Cyber Security


A mechanism of directing a signal or data element toward a particular hardware address or hardware pieces. It makes it possible to connect multiple devices on the same network within a building or campus.

Threat remediation

A process by which organizations identify and resolve threats to their systems. Occurs when the threat can be eradicated. It is dependent on the type, category and priority that the threat falls into.


A process of problem-solving within a software or computer system. It consists of identifying a problem, parsing out the items that caused it, and resolving it.


Stands for Top Secret / Sensitive Compartmented Information. It's a US DoD security clearance. Eligibility for access to TS/SCI is determined by a Single Scope Background Investigation (SSBI) or periodic reinvestigation.


Stands for the Tactics, Techniques and Procedures of cyber threats. The highest-level description of the behavior or methods of working of cyber adversaries.

two-factor authentication

A form of multi-factor authentication that requires a password and a second factor. It can be a knowledge factor, possession factor, or inherence factor.

Vulnerability Management

A process of identifying, classifying, remediating, and mitigating security vulnerabilities. It is integral to computer security and network security.

Web Application Firewall

An application firewall for HTTP applications that protects servers. It filters and monitors HTTP traffic between a web application and the Internet.

Web Proxy

A computer or a software system that acts as a gateway between a local network and a larger-scale network such as the internet. It provides increased performance and security and helps filter what users connected to the network can access.

Wireless security

A subset of network security that prevents unauthorized and malicious access to computers or data using wireless networks. It is delivered through wireless devices.

Development by

Sign up for updates
straight to your inbox