Darktrace Cyber AI Glossary

Explore commonly used cybersecurity terms
Vielen Dank! Ihre Anfrage ist eingegangen!
Huch! Beim Absenden des Formulars ist etwas schief gelaufen.

A

Account Takeover

Account takeover is when a user's profile has been hijacked by a cyber criminal.

Artificial Intelligence

Artificial intelligence (AI) is a vast branch of computer science concerned with a development in software that allows computer systems to perform tasks that imitate human cognitive intelligence.

Botnet

A botnet attack is a cyber attack that uses a network of compromised computers to conduct malicious activity without the victims knowledge.

Business Email Compromise (BEC)

Business Email Compromise is when a cyber criminal tricks a victim by impersonating a valuable or high-ranking individual within a business.

Content Filtering

The process of screening or restricting content to objectionable content on the web, in the email inbox, or other mediums.

Email Security

Email security is the practice of protecting email communication from unauthorized activity.

Email Spam

Email spam is unwanted or unsolicited emails that end up in your email inbox.

Integrated Cloud Email Security (ICES)

ICES is a type of email security that supplements cloud-based email services, providing email protection against a wide range of threats.

Machine Learning

Machine learning is a branch of artificial intelligence that uses algorithms to teach computers to learn and program themselves in order to classify data or predict future outcomes.

Malware

Malware is malicious software that is designed to obtain valuable data or damage and destroy cyber systems.

Phishing

Phishing is when a threat actor poses as a legitimate email sender in an attempt to get victims to give them sensitive information.

Ransomware

Ransomware is a combination of the words "ransom" and "software." The word ransomware refers to the downloading of malware and the encryption of valuable documents by a cyber criminal who will hold those documents until a ransom is payed.

Secure Email Gateway (SEG)

A secure email gateway (SEG) or a secure email server (SEC) is a type of email security software that sits between inbound and outbound email communication.

Smishing

Smishing is the process by which a threat actor sends fraudulent SMS messages in order to get victims to give away sensitive information or download malicious files.

Social Engineering

Social engineering is an attack technique used by cyber-criminals to build trust with and trick their victims into fulfilling a request.

Spear Phishing

Spear phishing is a more targeted form of "Phishing". Both of which refer to a cyber security threat involving sending fraudulent emails to solicit information while posing as a legitimate sender.

Spoofing

Spoofing is the process by which someone sends a fraudulent message using a false identity in order to solicit sensitive information.

Gute Nachrichten für Ihr Unternehmen.
Schlechte Nachrichten für die Bösewichte.

Starten Sie Ihren kostenlosen Test

Starten Sie Ihren kostenlosen Test

Flexible Lieferung
Sie können es entweder virtuell oder mit Hardware installieren.
Schnelle Installation
Nur 1 Stunde für die Einrichtung - und noch weniger für eine Testversion der E-Mail-Sicherheit.
Wählen Sie Ihre Reise
Testen Sie selbstlernende KI dort, wo Sie sie am meisten brauchen - in der Cloud, im Netzwerk oder für E-Mail.
Keine Verpflichtung
Voller Zugriff auf den Darktrace Threat Visualizer und drei maßgeschneiderte Bedrohungsberichte, ohne Kaufverpflichtung.
For more information, please see our Privacy Notice.
Thanks, your request has been received
A member of our team will be in touch with you shortly.
YOU MAY FIND INTERESTING
Huch! Beim Absenden des Formulars ist etwas schief gelaufen.

Demo anfordern

Flexible Lieferung
Sie können es entweder virtuell oder mit Hardware installieren.
Schnelle Installation
Nur 1 Stunde für die Einrichtung - und noch weniger für eine Testversion der E-Mail-Sicherheit.
Wählen Sie Ihre Reise
Testen Sie selbstlernende KI dort, wo Sie sie am meisten brauchen - in der Cloud, im Netzwerk oder für E-Mail.
Keine Verpflichtung
Voller Zugriff auf den Darktrace Threat Visualizer und drei maßgeschneiderte Bedrohungsberichte, ohne Kaufverpflichtung.
Vielen Dank! Ihre Anfrage ist eingegangen!
Huch! Beim Absenden des Formulars ist etwas schief gelaufen.