Customer Portal
Support
Documentation
GitHub
FAQ
Contact
English
Polski
Try for free
Solutions
Use cases
Network automation
Automatic asset management
Network performance monitoring
Unknown threat detection
Compliance and regulation
See all use cases
Industries
Sycope for the Enterprise Sector
Sycope for the Public Sector
Sycope for Telco & ISP
Sycope for Education
Products
Visibility
Gain full visibility into all network activity to monitor traffic, performance, and IT security.
Performance
Evaluate and report key performance metrics to measure the effectiveness of your IT infrastructure.
Security
Identify and analyze security threats across the organization using MITRE ATT&CK-based tactics and techniques.
Asset discovery
Monitor network resources and record traffic between subnets, hosts, or applications using the NetFlow protocol for both technical and business insights.
Pricing
Resources
Blog
Articles on cyber security, network monitoring and IT industry trends.
Videos library
Tutorials, how-to videos and webinars.
Dictionary
Topics and terms around network visibility, performance and security well and easy explained.
Case Studies
Sycope’s clients success stories.
Integrations
List of solutions and products compatible with Sycope.
White paper & ebook
Expertiese knowledge shared by Sycop’s experts – download for free.
Resource library
All Sycope’s content in one place. Filter and search our library.
Partners
Become a Partner
Grow your business with Sycope.
Deal registration
Authorize your deal and get special benefits.
Company
About Us
Meet the people who build and developed Sycope.
Events
Upcoming events and live webinars - let's meet.
Career
Opportunities to join Sycope’s team.
Request a demo
Try for free
Request a demo
Try for free
Home
-
Dictionary
Sycope dictionary
We understand how important it is to build the knowledge around the solution we offer - we provide you with extra insights that can help in using the Sycope solution more effectively.
Learn more
Newest additions
Privilege Escalation
Privilege escalation is an attack where an attacker gains higher-level system access than authorized, exploiting vulnerabilities or misconfigurations.
Learn more >
Lateral Movement
Lateral movement is a post-breach technique where attackers move across a network to escalate privileges and access sensitive systems and data.
Learn more >
Beaconing
Malware's periodic communication with a remote attacker-controlled server to receive commands or exfiltrate data while evading detection.
Learn more >
C2 / C&C (Command and Control)
Infrastructure allowing attackers to remotely command infected devices, steal data, and launch coordinated cyberattacks across networks.
Learn more >
Check our vocabulary
Filter:
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
Clear all filters
Active directory
Microsoft's proprietary directory service. It runs on Windows Server and enables administrators to manage permissions.
Learn more >
Application Layer Attack (L7)
Attacks targeting web applications and APIs by exploiting software vulnerabilities to disrupt services, steal data, or prevent legitimate user access.
Learn more >
ARP Spoofing / Poisoning
ARP spoofing is a network attack where a hacker sends forged ARP messages to redirect traffic through themselves, enabling data interception and manipulation.
Learn more >
Beaconing
Malware's periodic communication with a remote attacker-controlled server to receive commands or exfiltrate data while evading detection.
Learn more >
Brute Force
Automated attack method that systematically tests numerous password combinations until gaining unauthorized access to an account or system.
Learn more >
C2 / C&C (Command and Control)
Infrastructure allowing attackers to remotely command infected devices, steal data, and launch coordinated cyberattacks across networks.
Learn more >
Credential Stuffing
Automated attack using stolen login credentials across multiple websites to gain unauthorized account access.
Learn more >
Cyber Threat Intelligence
Security feed algorithm implemented in Sycope CTI actively monitors a number of sources and generates unified list of current IoCs.
Learn more >
Data deduplication
It helps to save enormous amount of data storage. Sycope as first on the market used deduplication mechanism for NetFlow.
Learn more >
Data mining
A technique used to analyze existing information, usually with the intention of pursuing new avenues to pursue business.
Learn more >
DDoS (Distributed Denial of Service)
Cyberattack where multiple compromised devices flood a target with traffic to overwhelm and disable services.
Learn more >
Dead Drop Resolver
A technique where attackers hide malicious data in legitimate online resources, allowing covert control without direct contact.
Learn more >
1
2
3
4
5
x
Leveraging the nTop nDPI for Application Visibility within Sycope/nProbe integration
< Previous video
Next video >
Leveraging the nTop nDPI for Application Visibility within Sycope/nProbe integration
This site is registered on
wpml.org
as a development site. Switch to a production site key to
remove this banner
.