Darktrace Cyber AI Glossary

Explore commonly used cybersecurity terms
Merci ! Votre soumission a été reçue !
Oups ! Un problème est survenu lors de la soumission du formulaire.

A

Account Takeover

Account takeover is when a user's profile has been hijacked by a cyber criminal.

Artificial Intelligence

Artificial intelligence (AI) is a vast branch of computer science concerned with a development in software that allows computer systems to perform tasks that imitate human cognitive intelligence.

Botnet

A botnet attack is a cyber attack that uses a network of compromised computers to conduct malicious activity without the victims knowledge.

Business Email Compromise (BEC)

Business Email Compromise is when a cyber criminal tricks a victim by impersonating a valuable or high-ranking individual within a business.

Content Filtering

The process of screening or restricting content to objectionable content on the web, in the email inbox, or other mediums.

Email Security

Email security is the practice of protecting email communication from unauthorized activity.

Email Spam

Email spam is unwanted or unsolicited emails that end up in your email inbox.

Integrated Cloud Email Security (ICES)

ICES is a type of email security that supplements cloud-based email services, providing email protection against a wide range of threats.

Machine Learning

Machine learning is a branch of artificial intelligence that uses algorithms to teach computers to learn and program themselves in order to classify data or predict future outcomes.

Malware

Malware is malicious software that is designed to obtain valuable data or damage and destroy cyber systems.

Phishing

Phishing is when a threat actor poses as a legitimate email sender in an attempt to get victims to give them sensitive information.

Ransomware

Ransomware is a combination of the words "ransom" and "software." The word ransomware refers to the downloading of malware and the encryption of valuable documents by a cyber criminal who will hold those documents until a ransom is payed.

Secure Email Gateway (SEG)

A secure email gateway (SEG) or a secure email server (SEC) is a type of email security software that sits between inbound and outbound email communication.

Smishing

Smishing is the process by which a threat actor sends fraudulent SMS messages in order to get victims to give away sensitive information or download malicious files.

Social Engineering

Social engineering is an attack technique used by cyber-criminals to build trust with and trick their victims into fulfilling a request.

Spear Phishing

Spear phishing is a more targeted form of "Phishing". Both of which refer to a cyber security threat involving sending fraudulent emails to solicit information while posing as a legitimate sender.

Spoofing

Spoofing is the process by which someone sends a fraudulent message using a false identity in order to solicit sensitive information.

Bonne nouvelle pour votre entreprise.
Mauvaise nouvelle pour les méchants.

Commencez votre essai gratuit

Commencez votre essai gratuit

Livraison flexible
Vous pouvez l'installer virtuellement ou avec du matériel.
Installation rapide
Une heure seulement pour la mise en place - et encore moins pour un essai de sécurité du courrier électronique.
Choisissez votre voyage
Essayez Self-Learning AI là où vous en avez le plus besoin - y compris dans le cloud, sur le réseau ou par courriel.
Aucun engagement
Accès complet à Darktrace Threat Visualizer et à trois rapports sur mesure sur les menaces, sans obligation d'achat.
For more information, please see our Privacy Notice.
Thanks, your request has been received
A member of our team will be in touch with you shortly.
YOU MAY FIND INTERESTING
Oups ! Un problème est survenu lors de la soumission du formulaire.

Obtenez une démo

Livraison flexible
Vous pouvez l'installer virtuellement ou avec du matériel.
Installation rapide
Une heure seulement pour la mise en place - et encore moins pour un essai de sécurité du courrier électronique.
Choisissez votre voyage
Essayez Self-Learning AI là où vous en avez le plus besoin - y compris dans le cloud, sur le réseau ou par courriel.
Aucun engagement
Accès complet à Darktrace Threat Visualizer et à trois rapports sur mesure sur les menaces, sans obligation d'achat.
Merci ! Votre soumission a été reçue !
Oups ! Un problème est survenu lors de la soumission du formulaire.