Access Control
Access Control ensures that resources are only granted to those users who are entitled to them.
Blogging
Digital content that is self published to reach your audience.
C for cats
E for elephant
Hacker
Honeypot
A Baiting counter-tactic that is used against a threat actor. Typically, a monitored computer, that appears to hold valuable information, is placed onto a isolated network in the infrastructure. This allows detection of unauthorized access, analysis of their behavior, and protection.
Honeynet
I for Ice King
L for LEROOOY JENKINS
N for Never Give Gonna Give You Up
Proprietary Information
Ransomware
Hostage-Negotiation situation where the hostage is your proprietary information. The threat-actor will take a cipher, encrypt that data, and leave a message that locks down with a timer the infrastructure saying that they need to pay up or forever lose that data. If the ransom isn't paid during the allocated time, it will delete that data. In most cases, they'll just take the money and run off, so make sure that your data is backed up and verify.
Spam
Emails that are typically sent en mass to receptions that are either unwanted or inappropriate.
Threat-Actor
An individual, or group of people, whose intent is to cause harm to your infrastructure. You may also see the term Black-Hat hacker be used interchangeably.
VPN (Virtual Private Network)
Virus
Zero-Day
Zero-Day Attack
3-Way Handshake
This is an authentication method between computers before they begin transferring data. A similar example is that you sign for a package before the deliverer can hand over the package.