment
Process which assists an organization with identifying and managing privacy risks.

17. Ransomware
Well-prepared attack in which data are encrypted or made inaccessible. The attacker promises you a key to ‛release’ the data in exchange for a ransom.

18. Remote Operations
CenterDepartment that monitors the latest threats 24/7, allowing them to react fast and proactively to avert risks.

19. Role-based access control
Determines whether a user is permitted to enter a computer system. The role of the user or a group of users is thereby taken into account. Examples of roles are viewer, editor and manager.

20. Rule-based detection
Method for detecting a cyber attack You decide beforehand which patterns or signs in data on a network may be suspicious. Then the system looks for those patterns or signs.

21. Sandbox
Protected part of a digital system. Software that works in this place cannot disrupt other processes in the computer. A sandbox is used for running software that frequently comes under attack. Or for testing whether something is malware and what it does.

22. Single sign on (SSO)
Endusers log in once and can then work in various applications and parts of the network. They don’t need to re-enter login details each time.

23. Spamfilter
Software that tries to identify and remove spam and computer viruses.

24. Spoofing
The attacker hides his identity or pretends to be another user/someone else (masquerading, source routing).

25. Spyware - a form of malware
Spyware is software for the covert collection and forwarding of information. Usually keystrokes, screenshots, e-mail addresses, surfing behavior or personal information such as credit card numbers.

Whether or not you are monitoring the cybersecurity of your business yourself: thanks to these 25 cybersecurity terms you can secure your business better. Talk to internal or external cybersecurity specialists and take your peace of mind to a higher level.

00-mo-pxs.png

Cybersecurity lexicon

00-bg-gradient-mobile...

Cybersecurity lexicon

Whether or not you are monitoring the cybersecurity of your business yourself: thanks to these 25 cybersecurity terms you can secure your business better. Talk to internal or external cybersecurity specialists and take your peace of mind to a higher level.

1. Advanced Threat Protection (ATP)
Software that offers protection against unsafe attachments and damaging links to unsafe websites.

2. Audit log
File containing information on when and who did what in your computer system.

3. Bot
A computer program that can carry out tasks autonomously. Bot is an abbreviation of robot.

4. Captcha
Acronym for “Completely Automated Public Turing test to tell Computers and Humans Apart”. Means of checking whether the user is human.

5. CEO/CFO fraud
Form of fraud in which an attacker sends e-mails to a financial department in the name of the CEO or CFO of a business. The attacker’s aim is to convince or pressure an employee to hand over money.

6. Cloud Access Security Broker (CASB)
A security solution for applications in the cloud whereby a link is inserted between the business network and the cloud.

7. Cyber insurance
Insurance that covers financial damage resulting from a cyber attack. The insurance not only pays for damage to the organization itself but also for damage to third parties.

8. Distributed Denial of Service (DDoS)
Attack that makes a service unavailable by overwhelming a server, application, network, etc., with useless data traffic.

9. Firewall
A collection of computer programs or apparatus that protects a network.

10. Insider threat
Threat originating from within the organization. For example, because employees, ex-employees and suppliers can gain access to information.

11. Managed security service
The remote management and monitoring of the cybersecurity environment of a business by a third party.

12. Multifactor authentication
Method for establishing whether a user or digital system is who or what it claims to be. There are various ways of implementing this. For example, a password and a code that the user receives by text message.

13. Mobile device management (MDM) / Unified Endpoint Management (UEM)
Ensures that mobile devices in an organization are well managed and secured. For example, by introducing a PIN number for smartphones and tablets. Or by ensuring that you can delete data on those devices remotely.

14. Network access control  
Means of better securing a network by only allowing known and authorized devices on the network.

15. Phishing  
Attack in which the attacker seduces someone into handing over important information, such as login or credit card details. Phishing often occurs via e-mail, but also by phone, text message or other messaging channel.

16. Privacy Impact Assessment
Process which assists an organization with identifying and managing privacy risks.

17. Ransomware
Well-prepared attack in which data are encrypted or made inaccessible. The attacker promises you a key to ‛release’ the data in exchange for a ransom.

18. Remote Operations
CenterDepartment that monitors the latest threats 24/7, allowing them to react fast and proactively to avert risks.

19. Role-based access control
Determines whether a user is permitted to enter a computer system. The role of the user or a group of users is thereby taken into account. Examples of roles are viewer, editor and manager.

20. Rule-based detection
Method for detecting a cyber attack You decide beforehand which patterns or signs in data on a network may be suspicious. Then the system looks for those patterns or signs.

21. Sandbox
Protected part of a digital system. Software that works in this place cannot disrupt other processes in the computer. A sandbox is used for running software that frequently comes under attack. Or for testing whether something is malware and what it does.

22. Single sign on (SSO)
Endusers log in once and can then work in various applications and parts of the network. They don’t need to re-enter login details each time.

23. Spamfilter
Software that tries to identify and remove spam and computer viruses.

24. Spoofing
The attacker hides his identity or pretends to be another user/someone else (masquerading, source routing).

25. Spyware - a form of malware
Spyware is software for the covert collection and forwarding of information. Usually keystrokes, screenshots, e-mail addresses, surfing behavior or personal information such as credit card numbers.

00-lo-color.png (copy1)