Offerings
Knowledge
Careers
About us
People
English
Norsk
Talk to us
Home
Knowledge
Dictionary
Not fluent in cybersecurity? We speak your language
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
Antivirus
Antivirus detects, prevents, and removes malware from devices.
Read more
Arctic Wolf
Arctic Wolf protects organizations from cyber threats.
Read more
Artificial general intelligence (AGI)
AGI can perform all intellectual tasks humans can.
Read more
Artificial intelligence (AI)
AI enables computers to perform human tasks.
Read more
Authentication
Authentication verifies identity and secures access.
Read more
Azure
Azure is Microsoft’s cloud platform that consists of over 200 products and cloud services.
Read more
B
Baiting
Baiting lures victims with tempting offers.
Read more
Best practice
Beste praksis streber etter høyest mulig sikkerhet
Read more
Bluejacking
Bluejacking sends unsolicited messages via Bluetooth.
Read more
Botnet
Botnet are infected computers controlled by attackers.
Read more
Brute force attack
Brute force attack tests all password combinations.
Read more
Bug bounty
Bug bounty rewards ethical hackers for vulnerability findings.
Read more
C
Carding
Carding is fraud with stolen credit card information.
Read more
CISO for hire
CISO-for-hire offers temporary security expertise.
Read more
Compliance
Compliance ensures IT solutions meet legal requirements.
Read more
Credential Stuffing
Credential stuffing uses stolen usernames and passwords from attacks to gain access to new accounts.
Read more
Cyber insurance
Cyber insurance provides financial protection against cyberattacks.
Read more
Cyber Kill Chain
Cyber Kill Chain breaks down cyberattacks into seven phases.
Read more
Cybersecurity
Cybersecurity protects against digital attacks.
Read more
D
Dark web
Dark web requires special software for access.
Read more
Data breach
A data breache occur when unauthorized persons steal information.
Read more
Data lake
A data lake stores large amounts of data in its original form.
Read more
DDoS attack
DDoS attacks paralyze servers with heavy traffic.
Read more
Deep packet inspection (DPI)
DPI analyzes and filters network traffic at a deep level.
Read more
Deep web
Deep web is not indexed by search engines like Google.
Read more
Digital identification
Digital identification verifies identity online.
Read more
Digital twin security
Digital twin security protects virtual models of physical systems.
Read more
Dumpster diving
Dumpster diving is searching through trash for sensitive information.
Read more
E
Eavesdropping attack
Eavesdropping attacks threaten data confidentiality.
Read more
Expert systems (AI)
Expert systems (AI) follow predefined rules.
Read more
Exploit kit
Exploit kits exploit vulnerabilities to infect systems with malware.
Read more
F
F5
F5 protects applications and APIs from risks and threats.
Read more
Fileless malware
Fileless malware uses system processes without files.
Read more
Firewall
A firewall is a barrier between internal and external networks.
Read more
G
GDPR
GDPR gives more control over personal data.
Read more
Global Secure Access (GSA)
GSA combines network, identity, and endpoint security.
Read more
H
Hacking
Hacking is compromising digital devices and networks.
Read more
Hacktivism
Hacktivism uses hacking for political or social goals.
Read more
Honeytoken
Honeytoken uses fake data to reveal unauthorized access.
Read more
I
ISO/IEC27001
ISO/IEC27001 sets requirements for information security.
Read more
J
Juice jacking
Juice jacking transfers malware via USB charging stations.
Read more
K
L
M
Machine learning (AI)
Machine learning uses data to learn and improve.
Read more
Man-in-the-middle (MITM) attack
MITM attacks intercept or manipulate communication.
Read more
Microsoft
Microsoft is known for Windows, Office, Xbox, Azure, and Surface.
Read more
Microsoft Intune
Intune protects access and data on devices.
Read more
N
Neural networks and deep learning (AI)
Neural networks and deep learning mimic brain functions.
Read more
NIS2
NIS2 strengthens information security in the EU and EEA.
Read more
O
O3 Cyber
O3 Cyber protects and enhances cloud infrastructure.
Read more
OT security
OT security ensures the operation of critical infrastructure.
Read more
P
Palo Alto Networks
Palo Alto Networks launched next-generation firewalls.
Read more
Password spraying
Password spraying uses common passwords to access accounts.
Read more
Pentesting
Pentesting finds weak points in computer systems.
Read more
Phishing
Phishing tricks the victim into giving up sensitive information.
Read more
Pretexting
Pretexting creates a false story to obtain sensitive information.
Read more
Q
Quishing
Quishing uses malicious QR codes to steal information.
Read more
R
Ransomware
Ransomware encrypts data and demands ransom.
Read more
River Security
River Security maps vulnerabilities to protect against digital attacks.
Read more
S
Security classification
Security classification controls access to sensitive information based on potential harm.
Read more
Session hijacking
Session hijacking involves stealing the session ID to access sensitive information.
Read more
SOC
A SOC detects, analyzes, and responds to threats in real-time.
Read more
Social engineering
Social engineering exploits human psychology to access sensitive information.
Read more
Splunk
Splunk allows organizations to collect, monitor, and analyze data in real-time.
Read more
Spoofing
Spoofing involves falsifying identity to trick the victim into believing it's genuine.
Read more
Stuxnet
Stuxnet disrupted Iran's nuclear program and is one of the most advanced cyberweapons.
Read more
Synthetic identity theft
Synthetic identity theft combines real and fake information for financial fraud.
Read more
T
Threat intelligence
Threat intelligence helps organizations defend against attacks.
Read more
U
V
Vishing
Vishing tricks victims into revealing sensitive information over the phone.
Read more
W
Whaling
Whaling is targeted phishing attacks on executives to reveal sensitive information.
Read more
X
Y
Z
Zero Trust
Zero Trust recognizes that security threats can come from inside and outside.
Read more
Zero-Day vulnerability
A Zero-Day vulnerability is a hidden security gap that attackers can exploit before it's identified.
Read more
Tailored cybersecurity for institutions and enterprises that allows for innovation, growth, and fearless performance.
Get in touch
Call us +47 648 08 488