BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z

Tailgating

Tailgating is a social engineering attack enabling an unauthorized individual to gain access to a password-protected or secured premise by following an authorized individual. This threat occurs when a malicious actor or intruder uses the legitimate entry of a trusted person to bypass security protocols, such as locked doors, access-controlled areas, or secure buildings. [...]

2024-11-11T12:00:19+00:00July 6th, 2023|

The Dark Web

The Dark Web is an anonymous network that can only be accessed by browsers such as Tor. By content alone it is larger than the standard indexable Web that we use everyday by about 50% and represents approximately 6% of all sites.

2024-11-11T11:52:37+00:00July 19th, 2022|

Threat Actor

A threat actor, also known as malicious actor, is any individual, group or organization that intentionally poses a threat to cybersecurity. These actors seek to exploit vulnerabilities in order to cause harm, steal information, disrupt services, or achieve other malicious objectives. Understanding who threat actors are, their motives, tactics, and methods is essential for [...]

2024-11-11T11:43:14+00:00March 8th, 2023|

Threat Analysis

Threat analysis aims to assess an organization's security processes and procedures to identify threats and vulnerabilities within their network. This practise usually mixes vulnerability testing with risk assessments to better understand the potential real world threats that a network can face. A comprehensive threat analysis can help organizations to prepare for and respond to [...]

2024-11-11T11:37:24+00:00March 8th, 2023|

Threat Assessment

A threat assessment in cybersecurity is a set of processes or tools used to identify, evaluate and prioritize perceived threats to an organization's digital assets. It involves understanding the likelihood of different types of cyber threats, their potential impact on the organization, and developing strategies to mitigate or respond to these risks effectively. The [...]

2024-11-11T11:29:12+00:00July 6th, 2023|

Threat Hunting

Threat hunting is the process of proactively searching for cyberthreats within an organization by using methodology, innovative technology and threat intelligence. The Process of Threat Hunting Threat hunting involves a series of steps: Theory Development: Threat hunters begin by forming theories and hypotheses based on their existing knowledge of threats, threat behaviors, vulnerabilities and [...]

2024-10-11T14:08:44+01:00July 6th, 2023|

Threat Intelligence

Threat intelligence is the gathering and analysis of cybersecurity data to understand threats that have, will or are currently targeting an organization. The process encompasses data gathered from various sources, which then influences actionable insights to enhance an organization's ability to prevent, detect and respond to cyberthreats. Key Components of Threat Intelligence Data [...]

2024-10-11T14:09:22+01:00July 6th, 2023|

Trojan

A Trojan, or Trojan Horse, is a type of malware which disguises itself as legitimate code or software to mislead the user. Characteristics of a Trojan Trojans do not self-replicate like worms or other viruses. Instead they depend on social engineering techniques to trick users into executing the malicious software. Common methods include [...]

2024-10-11T14:10:06+01:00March 8th, 2023|

Two-Factor Authentication (2FA)

Two-Factor Authentication (2FA) is a security process used to verify users' identities and provide an additional layer of account security. The user will be asked to provide two different authentication factors to verify themselves and access online accounts.

2024-10-11T12:06:25+01:00March 8th, 2023|