Cybersecurity Knowledge Hub

Basic Cybersecurity
Terms and Types

Click one of the letters below to automatically scroll down to terms beginning with that letter:

Definitions and Explanations

Cyber security is the discipline of protecting computer systems, networks, devices, and data from malicious attacks. It covers identifying threats, isolating them, countering them with no or minimal data loss, and working towards threat prevention.

Cybersecurity Terms with
i
Identity and access management (IAM)
Read more →

Mastering Identity and access management: System, components, importance, and optimizing IAM with Group-IB for your organization.

Identity providers (IdP)
Read more →

Discover integrating Identity Providers & XDR for robust cloud security. Simplify access, fortify authentication, and detect threats proactively!

Identity security
Read more →

Secure your business with Group-IB's IAM solutions. From passwordless access to expert consulting, fortify defenses against cyber threats. Align identity security with your business goals effectively.

Impersonation scams
Read more →

Learn about the key scenarios used in impersonation scams, the risks facing organizations, and what you can do to protect yourself

Incident Response
Read more →

Incident response is a complex multi-step process of identifying, localizing, and eliminating cybersecurity incidents.

Indicators of Attack (IOAs)
Read more →

Unlock proactive defense with combined IOA and IOC strategies. Explore Group-IB's cybersecurity solutions leveraging IoAs for early threat detection, adaptive defense, and comprehensive coverage against evolving cyber threats.

Indicators of Compromise (IOCs)
Read more →

Decoding Indicators of Compromise: Types, prevention, IOCs vs. IOAs, risk assessment, and managing IOCs with Group-IB.

Intrusion Detection and Prevention Systems (IDS/IPS)
Read more →

Intrusion detection and prevention systems (IDS/IPS) are security systems designed to detect and protect against unauthorized access to companies’ infrastructure.

Cybersecurity Terms with
s
Sandbox
Read more →

A sandbox in cybersecurity is an isolated environment for detecting and analyzing malicious payloads.

Sandbox evasion
Read more →

Sandbox evasion techniques are being built by cybercriminals to bypass modern malware analysis tools. 

Scam
Read more →

A scam is a deceptive business aimed at stealing money or other valuable goods from unsuspecting victims.

Secure software development lifecycle
Read more →

Secure software development lifecycle (SSDLc) is a software development lifecycle (SDLc) concept with a focus on building a secure product.

Security Information and Event Management
Read more →

Security Information and Event Managemen (SIEM) is a crucial part of any security system, as it connects and unifies the data contained in existing systems.

Security Operations Center (SOC)
Read more →

Learn about setting up a Security Operations Center (SOC). Explore core functions, SIEM benefits, building a SOC, and enhancing it with Group-IB MXDR and TI.

Session hijacking attack
Read more →

Learn the dangers of session hijacking and defend your online presence. Discover key strategies and how Group-IB's expertise can fortify your cybersecurity.

Session-based fraud detection and prevention
Read more →

Guarding Against Session-Based Fraud: Learn about common types, detection, prevention, and Group-IB's solutions.

Shadow IT
Read more →

Learn about Shadow IT, its risks, and how to manage it effectively. Explore real-world examples and discover Group-IB's Attack Surface Management solution.

SIM swap
Read more →

Unmasking SIM Swap Attacks: How they work, signs, prevention, and Group-IB's solutions.

Smishing
Read more →

Uncover the world of Smishing: differences from phishing, attack types, prevention, and indicators. Stay safe from smishing attacks.

SMS bombing
Read more →

Defend Against SMS Bombing: Learn about the risks, motives, and protection methods. Discover Group-IB's solutions. Stay secure!

Social engineering
Read more →

The social engineering definition boils down to various psychology-based techniques used to persuade people to disclose certain information or perform a specific action for malicious purposes.

Group-IB: Fight
against cybercrime

Trusted by 550+ enterprise businesses