BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z

Patch

A patch is a set of software changes that fixes a bug or security vulnerability in a software already currently in use by the organization.

2023-03-08T15:48:30+00:00March 8th, 2023|

Penetration Testing

Penetration testing, also known as a pen test or ethical hacking, is an authorized simulated cyberattack used to identify, test and highlight vulnerabilities in an organization's security posture.

2023-03-07T16:56:59+00:00March 7th, 2023|

Personally Identifiable Information

Personally identifiable information (PII) is any data that when used alone, or with other relevant data, could identify a specific individual. Examples include (but are not limited to): name, address, contact number, email address, driver's license number, SSN, D.O.B, passport number, fingerprint.

2023-07-05T15:30:08+01:00July 5th, 2023|

Phishing

Phishing is defined as a form of social engineering in which a cyber threat actor poses as a trustworthy colleague or acquaintance of an organization to lure a victim into providing sensitive information or network access.

2023-03-08T13:52:21+00:00March 8th, 2023|

Profiling

Profiling refers to the practice of creating detailed and data-driven representations (or profiles) of typical system behavior, user actions, network traffic, or threat actor characteristics to identify anomalies or detect potential security risks. In essence, profiling is the process of analyzing patterns and behaviors within a system to create baselines of what is considered [...]

2024-11-14T14:59:25+00:00November 14th, 2024|