Chat with us, powered by LiveChat
Lightspeed Solutions
Contact Form

FInd out more about what Lightspeed Solutions has to offer. You can also contact us by emailing info@lightspeedsolutions.net or calling 941-212-0200.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Cybersecurity Glossary

Cybersecurity is crucial nowadays. Lightspeed Solutions provides insights on various cybersecurity topics, such as endpoint protection, cloud security, and types of cyber attacks.

Woman on laptop

Search and Learn

Unlock the language of cybersecurity with Lightspeed Solutions' glossary page. Understand key terms easily.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

APT (Advanced Persistent Threat)

A security breach that enables an attacker to gain access or control over a system for an extended period of time usually without the owner of the system being aware of the violation. Often an APT takes advantage of numerous unknown vulnerabilities or zero day attacks, which allow the attacker to maintain access to the target even as some attack vectors are blocked.

Access Control

Access control is the mechanism for managing user access to resources. There are three types of access control: DAC, MAC, and RBAC. DAC uses on-object ACLs to grant or deny specific privileges to users, MAC restricts access based on subject-object classification or clearance level labels, and RBAC controls access through job labels assigned with necessary permissions.

Anti-virus

A security program designed to monitor a system for malicious software. Once malware is detected, the AV program will attempt to remove the offending item from the system or may simply quarantine the file for further analysis by an administrator. It is important to keep AV software detection databases current in order to have the best chance of detecting known forms of malware.

Antivirus Software

An anti-virus program detects and removes malicious code from a computer system or network communications. It uses pattern recognition, anomaly detection, behavioral detection, and heuristic detection to detect known and unknown malware.

Asset

Anything that is used in and is necessary to the completion of a business task. Assets include both tangible and intangible items such as equipment, software code, data, facilities, personnel, market value and public opinion.