Skip to content

Latest commit

 

History

History
998 lines (562 loc) · 33.9 KB

dictionary.md

File metadata and controls

998 lines (562 loc) · 33.9 KB

Tip

To make it easier to search, you can check what dictionaries are available by filtering for "dictionary" image

Penetration Testing Dictionary

Penetration Testing (Pentesting)

A simulated cyberattack against a system to identify vulnerabilities.

(back to top)


Advanced Persistent Threat (APT)

A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected.

Aircrack-ng

A suite of tools for assessing Wi-Fi network security.

++Alternate Data Streams

source: https://blog.malwarebytes.com/101/2015/07/introduction-to-alternate-data-streams/

"Alternate Data Streams (ADS) are a file attribute only found on the NTFS file system"

Files are built from a couple of core attributes - one being $Data. You have a "Primary" Data Stream, and a secondary or "Alternate" Data Stream

Note

Please Note: you can essentially hide data in the secondary data stream.

Tip

You can use dir /R to check for the alternate data stream, and then more < <pastetheresult> to see what is hidden in $DATA.

dir /R

ARP Spoofing

A technique where an attacker sends falsified ARP messages over a local network.

Attack Surface

The total sum of the vulnerabilities that can be exploited in a system.

Backdoor

A secret method of bypassing normal authentication to gain access to a system.

Blue Team

A Blue Team is a group of cybersecurity professionals responsible for defending an organization's systems, detecting threats, and responding to attacks to ensure security and resilience.

Botnet

A network of compromised devices controlled by an attacker.

Brute Force Attack

Attempting to gain access by trying all possible combinations of credentials.

Buffer Overflow

Overwriting a program's memory, leading to arbitrary code execution.

Bug Bounty Program

A program that rewards individuals for finding and reporting vulnerabilities.

Burp Suite

A popular tool for web application security testing.

Clickjacking

A technique used to trick users into clicking on something different from what they perceive.

Command and Control (C2)

Servers that attackers use to communicate with compromised systems.

Credential Harvesting

Collecting credentials from users by tricking them into entering them into a fake website or form.

Credential Stuffing

Using leaked username/password pairs from one breach to access other sites.

Cross-Site Request Forgery (CSRF)

An attack that tricks a user into performing actions on a web application without their consent.

Cross-Site Scripting (XSS)

Injecting malicious scripts into web pages viewed by other users.

Data Exfiltration

The unauthorized transfer of data from a computer or other device.

Denial of Service (DoS) Attack

An attack designed to make a system unavailable by overwhelming it with traffic.

Dictionary Attack

A type of brute force attack that uses a list of common passwords or words.

Distributed Denial of Service (DDoS) Attack

A DoS attack using multiple systems to flood the target.

DNS Spoofing

An attack where false DNS information is inserted into a DNS resolver's cache.

Drive-by Download

The unintentional download of malicious software to a user’s device.

Eavesdropping

Secretly listening to private communications.

Enumeration

Extracting user names, machine names, network resources, and other services.

Exploit

A code or software that takes advantage of a vulnerability.

Firewall

A network security device that monitors and filters incoming and outgoing network traffic.

Footprinting

Collecting data on a target system or network to map out its structure.

Forensics

The process of collecting, analyzing, and preserving digital evidence.

Full Disk Encryption (FDE)

Encryption that covers all the data on a disk.

Fuzzing

A testing technique that involves inputting random data to find vulnerabilities.

Honey Net

A network of honeypots that simulate a network to lure attackers.

Honey Pot

A decoy system set up to attract and detect attackers.

Hydra

A fast and flexible password-cracking tool.

Impersonation Privileges

Provides access to admin sessions or the ability to read sensitive files if obtained.

Incident Response

The approach taken by an organization to handle a security breach or attack.

Insider Threat

A security risk that comes from within the organization, typically from employees or contractors.

Intrusion Detection System (IDS)

A device or software application that monitors network traffic for suspicious activity.

Intrusion Prevention System (IPS)

Similar to IDS but actively prevents detected threats.

John the Ripper

A password-cracking tool.

Keylogging

Recording the keystrokes of a user to capture sensitive information.

Kill Chain

A model used to describe the stages of a cyberattack, from reconnaissance to exfiltration.

Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to a system.

Malvertising

The use of online advertising to spread malware.

Man-in-the-Middle (MitM) Attack

Intercepting and possibly altering communication between two parties.

Metasploit

A popular penetration testing framework used to develop and execute exploit code.

Network Sniffing

Capturing and analyzing network packets to detect and troubleshoot issues.

Nikto

A web server scanner that tests for vulnerabilities.

Nmap

A network scanning tool used to discover hosts and services on a network.

Obfuscation

The act of making something unclear or unintelligible to obscure its meaning.

Open Web Application Security Project (OWASP)

An organization that provides resources to improve software security.

OWASP Top Ten

A list of the most critical security risks to web applications.

OWASP ZAP (Zed Attack Proxy)

An open-source web application security scanner.

Patch Management

The process of regularly updating software to fix vulnerabilities.

Patch Tuesday

The second Tuesday of each month when Microsoft releases security updates.

Payload

The part of an exploit that performs the intended malicious action.

Penetration Testing Execution Standard (PTES)

A standard framework for conducting penetration tests.

Phishing

A method of tricking individuals into providing sensitive information by pretending to be a trustworthy entity.

Pivoting

Using a compromised system as a launch point to attack other systems on the same network.

Port Scanning

A technique used to identify open ports and services on a networked device.

Privilege Escalation

Gaining higher-level permissions on a system.

Purple Team

A combination of Red and Blue Teams that collaborate to improve overall security.

Ransomware

Malware that encrypts files on a device, demanding a ransom for decryption.

Reconnaissance

The process of gathering information about a target.

Red Team

A group of ethical hackers who simulate attacks to test the security of an organization.

Red Teaming

A more comprehensive testing strategy that involves simulating real-world attacks over an extended period.

Reverse Shell

A shell session initiated by the target machine to the attacker’s machine.

Risk Assessment

The process of identifying, analyzing, and evaluating risks.

Rogue Access Point

A wireless access point that has been installed on a network without authorization.

Rootkit

A set of software tools that enable unauthorized access to a computer, often remaining hidden.

Sandboxing

Running programs in isolated environments to prevent them from affecting the main system.

Scanning

Actively probing a target to gather information about its network and systems.

Security Information and Event Management (SIEM)

A solution that provides real-time analysis of security alerts generated by network hardware and applications.

Security Operations Center (SOC)

A centralized unit that deals with security issues at the organizational level.

Security Orchestration, Automation, and Response (SOAR)

Tools that automate the response to security incidents.

Security Posture

The overall security status of an organization's systems, networks, and information.

Session Hijacking

An attack that involves taking over a user session to gain unauthorized access.

Shell

A command-line interface that allows users to interact with the operating system.

Sock Puppets

Online identities that are not a representation of who someone is - e.g., a fake identity or fake accounts. These are used to avoid someone noticing you are investigating them.

Spear Phishing

A targeted phishing attack aimed at a specific individual or organization.

SQL Injection (SQLi)

An attack that allows execution of malicious SQL statements on a database.

SQLmap

An automated tool for detecting and exploiting SQL injection flaws.

SSL/TLS

Protocols for encrypting data transmitted over a network.

Steganography

The practice of hiding data within other non-secret data.

Supply Chain Attack

Attacking an organization by targeting less-secure elements in its supply chain.

Threat Hunting

The process of proactively searching for cyber threats that are lurking undetected in a network.

Threat Intelligence

Information that helps organizations understand and mitigate cyber threats.

Threat Modeling

The process of identifying and prioritizing potential threats to a system.

Time-based One-Time Password (TOTP)

A temporary passcode generated by an algorithm that uses the current time as one of its factors.

Tokens

Temporary keys allowing access to systems and networks without providing credentials with every instance of access. Similar to cookies for web browsers.

Delegate tokens

Created when logging into a machine or using Remote Desktop RDP

Impersonate tokens

An impersonate token is a temporary credential that allows one user or system to act on behalf of another with their permissions.

Trojan Horse

Malicious software disguised as legitimate software.

Two-Factor Authentication (2FA)

A security process that requires two separate forms of identification.

Virus

A type of malware that replicates by modifying other programs and inserting its code.

Virtual Machine Escape

An attack that allows an attacker to escape the confines of a virtual machine and interact with the host operating system.

VPN (Virtual Private Network)

A secure connection over a less-secure network, like the internet.

Vulnerability

A weakness in a system that can be exploited by a threat actor.

Watering Hole Attack

An attack strategy where the attacker infects websites likely to be visited by a specific group of individuals.

Windows Privilege Escalation

The process of exploiting vulnerabilities or misconfigurations in a Windows system to gain higher levels of access or permissions.

Wireshark

A network protocol analyzer used to capture and analyze network traffic.

Worm

A type of malware that replicates itself in order to spread to other computers.

Zero-Day

A vulnerability that is unknown to the software vendor and for which no patch exists.


Active Directory Vulnerability Dictionary

LLMNR (Link-Local Multicast Name Resolution)

A protocol for resolving hostnames to IP addresses within a local network without requiring a DNS server.

SMB Relay

Instead of cracking passwords, we can intercept the hashes and send those on (relay them) to other machines and potentially gain access.

Gaining Shell Access

Exploiting features in order to control the victim machine remotely, with a command-line tool.

IPv6 Attacks

Attacks against the IPv6 network protocol which is enabled by default on Windows server devices.

Passback Attacks

Note

Not yet added.

Infrastructure Dictionary

(back to top)

Infrastructure as Code (IaC)

The practice of managing and provisioning computing infrastructure through machine-readable definition files, rather than physical hardware configuration.

Virtualization

The creation of virtual versions of physical components, such as servers, storage devices, and network resources.

Hypervisor

Software that creates and runs virtual machines (VMs) by abstracting the underlying hardware.

Containerization

The process of packaging an application and its dependencies into a container that can run on any computing environment.

Bare Metal

Physical servers without any virtualization, where the operating system runs directly on the hardware.

Load Balancer

A device or software that distributes network or application traffic across multiple servers to ensure availability and reliability.

Data Center

A facility used to house computer systems and associated components, such as telecommunications and storage systems.

High Availability (HA)

A system design approach and associated service implementation that ensures a certain level of operational performance, typically uptime, for a higher than normal period.

Disaster Recovery (DR)

A set of policies and procedures to enable the recovery or continuation of vital technology infrastructure after a natural or human-induced disaster.

Scalability

The ability of a system to handle growing amounts of work by adding resources to the system.

Redundancy

The duplication of critical components or functions of a system to increase reliability and availability.

Fault Tolerance

The ability of a system to continue functioning when part of the system fails.

Colocation

A data center facility where businesses can rent space for servers and other computing hardware.

On-Premises

Infrastructure that is hosted within the physical confines of an organization’s facilities.

Cloud Computing

The delivery of computing services—including servers, storage, databases, networking, software—over the cloud (internet).

Edge Computing

The practice of processing data near the edge of the network, where the data is being generated, rather than in a centralized data-processing warehouse.

Rack Unit (RU)

A unit of measure defined as 1.75 inches, used to describe the height of equipment in a rack.

Service Level Agreement (SLA)

A contract between a service provider and a customer that outlines the level of service expected during its term.

Virtual Private Server (VPS)

A virtual machine sold as a service by an Internet hosting service.

Backup

The process of copying and archiving computer data so it may be used to restore the original after a data loss event.

Storage Area Network (SAN)

A network that provides access to consolidated, block-level data storage.

Network-Attached Storage (NAS)

A dedicated file storage device that provides local area network (LAN) nodes with file-based shared storage through a standard Ethernet connection.

RAID (Redundant Array of Independent Disks)

A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for data redundancy and performance improvement.

Blade Server

A modular server that fits into a chassis with other blade servers, sharing power and cooling resources.

UPS (Uninterruptible Power Supply)

A device that provides emergency power to a load when the input power source or mains power fails.

Network Operations Center (NOC)

A centralized location from which IT professionals monitor, manage, and maintain network infrastructure.

DevOps

A set of practices that combine software development (Dev) and IT operations (Ops) to shorten the systems development lifecycle.

Monitoring

The process of observing and checking the progress or quality of a system over time.

Logging

The act of keeping a log of events, errors, and other operational details in software or hardware systems.

Configuration Management

The process of maintaining computer systems, servers, and software in a desired, consistent state.

Patch Management

The process of managing a network of computers by regularly performing patch deployment to ensure systems are up-to-date and protected from vulnerabilities.

Orchestration

The automated configuration, management, and coordination of computer systems, applications, and services.

Serverless

A cloud-computing execution model where the cloud provider dynamically manages the allocation and provisioning of servers.

Scripting

Writing scripts to automate repetitive tasks in infrastructure and system management.

Virtual Network Function (VNF)

A software implementation of a network function that can be deployed on a virtualized infrastructure.

Container Orchestration

The automated process of managing the lifecycle of containers, especially in large, dynamic environments.

Infrastructure Monitoring

The practice of collecting and analyzing data to ensure that infrastructure performs at its best and meets the needs of users.

Hybrid Cloud

A computing environment that combines on-premises infrastructure, private cloud services, and a public cloud.

Private Cloud

A cloud computing model where the cloud infrastructure is dedicated to a single organization.

Public Cloud

A cloud computing model where the cloud infrastructure is owned and operated by a third-party cloud service provider, and resources are shared among multiple organizations.

Kubernetes

An open-source container orchestration platform that automates the deployment, scaling, and operation of application containers.

Docker

A platform used to develop, ship, and run applications inside containers.

OpenStack

An open-source cloud computing platform for building and managing public and private clouds.

Terraform

An open-source infrastructure as code software tool that enables users to define and provision data center infrastructure using a high-level configuration language.

Ansible

An open-source automation tool for configuration management, application deployment, and task automation.

Puppet

An open-source software configuration management tool that automates the management of infrastructure.

Chef

An open-source automation platform that transforms infrastructure into code, enabling operations and development teams to manage environments.

Jenkins

An open-source automation server used to automate parts of software development, such as building, testing, and deploying code.

Continuous Integration (CI)

A development practice where developers integrate code into a shared repository frequently, with each integration automatically verified by a build.

Continuous Deployment (CD)

A software release process where code changes are automatically deployed to production after passing predefined tests.

Continuous Delivery

A software development practice where code changes are automatically prepared for a release to production.

Site Reliability Engineering (SRE)

A discipline that applies aspects of software engineering to infrastructure and operations problems to create scalable and highly reliable software systems.

Networking Dictionary

(back to top)

CIDR Notation

CIDR notation is a shorthand way to represent a range of IP addresses by specifying the starting address and the size of the group using a suffix (like /24).

source: ChatGPT

IP Address

A unique string of numbers separated by periods or colons that identifies each computer using the Internet Protocol to communicate over a network.

Subnetting

The practice of dividing a network into smaller, more efficient subnetworks.

DNS (Domain Name System)

The phonebook of the internet, translating domain names into IP addresses so browsers can load resources.

DHCP (Dynamic Host Configuration Protocol)

A network management protocol that dynamically assigns IP addresses to devices on a network.

Router

A device that forwards data packets between computer networks.

Switch

A device that connects devices on a computer network by using packet switching to receive, process, and forward data to the destination device.

Firewall

A network security device that monitors and filters incoming and outgoing network traffic based on an organization’s previously established security policies.

VLAN (Virtual LAN)

A subnetwork that can group together a collection of devices from different physical LANs.

NAT (Network Address Translation)

A method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.

VPN (Virtual Private Network)

A service that allows you to connect to the internet securely and privately by routing your connection through a server and hiding your online actions.

MAC Address

A unique identifier assigned to a network interface controller for communications at the data link layer of a network segment.

OSI Model

A conceptual framework used to describe the functions of a networking or telecommunication system in seven layers.

TCP/IP

The suite of communication protocols used to connect network devices on the internet.

Bandwidth

The maximum rate of data transfer across a given path.

Latency

The delay before

a transfer of data begins following an instruction for its transfer.

Throughput

The rate of successful message delivery over a communication channel.

Packet

A unit of data that is routed between an origin and a destination on the internet or any other packet-switched network.

Ping

A networking utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer.

Traceroute

A network diagnostic tool that displays the route and measures transit delays of packets across an IP network.

Load Balancing

The process of distributing network traffic across multiple servers.

BGP (Border Gateway Protocol)

The protocol used to exchange routing information between networks on the internet.

MPLS (Multiprotocol Label Switching)

A technique in high-performance telecommunications networks that directs data from one network node to the next based on short path labels rather than long network addresses.

QoS (Quality of Service)

The description or measurement of the overall performance of a service, such as a telephony or computer network or a cloud computing service, particularly the performance seen by the users of the network.

SDN (Software-Defined Networking)

An approach to network management that enables dynamic, programmatically efficient network configuration in order to improve network performance and monitoring.

DNS Spoofing

An attack in which corrupted DNS data is inserted into the cache of a DNS resolver, returning an incorrect IP address.

ARP (Address Resolution Protocol)

A protocol used for mapping an IP address to a physical machine address that is recognized in the local network.

ICMP (Internet Control Message Protocol)

A network layer protocol used by network devices to diagnose network communication issues.

SNMP (Simple Network Management Protocol)

An Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.

NAT Gateway

A service that allows instances in a private subnet to connect to services outside your VPC but prevents the outside services from initiating a connection with those instances.

Firewall Rule

A defined set of rules used to control network traffic, allowing or denying communications based on criteria such as IP address, port number, or protocol.

Port Forwarding

The process of redirecting a communication request from one address and port number combination to another while the packets traverse a network gateway, such as a router or firewall.

IPSec (Internet Protocol Security)

A suite of protocols used to secure Internet Protocol (IP) communications by authenticating and encrypting each IP packet in a communication session.

VLAN Trunking

A method of carrying multiple VLANs over a single network link between devices.

Proxy Server

A server that acts as an intermediary for requests from clients seeking resources from other servers.

Content Delivery Network (CDN)

A geographically distributed network of proxy servers and their data centers that delivers content to users based on their geographic location.

DNS Resolution

The process of translating a domain name into its corresponding IP address.

Network Segmentation

The practice of dividing a computer network into smaller parts, or segments, to improve performance and security.

Route Table

A data table stored in a router or a networked computer that lists the routes to particular network destinations.

ACL (Access Control List)

A list of rules used to grant or deny access to certain digital environments.

Broadcast Domain

A logical division of a computer network, in which all nodes can reach each other by broadcast at the data link layer.

Collision Domain

A network segment connected by a shared medium or through repeaters where simultaneous data transmissions can collide with one another.

Network Latency

The time it takes for a data packet to travel from its source to its destination across a network.

Network Topology

The arrangement of different elements (links, nodes, etc.) in a computer network.

Network Bandwidth

The maximum data transfer rate of a network or Internet connection.

Network Security

Policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Wireless Network

A computer network that uses wireless data connections between network nodes.

Ethernet

A family of computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN), and wide area networks (WAN).

802.11 Protocol

A set of standards that define communication for wireless local area networks (WLANs).

VPN Tunnel

A secure connection between two or more devices across a public network like the Internet.

Network Address Translation (NAT)

A method of modifying network address information in IP packet headers while in transit across a traffic routing device.

Peering

The relationship between Internet service providers (ISPs) in which they exchange traffic between their networks.

Load Balancer

A device or software that distributes network or application traffic across multiple servers to ensure availability and reliability.

Cloud Engineering Dictionary

(back to top)

## Cloud Architecture

The components and subcomponents required for cloud computing, including databases, software capabilities, applications, and services.

Multi-Cloud

The use of multiple cloud computing services in a single heterogeneous architecture.

Cloud Native

A software approach that involves building and running applications that fully exploit the advantages of the cloud computing delivery model.

Serverless Computing

A cloud-computing execution model where the cloud provider dynamically manages the allocation and provisioning of servers.

Microservices

An architectural style that structures an application as a collection of loosely coupled services.

Containerization

The packaging of software code with all its dependencies so that it can run uniformly and consistently on any infrastructure.

Orchestration

The automated arrangement, coordination, and management of complex computer systems, middleware, and services.

Infrastructure as a Service (IaaS)

A form of cloud computing that provides virtualized computing resources over the internet.

Platform as a Service (PaaS)

A cloud computing model that delivers hardware and software tools to users over the internet.

Software as a Service (SaaS)

A software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted.

Function as a Service (FaaS)

A category of cloud computing services that provides a platform allowing customers to develop, run, and manage application functionalities without the complexity of building and maintaining the infrastructure.

Cloud Security

A set of policies, controls, procedures, and technologies that work together to protect cloud-based systems, data, and infrastructure.

Identity and Access Management (IAM)

A framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources.

Auto Scaling

A cloud computing feature that automatically adjusts the amount of computational resources in a server farm based on the load.

Elasticity

The ability of a cloud service to automatically scale computing resources up or down as needed.

Availability Zones

Physically separate locations within a cloud provider’s data centers that help safeguard applications and data from data center failures.

CloudFormation

An infrastructure as code (IaC) service from Amazon Web Services (AWS) that allows you to easily model and set up AWS resources.

CloudTrail

A service that enables governance, compliance, operational auditing, and risk auditing of your AWS account.

CloudWatch

A monitoring and observability service by AWS that provides data and actionable insights to monitor applications, understand and respond to system-wide performance changes, and optimize resource utilization.

S3 (Simple Storage Service)

An object storage service that offers industry-leading scalability, data availability, security, and performance.

Lambda

An AWS service that lets you run code without provisioning or managing servers.

EC2 (Elastic Compute Cloud)

A web service that provides resizable compute capacity in the cloud, designed to make web-scale cloud computing easier for developers.

VPC (Virtual Private Cloud)

A virtual network dedicated to your AWS account, logically isolated from other virtual networks in the AWS Cloud.

Azure Resource Manager (ARM)

The deployment and management service for Azure, providing a consistent management layer that enables you to create, update, and delete resources in your Azure account.

Azure DevOps

A set of services for DevOps, including CI/CD pipelines, version control, and Agile tools, integrated with

Azure.

Google Kubernetes Engine (GKE)

A managed, production-ready environment for running containerized applications, with support for Kubernetes orchestration.

Anthos

Google Cloud’s application management platform that provides a consistent development and operations experience for cloud and on-premises environments.

BigQuery

Google Cloud’s fully-managed, serverless, highly scalable, and cost-effective multi-cloud data warehouse.

IAM Roles

A set of permissions that define what actions can be taken on what resources within a cloud environment.

Cloud Storage

A service model in which data is maintained, managed, backed up remotely, and made available to users over a network.

Cloud Firewall

A security service provided by cloud vendors that protects cloud infrastructure and resources from network threats.

Kubernetes

An open-source system for automating the deployment, scaling, and management of containerized applications.

Helm

A package manager for Kubernetes that helps you define, install, and upgrade even the most complex Kubernetes applications.

Istio

An open-source service mesh that layers transparently onto existing distributed applications, providing services such as load balancing, service-to-service authentication, monitoring, and more.

Terraform

An open-source infrastructure as code software tool that enables users to define and provision data center infrastructure using a high-level configuration language.

Cloud Compliance

Ensuring that cloud usage adheres to laws, regulations, standards, and organizational policies.

API Gateway

A service that provides a managed interface for developers to create, publish, maintain, monitor, and secure APIs at any scale.

DevSecOps

An extension of DevOps that integrates security practices into the DevOps approach.

Cloud Load Balancing

A fully distributed, software-defined managed service that provides global load balancing with a single IP address.

Kubernetes Ingress

An API object that manages external access to services in a cluster, typically HTTP.

Cloud Networking

The process of managing and configuring networks and communication systems in cloud environments.

Cloud Cost Management

The process of tracking, monitoring, and managing cloud usage and costs to optimize spending.

Cloud Analytics

The application of data analysis techniques to datasets stored in the cloud to uncover insights.

Cloud Orchestration

The use of technology to manage and coordinate the interactions between different cloud services, typically in a multi-cloud environment.

Service Mesh

A dedicated infrastructure layer for making service-to-service communication safe, fast, and reliable, usually within microservices architectures.

FinOps

The practice of bringing together finance, technology, and business teams to collaborate on data-driven spending decisions in the cloud.

Cloud Backup

The process of storing copies of data in a cloud environment to ensure its availability in case of system failures, disasters, or other data loss events.

Hybrid Cloud

A computing environment that combines on-premises infrastructure, private cloud services, and a public cloud.

Cloud Governance

The processes, rules, and policies that define how an organization operates in the cloud to ensure compliance, security, and effective management.

Cloud-Native Security

A security approach designed specifically for securing cloud-native applications, which are built to leverage the cloud’s scalability and flexibility.

(back to top)