Sicra Header Logo
  • Careers
  • About us
  • People
EnglishNorsk
Talk to us
  1. Home
  2. Knowledge
  3. Dictionary

Not fluent in cybersecurity?
We speak your language

A
ADC
Application Delivery Controller (ADC) ensures safe and efficient access.
Read more
Adware
Adware displays ads and may collect user data without consent.
Read more
Alert fatigue
Alert fatigue occurs with high alarm frequency.
Read more
Antivirus
Antivirus detects, prevents, and removes malware from devices.
Read more
API
An API is an interface that connects systems securely.
Read more
Arctic Wolf
Arctic Wolf protects organizations from cyber threats.
Read more
Artificial general intelligence (AGI)
AGI can perform all intellectual tasks humans can.
Read more
Artificial intelligence (AI)
AI enables computers to perform human tasks.
Read more
Authentication
Authentication verifies identity and secures access.
Read more
Azure
Azure is Microsoft’s cloud platform that consists of over 200 products and cloud services.
Read more
Azure Policy
Azure Policy ensures control and compliance in cloud environments.
Read more
Azure Resource Manager
ARM enables consistent management of Azure resources with security controls.
Read more
B
Baiting
Baiting lures victims with tempting offers.
Read more
Best practice
Beste praksis streber etter høyest mulig sikkerhet
Read more
Bicep
Bicep is Azure's native declarative language for infrastructure as code.
Read more
Biometrics
Biometrics enable secure authentication without passwords.
Read more
Blackhat
A blackhat is a hacker who attacks systems without permission.
Read more
Blue team
Blue team protects systems with real-time response
Read more
Bluejacking
Bluejacking sends unsolicited messages via Bluetooth.
Read more
Botnet
Botnet are infected computers controlled by attackers.
Read more
Brute force attack
Brute force attack tests all password combinations.
Read more
Bug bounty
Bug bounty rewards ethical hackers for vulnerability findings.
Read more
C
Carding
Carding is fraud with stolen credit card information.
Read more
CI/CD
CI/CD enables secure and fast code delivery through automation.
Read more
CISO as a service
CISO as a service is outsourced security leadership without hiring a CISO.
Read more
CISO for hire
CISO-for-hire offers temporary security expertise.
Read more
CISOaaS
CISOaaS is outsourced security leadership delivered as a flexible service.
Read more
Cloud
Cloud offers scalable IT services with shared security responsibility between customer and provider.
Read more
Compliance
Compliance ensures IT solutions meet legal requirements.
Read more
Computer virus
A computer virus is malware that infects files and systems
Read more
Computer worm
A computer worm is malware that spreads automatically between computers.
Read more
Conditional Access
Conditional Access provides context-based access control in Entra ID based on identity, device and risk.
Read more
Credential stuffing
Credential stuffing uses stolen usernames and passwords from attacks to gain access to new accounts.
Read more
Cyber insurance
Cyber insurance provides financial protection against cyberattacks.
Read more
Cyber Kill Chain
Cyber Kill Chain breaks down cyberattacks into seven phases.
Read more
Cyberattack
A cyberattack is a digital assault on systems, networks, or data.
Read more
Cybersecurity
Cybersecurity protects against digital attacks.
Read more
D
Dark web
Dark web requires special software for access.
Read more
Data breach
A data breach is when sensitive information is exposed or stolen.
Read more
Data lake
A data lake stores large amounts of data in its original form.
Read more
Data security
Data security protects information from loss, change, and exposure.
Read more
DDoS attack
DDoS attacks paralyze servers with heavy traffic.
Read more
Decryption
Decryption makes encrypted information readable again.
Read more
Deep packet inspection (DPI)
DPI analyzes and filters network traffic at a deep level.
Read more
Deep web
Deep web is not indexed by search engines like Google.
Read more
DevOps
DevOps combines development and operations for better collaboration.
Read more
DevSecOps
DevSecOps means security is part of the full development process
Read more
Digital identification
Digital identification verifies identity online.
Read more
Digital security
Digital security protects systems, data, and users from cyber threats.
Read more
Digital twin security
Digital twin security protects virtual models of physical systems.
Read more
DLP (Data Loss Prevention)
DLP blocks leaks with proactive security measures.
Read more
DORA
DORA protects financial companies from digital threats.
Read more
Dumpster diving
Dumpster diving is searching through trash for sensitive information.
Read more
E
Eavesdropping attack
Eavesdropping attacks threaten data confidentiality.
Read more
Encryption
Encryption protects data.
Read more
Entra ID
Entra ID, formerly Azure AD, provides central authentication with advanced security features.
Read more
Expert systems (AI)
Expert systems (AI) follow predefined rules.
Read more
Exploit kit
Exploit kits exploit vulnerabilities to infect systems with malware.
Read more
F
F5
F5 protects applications and APIs from risks and threats.
Read more
Feedback loops
Feedback loops collect and analyze information.
Read more
FIDO2
FIDO2 enables authentication with security keys, biometrics, or mobile devices.
Read more
Fileless malware
Fileless malware uses system processes without files.
Read more
Firewall
A firewall is a barrier between internal and external networks.
Read more
FQDN
FQDN is the complete name of a computer or host.
Read more
G
GDPR
GDPR gives more control over personal data.
Read more
GDPR compliance
GDPR compliance means handling personal data securely and lawfully in the EU.
Read more
GIAC
GIAC certifications are highly recognized in cybersecurity.
Read more
Global Secure Access (GSA)
GSA combines network, identity, and endpoint security.
Read more
Grayhat
A grayhat finds vulnerabilities without permission but avoids harm.
Read more
H
Hacking
Hacking is compromising digital devices and networks.
Read more
Hacktivism
Hacktivism uses hacking for political or social goals.
Read more
Hash
Hash turns data into a fixed-length string.
Read more
Honeytoken
Honeytoken uses fake data to reveal unauthorized access.
Read more
I
IaC
IaC provides repeatable infrastructure with potential for consistent security controls.
Read more
Identity security
Identity security protects resources with identity management, authentication, and access.
Read more
IIoT
IIoT links machines to networks and introduces new risks.
Read more
IoT
IoT refers to physical devices that communicate via the internet.
Read more
IPS
IPS blocks malicious activity in real-time.
Read more
IRT
IRT handles security incidents and limits damage.
Read more
ISO/IEC27001
ISO/IEC27001 sets requirements for information security.
Read more
IT security
IT security is about protecting data, systems, and users.
Read more
J
Juice jacking
Juice jacking transfers malware via USB charging stations.
Read more
K
Kerberos
Kerberos uses tickets for secure communication.
Read more
L
Least privilege
Least privilege means users only get access to what they truly need.
Read more
M
Machine learning (AI)
Machine learning uses data to learn and improve.
Read more
Malware
Malware is software that harms, steals, or disrupts systems.
Read more
Man-in-the-middle (MITM) attack
MITM attacks intercept or manipulate communication.
Read more
MDR
MDR protects organizations from cyber threats with technology and expertise.
Read more
Microsegmentation
Microsegmentation limits threats by dividing the network.
Read more
Microsoft
Microsoft is known for Windows, Office, Xbox, Azure, and Surface.
Read more
Microsoft Intune
Intune protects access and data on devices.
Read more
Multi-factor authentication (MFA)
MFA protects against unauthorized access even when passwords are compromised.
Read more
N
Network Access Control (NAC)
Network Access Control controls who and what can access a network.
Read more
Neural networks and deep learning (AI)
Neural networks and deep learning mimic brain functions.
Read more
NIS2
NIS2 strengthens information security in the EU and EEA.
Read more
NSM
NSM strengthens Norway’s digital and national security.
Read more
NTLM
NTLM vulnerabilities in Windows are serious and require immediate response.
Read more
O
O3 Cyber
O3 Cyber protects and enhances cloud infrastructure.
Read more
OT
Operational technology (OT) digitally controls machines and processes.
Read more
OT security
OT security ensures the operation of critical infrastructure.
Read more
P
Q
R
S
T
U
V
W
X
Y
Z

Tailored cybersecurity for institutions and enterprises that allows for innovation, growth, and fearless performance.

Get in touchCall us +47 648 08 488
Stay updated
Receive the latest news

Links
SustainabilityFAQPartnersCertifications and awardsCareerPress & brand
Contact

Tel: +47 648 08 488
E-mail: firmapost@sicra.no

Tollbugata 8, 0152 Oslo. Norway

Follow us on LinkedIn
Certifications
iso27001-white
ISO 27001 compliance
miljofyrtarnlogo-hvit-rgb
Eco-Lighthouse
Sicra Footer Logo
Sicra © 2024
Privacy Policy