Cyber Security Term: Air Gap

NICCS’s Definition To physically separate or isolate a system from other systems or networks (verb). Our Translation To keep a computer not plugged into the internet or any network. The idea behind this is that if the computer can’t be connected to remotely it is going to be more secure. It’s not really that easy […]

Cyber Security Term: Adversary

NICCS’s Definition An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities. Our Translation People who want to cause you harm. Anyone can be an adversary. This is a stupid definition to have as a cyber security definition. You could just use a dictionary. The Green Knight Chief Hacker

Cyber Security Term: Advanced Persistent Threat

NICCS’s Definition An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception). Our Translation Basically China, Russia, and North Korea. These are the real bad guys. Not every business will face this high level […]

Cyber Security Term: Active Content

NICCS’s Definition Software that is able to automatically carry out or trigger actions without the explicit intervention of a user. Our Translation Software that does things on it’s own in the background like Google on android phones. Software shouldn’t run on your computer without freaking permission!!! The Green Knight Chief Hacker

Cyber Security Term: Active Attack

NICCS’s Definition An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources, its data, or its operations. Our Translation Someone is currently attacking your system on purpose. Expect to be attacked all the time. Cyber attacks NEVER stop! The Green Knight Chief Hacker

Cyber Security Term: Access Control Mechanism

NICCS’s Definition Security measures designed to detect and deny unauthorized access and permit authorized access to an information system or a physical facility. Our Translation Just a fancy way to say locks. Every access point needs a lock. Locks only work if they are used properly. The Green Knight Chief Hacker

Cyber Security Term: Access Control

NICCS’s Definition The process of granting or denying specific requests for or attempts to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities. Our Translation You control your stuff and can allow or not allow someone to see it. You control the doors don’t give up that control […]

Cyber Security Term: Access

NICCS’s Definition The ability and means to communicate with or otherwise interact with a system, to use system resources to handle information, to gain knowledge of the information the system contains, or to control system components and functions. Our Translation Someone can get in to your stuff and look at it. They might also be […]