Offerings
Knowledge
Careers
About us
People
English
Norsk
Talk to us
Home
Knowledge
Dictionary
Not fluent in cybersecurity? We speak your language
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
Antivirus
Antivirus detects, prevents, and removes malware from devices.
Read more
Arctic Wolf
Arctic Wolf protects organizations from cyber threats.
Read more
Artificial general intelligence (AGI)
Artificial general intelligence (AGI) is AI that can learn, understand, and apply knowledge across different areas, like a human.
Read more
Artificial intelligence (AI)
Artificial intelligence means computers that can think and reason independently, created by humans.
Read more
Authentication
Authentication verifies identity and secures access.
Read more
Azure
Azure is Microsoft’s cloud platform that consists of over 200 products and cloud services.
Read more
B
Baiting
Baiting lures victims with tempting offers.
Read more
Best practice
Beste praksis streber etter høyest mulig sikkerhet
Read more
Bluejacking
Bluejacking sends unsolicited messages via Bluetooth.
Read more
Botnet
Botnet are infected computers controlled by attackers.
Read more
Brute force attack
Brute force attack tests all password combinations.
Read more
Bug bounty
Bug bounty rewards ethical hackers for vulnerability findings.
Read more
C
Carding
Carding is fraud with stolen credit card information.
Read more
CISO-for-hire
CISO-for-hire offers temporary security expertise.
Read more
Compliance
Compliance ensures IT solutions meet legal requirements.
Read more
Credential Stuffing
Credential stuffing uses stolen usernames and passwords from attacks to gain access to new accounts.
Read more
Cyber insurance
Cyber insurance provides financial protection against cyberattacks.
Read more
Cyber Kill Chain
Cyber Kill Chain breaks down cyberattacks into seven phases.
Read more
Cybersecurity
Cybersecurity protects against digital attacks.
Read more
D
Dark web
Dark web requires special software for access.
Read more
Data breach
A data breache occur when unauthorized persons steal information.
Read more
Data lake
A data lake stores large amounts of data in its original form.
Read more
Deep packet inspection (DPI)
DPI analyzes and filters network traffic at a deep level.
Read more
Deep web
Deep web is not indexed by search engines like Google.
Read more
Digital identification
Digital identification verifies identity online.
Read more
Digital twin security
Digital twin security protects virtual models of physical systems.
Read more
Dumpster diving
Dumpster diving is searching through trash for sensitive information.
Read more
E
Eavesdropping attack
Eavesdropping attacks threaten data confidentiality.
Read more
Expert systems (AI)
Expert systems (AI) follow predefined rules.
Read more
Exploit kit
Exploit kits exploit vulnerabilities to infect systems with malware.
Read more
F
F5
F5 protects applications and APIs from risks and threats.
Read more
Fileless malware
Fileless malware uses system processes without files.
Read more
Firewall
A firewall is a barrier between internal and external networks.
Read more
G
GDPR
GDPR is an EU regulation that protects personal data.
Read more
Global Secure Access (GSA)
GSA is part of Microsoft's SSE solution, combining security for networks, identities, and endpoints to secure access from anywhere.
Read more
H
Hacking
Hacking is the act of accessing digital devices and networks without permission.
Read more
Hacktivism
Hacktivism uses hacking to achieve political or social goals.
Read more
Honeytoken
A honeytoken (pot) is a digital decoy used in cybersecurity to detect unauthorized access.
Read more
I
ISO/IEC27001
ISO/IEC 27001 is an international standard for information security.
Read more
J
Juice jacking
Juice jacking is a cyberattack where public USB chargers transfer malware or steal data.
Read more
K
L
M
Machine learning (AI)
This model learns and improves from data and experience. Generative AI (GAI) is a typical example of machine learning.
Read more
Man-in-the-middle (MITM) attack
A Man-in-the-middle (MITM) attack is when an attacker intercepts and manipulates communication between two parties without them knowing.
Read more
Microsoft
Microsoft is an American tech company founded in 1975.
Read more
Microsoft Intune
Microsoft Intune is a cloud-based solution for endpoint management.
Read more
N
Neural networks and deep learning (AI)
Neural networks and deep learning are forms of artificial intelligence inspired by the structure and functions of the human brain.
Read more
NIS2
NIS2 is the EU's directive for information security, aiming to protect critical services from cyber threats.
Read more
O
O3 Cyber
O3 Cyber is a Norwegian security firm specializing in cloud security and partnering with Sicra.
Read more
P
Palo Alto Networks
Palo Alto Networks is a global cybersecurity firm known for its advanced firewalls and cloud security solutions.
Read more
Password spraying
Password spraying is a brute force method where attackers use common passwords to access many accounts, reducing detection risk.
Read more
Pentesting
Pentesting simulates cyberattacks to find vulnerabilities
Read more
Phishing
Phishing is a social engineering method where someone is tricked into giving away sensitive information.
Read more
Pretexting
Pretexting is a social engineering tactic where an attacker uses a fake story to trick someone into sharing sensitive information.
Read more
Q
Quishing
Quishing is a phishing attack using malicious QR codes to steal sensitive information.
Read more
R
River Security
River Security helps businesses protect against digital attacks by identifying and showing vulnerabilities to prevent hacker exploitation.
Read more
S
Security classification
A security classification grades content before sharing sensitive information.
Read more
Session hijacking
Session hijacking happens when an attacker takes over a user's session by stealing the session ID.
Read more
SOC
A SOC (Security Operations Center) monitors and manages an organization's cybersecurity incidents.
Read more
Social engineering
Social engineering uses tricks to get people to reveal sensitive information or do harmful things.
Read more
Splunk
Splunk helps organizations collect and analyze data in real-time.
Read more
Spoofing
Spoofing is fraud where the sender fakes their identity to trick the victim.
Read more
Stuxnet
Stuxnet is a sophisticated computer worm that targeted industrial control systems and disrupted Iran's nuclear program. Read on to understand how this worm changed cyber warfare.
Read more
Synthetic identity theft
Synthetic identity theft is when criminals use a mix of real and fake information to create a fake identity.
Read more
T
U
V
Vishing
Vishing is a phone scam where attackers pretend to be legitimate to steal sensitive information.
Read more
W
Whaling
Whaling is a phishing attack aimed at high-ranking executives or influential individuals.
Read more
X
Y
Z
Zero Trust
Zero Trust is a security model that assumes no users, applications, or devices are trustworthy.
Read more
Zero-Day vulnerability
A Zero-Day vulnerability is an unknown security weakness in software, hardware, or firmware.
Read more
Tailored cybersecurity for institutions and enterprises that allows for innovation, growth, and fearless performance.
Get in touch
Call us +47 648 08 488