Snooping

Snooping: An invasive activity where an unauthorized person observes or intercepts private communication in a network, often to gain access to confidential information. While similar to sniffing, snooping is more commonly used to refer to passive listening and is considered a security risk.

SOAR systems

SOAR systems: A security orchestration, automation, and response system that integrates different security tools and processes to automate and manage security operations. It is commonly used in cybersecurity to help organizations respond to and mitigate cyber threats. Examples include IBM Resilient, Demisto, and Swimlane.

Social networks

Social networks: Online platforms that enable users to connect with each other and share content, such as text, images, and videos. They are commonly used for socializing and networking, as well as for marketing and advertising. Examples of social networks include Facebook, Twitter, and LinkedIn.

Software escrow

Software escrow: The process of depositing a copy of software code with a third party to ensure that the code is available in the event that the software developer becomes unable or unwilling to provide support or updates. It is used in software licensing agreements to protect the user’s interests. Examples include using escrow agreements […]

Spam

Spam: Unwanted, unsolicited digital communication, often in the form of emails, which are sent in bulk. While often merely annoying and inconvenient, spam can sometimes contain malicious links or attachments or be used in phishing attacks. It’s a common method used to disseminate malware or trick individuals into divulging personal information or sensitive data. Effective […]

Spike

Spike: A sudden increase in traffic on a network or system, potentially causing it to crash or slow down. It is used in network analysis and monitoring to detect potential security threats or performance issues. Examples include a spike in web traffic during a cyber-attack or a spike in database queries during peak usage hours.