| Bot |
Software application that can be controlles remotely and execute or automate tasks. |
| Daisy Chaining |
Gaining access to one system and then use the same information to access other systems. |
| Doxing |
Publishing personally identifiable information. |
| Exploit |
A defined way to breach the security of an IT system through vulnerability |
| Hack Value |
It is the notion among hackers that something is worth doing or is interesting |
| Target of Evaluation (TOE) |
An IT system, product, or component that is identified/subjected to a required security evaluation |
| Payload |
Part of an exploit that performs the malicious action (destroying, creating backdoor,...) |
| Vulnerability |
Existence of a weakness, design, or implementation error that can lead to an unexpected and undesirable event compromising the security of the system |
| Zero-Day Attack |
An attack that exploits computer application vulnerabilities before the software developer releases a patch for the vulnerability |