Browse Definitions :
77 results for:

ransomware

ransomware

Definition | searchSecurity

Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ...

ransomware as a service (RaaS)

Definition | WhatIs.com

Ransomware as a service (RaaS) is the offering of pay-for-use malware created for extortion over stolen or encrypted data, known as ransomware.

WannaCry ransomware

Definition | SearchSecurity

The WannaCry ransomware is a worm that spreads by exploiting vulnerabilities in the Windows operating system.

ransomware recovery

Definition | SearchDisasterRecovery

Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking encrypted data.

command-and-control server (C&C server)

Definition | WhatIs.com

A command and control server (C&C server) is a computer that issues directives to digital devices that have been infected with rootkits or other ...

doxware (extortionware)

Definition | WhatIs.com

Doxware, also known as extortionware, is an exploit in which the attacker accesses the target's sensitive data and threatens to publish it if the ...

cyberextortion

Definition | SearchSecurity

Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in return for stopping or...

microtrend

Definition | WhatIs.com

A microtrend is a tendency in the direction of some phenomenon that is fairly pervasive within a given sphere of influence and lasts for a few years.

PHI breach (protected health information breach)

Definition | SearchHealthIT

A PHI breach is unauthorized access, use or disclosure of individually identifiable health information that is held or transmitted by a healthcare ...

polymorphic virus

Definition | SearchSecurity

A polymorphic virus is a harmful, destructive or intrusive type of malware that can change or 'morph,' making it difficult to detect with antimalware...

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • RAID 6 (redundant array of independent disks)

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

Close