top of page

Glossary

Find all key terms and acronyms related to Digital Executive Protection and Security.

A

Account Takeover
 

Unauthorized access and control of a user's online account by an attacker, typically achieved through various techniques such as phishing, credential stuffing, or password guessing.

Attack Surface
 

The sum total of all the vulnerabilities and entry points through which an attacker can gain unauthorized access to a system or network.

​

B

Botnet
 

A network of compromised computers or devices that are under the control of a malicious actor, usually used to carry out coordinated attacks, send spam, or perform other malicious activities.

​

Brand Protection
 

Measures taken to safeguard a brand's reputation, intellectual property, and customer trust from unauthorized use, counterfeiting, fraud, or other threats.

​

 

Breach Intelligence
 

Information gathered and analyzed about data breaches, including details such as compromised data, attack methods, and affected entities, in order to enhance security measures and prevent future breaches.

C

Cyber Attack
 

An intentional and malicious action or exploit that targets vulnerabilities in computer systems, networks, or digital infrastructure to gain unauthorized access, disrupt operations, steal data, or cause damage.

Cyber Risk Management
 

The process of identifying, assessing, and prioritizing cybersecurity risks to implement appropriate controls, safeguards, and mitigation strategies to protect critical assets and sensitive information.

 

Cyber Security
 

Information gathered and analyzed about data breaches, including details such as compromised data, attack methods, and affected entities, in order to enhance security measures and prevent future breaches.

Cyber Threat Intelligence
 

A network of compromised computers or devices that are under the control of a malicious actor, usually used to carry out coordinated attacks, send spam, or perform other malicious activities.

​

D

Data Broker
 

A company or entity that collects, aggregates, and sells personal or business data to other organizations for various purposes, including marketing, research, and analytics.

​

​​

​

Deep and Darkweb
 

Collective terms referring to parts of the internet that are not indexed by search engines and are intentionally hidden or require specific software or authorization to access, often associated with illegal activities and anonymity.

​

Digital Executive Protection
 

Measures and strategies implemented to safeguard high-profile individuals, such as executives or public figures, from digital threats, including cyberattacks, online harassment, or reputation damage.

​​

 

Digital Risk Protection
 

The use of tools, technologies, and strategies to monitor, detect, and mitigate digital risks, including threats to brand reputation, data breaches, intellectual property violations, and cyberattacks.

​​

Domain Protection
 

Measures taken to secure and protect domain names from unauthorized transfers, hijacking, misuse, or reputation damage.

​

​

​

Doxing
 

The act of publicly revealing or publishing private or personal information about an individual or organization without their consent, typically with malicious intent.

​

 

E

Executive Protection
 

A comprehensive approach involving physical, digital, and personal security measures implemented to protect high-profile individuals, such as executives or public figures, from various risks and threats.

​

I

Impersonation
 

Pretending to be someone else, typically with malicious intent, in order to deceive or defraud individuals or organizations.

​

​

​

Incident Response
 

The process of identifying, investigating, containing, mitigating, and recovering from a cybersecurity incident or breach to minimize its impact and restore normal operations.

​​​

O

Open Source Intelligence (OSINT)

The process of collecting and analyzing information from publicly available sources, including websites, social media, online forums, and public records, to gather insights and intelligence.

​

P

Personally Identifiable Information (PII)

Any data or information that can be used to identify an individual, such as name, address, social security number, or email address.

​

​

​

​

Phishing Attack
 

A type of cyber attack where attackers send deceptive emails or messages pretending to be from a trustworthy source to trick individuals into revealing sensitive information, such as login credentials or financial details.

​

Physical Security
 

Measures and strategies implemented to protect physical assets, facilities, and individuals from unauthorized access, theft, vandalism, or harm.

​

​

 

Protective Intelligence
 

The gathering, analysis, and application of information and insights to proactively identify and mitigate threats, risks, or vulnerabilities to individuals, organizations, or assets.

​

S

Security Operations Center (SOC)

A centralized team, facility, or department responsible for monitoring, detecting, analyzing, and responding to security incidents and threats in an organization's infrastructure or network.

​

​

Social Engineering
 

Psychological manipulation and deception techniques used by attackers to trick individuals into divulging sensitive information or performing actions that may compromise security.

​

​

Social Media Monitoring
 

The act of publicly revealing or publishing private or personal information about an individual or organization without their consent, typically with malicious intent.

​

​

 

Spoof Email Address
 

An email address created or forged to mimic a legitimate email address, often used in phishing attacks or to deceive recipients.

​

​

bottom of page