top of page
Cyber Threat Intelligence Glossary
cyber threat intelligence terms.png

A  

 

Access Control: Systems and techniques designed to regulate user interactions with resources in a computing environment. 

Account Harvesting: The process of gathering valid account usernames from a system.

 

Advanced Encryption Standard (AES): A widely used symmetric encryption method for securing data globally. 
 

Advanced Persistent Threat (APT): A long-term, targeted cyberattack in which a threat actor remains undetected within a network for an extended period. 
 

Adware: Software that displays or downloads advertisements automatically when a user is online. 
 

Air Gap: A security technique that isolates a computer or network by preventing it from connecting externally. 
 

Artificial Intelligence (AI) in Cybersecurity: The application of AI and machine learning to identify and mitigate cyber threats. 
 

Attack Surface: The total number of points through which an unauthorised user could gain access or extract data from an environment.
 

Authentication: The process of confirming the identity of a user, process, or device, typically required to grant access to IT resources. 

Helvetica Light is an easy-to-read font, with tall and narrow letters, that works well on almost every site.

elemendar cybersecurity logo white colorful dot

Elemendar Ltd 2025

Company Number 10736268 registered in England and Wales

bottom of page