Sycope dictionary

We understand how important it is to build the knowledge around the solution we offer - we provide you with extra insights that can help in using the Sycope solution more effectively.

Learn more
Newest additions
Check our vocabulary
Active directory
Microsoft's proprietary directory service. It runs on Windows Server and enables administrators to manage permissions.
Learn more >
Application Layer Attack (L7)
Attacks targeting web applications and APIs by exploiting software vulnerabilities to disrupt services, steal data, or prevent legitimate user access.
Learn more >
ARP Spoofing / Poisoning
ARP spoofing is a network attack where a hacker sends forged ARP messages to redirect traffic through themselves, enabling data interception and manipulation.
Learn more >
Beaconing
Malware's periodic communication with a remote attacker-controlled server to receive commands or exfiltrate data while evading detection.
Learn more >
Brute Force
Automated attack method that systematically tests numerous password combinations until gaining unauthorized access to an account or system.
Learn more >
C2 / C&C (Command and Control)
Infrastructure allowing attackers to remotely command infected devices, steal data, and launch coordinated cyberattacks across networks.
Learn more >
Credential Stuffing
Automated attack using stolen login credentials across multiple websites to gain unauthorized account access.
Learn more >
Cyber Threat Intelligence
Security feed algorithm implemented in Sycope CTI actively monitors a number of sources and generates unified list of current IoCs.
Learn more >
Data deduplication
It helps to save enormous amount of data storage. Sycope as first on the market used deduplication mechanism for NetFlow.
Learn more >
Data mining
A technique used to analyze existing information, usually with the intention of pursuing new avenues to pursue business.
Learn more >
DDoS (Distributed Denial of Service)
Cyberattack where multiple compromised devices flood a target with traffic to overwhelm and disable services.
Learn more >
Dead Drop Resolver
A technique where attackers hide malicious data in legitimate online resources, allowing covert control without direct contact.
Learn more >
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.