Term Description
Bot Software application that can be controlles remotely and execute or automate tasks.
Daisy Chaining Gaining access to one system and then use the same information to access other systems.
Doxing Publishing personally identifiable information.
Exploit A defined way to breach the security of an IT system through vulnerability
Hack Value It is the notion among hackers that something is worth doing or is interesting
Target of Evaluation (TOE) An IT system, product, or component that is identified/subjected to a required security evaluation
Payload Part of an exploit that performs the malicious action (destroying, creating backdoor,...)
Vulnerability Existence of a weakness, design, or implementation error that can lead to an unexpected and undesirable event compromising the security of the system
Zero-Day Attack An attack that exploits computer application vulnerabilities before the software developer releases a patch for the vulnerability

results matching ""

    No results matching ""