Glossary
Glossary
A
Asset Discovery
The process of identifying all assets within a network or cloud environment, including hardware, software, and data. This is essential for understanding the scope of potential attack surfaces.
Attack Surface
The total sum of vulnerabilities and points of entry that an attacker can use to access a system. It includes all the ways an unauthorized person could interact with the system.
C
Cloud Security
The set of policies, technologies, and controls deployed to protect data, applications, and infrastructure associated with cloud computing.
D
Domain Level Asset Discovery
A method of identifying and cataloging all domains and subdomains associated with an organization, often as part of an external attack surface management strategy.
E
External Attack Surface Management (EASM)
The practice of identifying, monitoring, and managing the external exposure points of an organization’s IT assets to reduce the risk of cyber attacks.
I
IP Address
A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
In-Depth Security Knowledge
A thorough understanding of security principles, technologies, and practices necessary to protect assets from threats.
K
Known Assets
Assets that are identified, inventoried, and managed by the organization.
T
Threat Detection
The process of identifying potential threats to a system through monitoring and analysis.
TRaViS (Threat and Vulnerability Information System)
A tool designed to help organizations manage and protect their external attack surface by providing continuous monitoring, threat detection, and comprehensive reporting.
U
Unknown Assets
Assets that are not inventoried or managed by the organization, often leading to security vulnerabilities.
V
Vulnerability
A weakness in a system that can be exploited by an attacker to gain unauthorized access to assets.
Vulnerability Feedback Processes
Mechanisms for reporting, tracking, and addressing vulnerabilities found in a system.
Vulnerability Search Tools
Tools designed to identify vulnerabilities in a system through automated scanning and analysis.
For a more detailed explanation of these terms and other cybersecurity concepts, please explore our blog and resources. Understanding these key terms is crucial for maintaining a robust cloud security posture.
Stay informed and secure with Cloud EASM.