Customer Portal
Support
Documentation
GitHub
FAQ
Contact
English
Polski
Try for free
Solutions
Use cases
Network automation
Automatic asset management
Network performance monitoring
Unknown threat detection
Compliance and regulation
See all use cases
Industries
Sycope for the Enterprise Sector
Sycope for the Public Sector
Sycope for Telco & ISP
Sycope for Education
Products
Network Observability Platform
Visibility
Performance
Security
Asset discovery
Open source
LinkSense
TrueID
Pricing
Resources
Blog
Articles on cyber security, network monitoring and IT industry trends.
Videos library
Tutorials, how-to videos and webinars.
Dictionary
Topics and terms around network visibility, performance and security well and easy explained.
Case Studies
Sycope’s clients success stories.
Integrations
List of solutions and products compatible with Sycope.
White paper & ebook
Expertiese knowledge shared by Sycop’s experts – download for free.
Resource library
All Sycope’s content in one place. Filter and search our library.
Partners
Become a Partner
Grow your business with Sycope.
Deal registration
Authorize your deal and get special benefits.
Company
About Us
Meet the people who build and developed Sycope.
Events
Upcoming events and live webinars – let’s meet.
Career
Opportunities to join Sycope’s team.
Request a demo
Try for free
Request a demo
Try for free
Home
-
Dictionary
Sycope dictionary
We understand how important it is to build the knowledge around the solution we offer - we provide you with extra insights that can help in using the Sycope solution more effectively.
Learn more
Newest additions
WAF (Web Application Firewall)
A web application firewall monitors and filters traffic to a web application. It blocks suspicious requests to help prevent attacks such as SQL injection and cross-site scripting.
Learn more >
MTTD (Mean Time to Detect)
The average time it takes to detect a security threat or incident. It measures how quickly an organization identifies problems so it can respond sooner and reduce damage.
Learn more >
MTTR (Mean Time to Repair)
The average time needed to repair a system or recover from an incident after a failure is detected. It measures how quickly operations can be restored and downtime reduced.
Learn more >
False Positive
A false positive is an incorrect alert that flags a safe email, file, or process as a threat. It matters because it can waste time and interrupt normal work.
Learn more >
Check our vocabulary
Filter:
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
Clear all filters
Active directory
Microsoft's proprietary directory service. It runs on Windows Server and enables administrators to manage permissions.
Learn more >
Anomaly Detection
A method that monitors data to identify unusual patterns or behavior. It helps detect possible threats, faults, or fraud early so they can be investigated.
Learn more >
Application Layer Attack (L7)
Attacks targeting web applications and APIs by exploiting software vulnerabilities to disrupt services, steal data, or prevent legitimate user access.
Learn more >
APT (Advanced Persistent Threat)
APT is a targeted cyberattack in which attackers keep covert access to a system for a long time to steal data, disrupt operations, or conduct espionage.
Learn more >
ARP Spoofing / Poisoning
ARP spoofing is a network attack where a hacker sends forged ARP messages to redirect traffic through themselves, enabling data interception and manipulation.
Learn more >
Beaconing
Malware's periodic communication with a remote attacker-controlled server to receive commands or exfiltrate data while evading detection.
Learn more >
BGP (Border Gateway Protocol)
A routing protocol that directs data between different networks on the internet. It helps choose paths for traffic so networks can exchange information efficiently.
Learn more >
Botnet
A botnet is a network of infected devices controlled remotely by an attacker. It is used to carry out automated attacks such as spam, DDoS, and data theft.
Learn more >
Brute Force
Automated attack method that systematically tests numerous password combinations until gaining unauthorized access to an account or system.
Learn more >
C2 / C&C (Command and Control)
Infrastructure allowing attackers to remotely command infected devices, steal data, and launch coordinated cyberattacks across networks.
Learn more >
Credential Stuffing
Automated attack using stolen login credentials across multiple websites to gain unauthorized account access.
Learn more >
Cryptojacking / Cryptomining
Unauthorized use of a device’s computing power to mine cryptocurrency, usually without the owner’s knowledge. It consumes resources, slowing performance and increasing energy use.
Learn more >
1
2
3
4
x
Leveraging the nTop nDPI for Application Visibility within Sycope/nProbe integration
< Previous video
Next video >
Leveraging the nTop nDPI for Application Visibility within Sycope/nProbe integration
This site is registered on
wpml.org
as a development site. Switch to a production site key to
remove this banner
.