Sycope dictionary

We understand how important it is to build the knowledge around the solution we offer - we provide you with extra insights that can help in using the Sycope solution more effectively.

Learn more
Newest additions
Check our vocabulary
Active directory
Microsoft's proprietary directory service. It runs on Windows Server and enables administrators to manage permissions.
Learn more >
Anomaly Detection
A method that monitors data to identify unusual patterns or behavior. It helps detect possible threats, faults, or fraud early so they can be investigated.
Learn more >
Application Layer Attack (L7)
Attacks targeting web applications and APIs by exploiting software vulnerabilities to disrupt services, steal data, or prevent legitimate user access.
Learn more >
APT (Advanced Persistent Threat)
APT is a targeted cyberattack in which attackers keep covert access to a system for a long time to steal data, disrupt operations, or conduct espionage.
Learn more >
ARP Spoofing / Poisoning
ARP spoofing is a network attack where a hacker sends forged ARP messages to redirect traffic through themselves, enabling data interception and manipulation.
Learn more >
Beaconing
Malware's periodic communication with a remote attacker-controlled server to receive commands or exfiltrate data while evading detection.
Learn more >
BGP (Border Gateway Protocol)
A routing protocol that directs data between different networks on the internet. It helps choose paths for traffic so networks can exchange information efficiently.
Learn more >
Botnet
A botnet is a network of infected devices controlled remotely by an attacker. It is used to carry out automated attacks such as spam, DDoS, and data theft.
Learn more >
Brute Force
Automated attack method that systematically tests numerous password combinations until gaining unauthorized access to an account or system.
Learn more >
C2 / C&C (Command and Control)
Infrastructure allowing attackers to remotely command infected devices, steal data, and launch coordinated cyberattacks across networks.
Learn more >
Credential Stuffing
Automated attack using stolen login credentials across multiple websites to gain unauthorized account access.
Learn more >
Cryptojacking / Cryptomining
Unauthorized use of a device’s computing power to mine cryptocurrency, usually without the owner’s knowledge. It consumes resources, slowing performance and increasing energy use.
Learn more >
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.