top of page
Cyber Threat Intelligence Glossary
cyber threat intelligence terms.png

A  

 

Access Control: Systems and techniques designed to regulate user interactions with resources in a computing environment. 

Account Harvesting: The process of gathering valid account usernames from a system.

 

Advanced Encryption Standard (AES): A widely used symmetric encryption method for securing data globally. 
 

Advanced Persistent Threat (APT): A long-term, targeted cyberattack in which a threat actor remains undetected within a network for an extended period. 
 

Adware: Software that displays or downloads advertisements automatically when a user is online. 
 

Air Gap: A security technique that isolates a computer or network by preventing it from connecting externally. 
 

Artificial Intelligence (AI) in Cybersecurity: The application of AI and machine learning to identify and mitigate cyber threats. 
 

Attack Surface: The total number of points through which an unauthorised user could gain access or extract data from an environment.
 

Authentication: The process of confirming the identity of a user, process, or device, typically required to grant access to IT resources. 

Helvetica Light is an easy-to-read font, with tall and narrow letters, that works well on almost every site.

bottom of page