BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z

Tailgating

Tailgating is a social engineering attack enabling an unauthorized individual to gain access to a password-protected or secured premise by following an authorized individual.

2023-07-06T08:15:36+01:00July 6th, 2023|

Threat Actor

A threat actor, also known as malicious actor, is any individual, group or organization that intentionally poses a threat to cybersecurity.

2023-03-08T13:55:39+00:00March 8th, 2023|

Threat Analysis

Threat analysis aims to assess an organization's security processes and procedures to identify threats and vulnerabilities within their network. This practise usually mixes vulnerability testing with risk assessments to better understand the potential real world threats that a network can face.

2023-03-08T13:54:37+00:00March 8th, 2023|

Threat Assessment

A cybersecurity threat assessment is a set of processes or tools used to evaluate and verify perceived threats to an organization's digital assets.

2023-07-06T08:19:21+01:00July 6th, 2023|

Threat Hunting

Threat hunting is the process of proactively searching for cyberthreats within an organization by using methodology, innovative technology and threat intelligence.

2023-07-06T08:19:44+01:00July 6th, 2023|

Threat Intelligence

Threat intelligence is the gathering and analysis of cybersecurity data to understand threats that have, will or are currently targeting an organization.

2023-07-06T08:20:06+01:00July 6th, 2023|

Trojan

A Trojan, or Trojan Horse, is a type of malware which disguises itself as legitimate code or software to mislead the user.

2023-03-08T16:19:49+00:00March 8th, 2023|

Two Factor Authentication (2FA)

Two Factor Authentication (2FA) is a used to verify users' identities and provide an additional layer of account security. The user will be asked to provide two different authentication factors to verify themselves and access online accounts.

2023-03-08T13:57:25+00:00March 8th, 2023|

Title