Email Security & Cybersecurity Glossary

  • A
  • Adware

    Adware is software that delivers unwanted advertisements, often bundled with spyware to track user behavior.

    Know more
  • APT

    An Advanced Persistent Threat (APT) is a prolonged cyberattack in which attackers infiltrate a network and remain undetected while stealing

    Know more
  • ARP Spoofing

    ARP spoofing is a local network attack where attackers send forged ARP messages to associate their MAC address with another

    Know more
  • B
  • Baiting

    Baiting is a social engineering tactic where attackers lure victims with enticing offers or infected media devices.

    Know more
  • BIMI

    Brand Indicators for Message Identification (BIMI) is a standard that allows organizations to display their official logo in email inboxes

    Know more
  • Botnet

    A botnet is a network of compromised devices remotely controlled by attackers to launch large-scale cyberattacks.

    Know more
  • Browser Isolation

    Browser isolation runs web content in a secure, isolated environment to protect systems from malicious code on websites.

    Know more
  • Brute Force Attack

    A brute force attack systematically attempts all possible passwords until the correct one is found.

    Know more
  • Business Email Compromise

    Business Email Compromise (BEC) is a scam where attackers impersonate executives, employees, or vendors using spoofed or hacked accounts to

    Know more
  • C
  • Container Security

    Container security involves protecting applications in containers by managing vulnerabilities, runtime, and permissions.

    Know more
  • D
  • DANE

    DNS-based Authentication of Named Entities (DANE) is a protocol that uses DNSSEC to bind TLS certificates to domain names, providing

    Know more
  • Data Exfiltration

    Data exfiltration is the unauthorized transfer of sensitive information from a computer or network to an external destination controlled by

    Know more
  • DDoS

    A Distributed Denial-of-Service (DDoS) attack floods a target with traffic to overwhelm systems and disrupt service availability.

    Know more
  • DKIM

    DomainKeys Identified Mail (DKIM) uses cryptographic signatures to allow the receiving mail server to verify that an email was sent

    Know more
  • DMARC

    Domain-based Message Authentication, Reporting, and Conformance (DMARC) is an email authentication protocol that protects against email spoofing and phishing by

    Know more
  • DMARC Alignment

    A condition required for DMARC compliance where the domain in the visible “From” header aligns with the domains authenticated by

    Know more
  • DMARC Analyzer

    A DMARC analysis tool that helps organizations monitor, visualize, and interpret DMARC reports to understand authentication results and adjust policies.

    Know more
  • DMARC Compliance

    When an email passes authentication and alignment checks as defined by SPF, DKIM, and DMARC policies, making it a trusted

    Know more
  • DMARC Policy

    The policy defined in the DMARC record that instructs receiving servers whether to monitor, quarantine, or reject emails that fail

    Know more
  • DMARC Record

    A DMARC record is a DNS TXT entry that specifies the domain’s DMARC policy. It tells receiving mail servers how

    Know more
  • DMARC Reporting

    The reporting mechanism of DMARC that provides aggregate (RUA) and forensic (RUF) reports to help organizations track authentication results and

    Know more
  • DMARC Tags

    Tags are the parameters inside a DMARC record (such as v, p, rua, ruf, pct) that define the domain’s authentication

    Know more
  • DNS

    The Domain Name System (DNS) is the hierarchical system that translates human-readable domain names into IP addresses that computers use

    Know more
  • DNS MX Record

    A Mail Exchange (MX) record is a type of DNS record that specifies the mail servers responsible for receiving and

    Know more
  • DNS Record

    A DNS record is a piece of data in the DNS that provides information about a domain, such as its

    Know more
  • DNS Spoofing

    DNS spoofing, also known as cache poisoning, is an attack that inserts false DNS data into a resolver’s cache, redirecting

    Know more
  • DNSSEC

    Domain Name System Security Extensions (DNSSEC) adds cryptographic signatures to DNS data to ensure authenticity and integrity, preventing tampering such

    Know more
  • E
  • Email Authentication

    Email authentication refers to a set of techniques, including SPF, DKIM, and DMARC, used to verify that emails originate from

    Know more
  • Email Spoofing

    Email spoofing is a technique where attackers forge the sender address on emails to make them appear as though they

    Know more
  • H
  • Honey Trap

    A honey trap scam uses fake personas, often romantic, to build trust and manipulate victims into revealing data.

    Know more
  • I
  • IAM

    Identity and Access Management (IAM) encompasses policies and tools that manage user identities and control access to organizational resources.

    Know more
  • Insider Threat

    An insider threat is a risk posed by employees or contractors misusing their access, either maliciously or accidentally.

    Know more
  • IP Spoofing

    IP spoofing is the falsification of IP packet headers to impersonate another system, often used in denial-of-service attacks or to

    Know more
  • IPS

    An Intrusion Prevention System (IPS) is a network security tool that monitors traffic in real time to detect and block

    Know more
  • K
  • Keylogger

    A keylogger is software or hardware that records keystrokes to capture sensitive information such as passwords.

    Know more
  • M
  • MaaS

    Malware-as-a-Service (MaaS) is a business model where malware developers rent or sell their tools to other attackers.

    Know more
  • Malware

    Malware is any software intentionally designed to disrupt, damage, or gain unauthorized access to computer systems.

    Know more
  • MITM Attack

    A Man-in-the-Middle (MITM) attack occurs when an attacker secretly intercepts and alters communication between two parties without their knowledge.

    Know more
  • MTA-STS

    Mail Transfer Agent–Strict Transport Security (MTA-STS) is a protocol that enforces secure TLS encryption for SMTP connections between mail servers,

    Know more
  • P
  • p=none

    A DMARC policy mode where emails failing authentication are monitored but still delivered to the recipient’s inbox. Used mainly for

    Know more
  • p=quarantine

    A DMARC policy mode where unauthenticated emails are flagged as suspicious and typically sent to the spam/junk folder.

    Know more
  • p=reject

    A DMARC policy mode where emails failing authentication are outright rejected and not delivered to recipients.

    Know more
  • PAM

    Privileged Access Management (PAM) is the control and monitoring of accounts with elevated privileges to reduce risks of misuse or

    Know more
  • PCT Tag

    The percentage tag that defines what proportion of email messages should be subjected to the DMARC policy (useful for gradual

    Know more
  • Penetration Testing

    Penetration testing is an authorized simulated cyberattack to identify and fix vulnerabilities before attackers exploit them.

    Know more
  • Phishing

    Phishing is a cyberattack method where attackers impersonate trusted entities through fraudulent emails or websites to trick users into revealing

    Know more
  • Phishing-as-a-Service

    Phishing-as-a-Service (PhaaS) is an illegal model where criminals provide ready-made phishing kits and infrastructure to others, enabling large-scale phishing campaigns

    Know more
  • Piggybacking

    Piggybacking is a physical or digital security breach where an unauthorized person gains access by exploiting someone else’s legitimate credentials

    Know more
  • Pretexting

    Pretexting is a social engineering technique where attackers create a fabricated scenario to manipulate victims into divulging confidential information.

    Know more
  • R
  • RaaS

    Ransomware-as-a-Service (RaaS) is a criminal model where ransomware developers lease their tools to attackers for profit.

    Know more
  • Ransomware

    Ransomware is malware that encrypts a victim’s files and demands payment in exchange for decryption.

    Know more
  • Rootkit

    A rootkit is a type of malware that hides its presence and grants attackers unauthorized administrative control of a system.

    Know more
  • RUA Tag

    The “Aggregate Reports” tag that specifies the email address where DMARC XML aggregate reports should be sent.

    Know more
  • RUF Tag

    The “Forensic Reports” tag that specifies the email address where detailed failure reports are sent when individual messages fail DMARC.

    Know more
  • S
  • Scareware

    Scareware is malware that uses deceptive warnings to frighten users into installing malicious software or paying for fake services.

    Know more
  • Security Service Edge (SSE)

    Security Service Edge (SSE) is a cloud-based cybersecurity framework that delivers secure access to applications, data, and services, no matter

    Know more
  • Shadow IT

    Shadow IT refers to the use of unauthorized systems or applications within an organization, often creating security and compliance risks.

    Know more
  • Shadow IT

    Shadow IT refers to the use of unauthorized systems or applications within an organization, often creating security and compliance risks.

    Know more
  • Shoulder Surfing

    Shoulder surfing is the act of stealing confidential information by watching a person enter data in public.

    Know more
  • Smishing

    Smishing is phishing conducted via SMS messages, tricking recipients into revealing sensitive data or clicking malicious links.

    Know more
  • SMTP

    Simple Mail Transfer Protocol (SMTP) is the standard protocol used to send and relay emails across the Internet.

    Know more
  • Social Engineering

    Social engineering manipulates human behavior to bypass security systems, often using deception to trick people into sharing information.

    Know more
  • Spam

    Spam refers to unsolicited bulk emails, often commercial or malicious, that clutter inboxes and can contain threats.

    Know more
  • Spear Phishing

    Spear phishing is a highly targeted form of phishing where attackers personalize messages to a specific individual or organization to

    Know more
  • SPF

    Sender Policy Framework (SPF) is an email validation system that identifies which mail servers are authorized to send email for

    Know more
  • Spyware

    Spyware is malicious software that secretly monitors user activity and collects information without consent.

    Know more
  • T
  • Tailgating Attack

    A tailgating attack is a physical security breach where an unauthorized person gains entry to a restricted area by closely

    Know more
  • TLS

    Transport Layer Security (TLS) is a cryptographic protocol that encrypts data exchanged over a network, ensuring privacy and integrity for

    Know more
  • TLS-RPT

    SMTP TLS Reporting (TLS-RPT) is a feedback mechanism that provides domain owners with reports about email delivery issues related to

    Know more
  • Trojan

    A Trojan horse is malware disguised as legitimate software that tricks users into installing it, providing attackers access to the

    Know more
  • Two-Factor Authentication (2FA)

    Two-Factor Authentication (2FA) is a security process that requires users to provide two different types of credentials to verify their

    Know more
  • Typosquatting

    Typosquatting is the practice of registering misspelled domains to trick users into visiting malicious websites.

    Know more
  • V
  • V Tag

    The version tag in a DMARC record, which must always be set to DMARC1 to indicate the protocol version.

    Know more
  • Virus

    A computer virus is a type of malware that attaches itself to programs or files and spreads when they are

    Know more
  • Vishing

    Vishing is phishing over voice calls, where attackers impersonate trusted entities to extract information.

    Know more
  • VPN

    A Virtual Private Network (VPN) creates an encrypted tunnel between a device and a server to protect data in transit

    Know more
  • W
  • Watering Hole Attack

    A watering hole attack compromises websites likely to be visited by a target group, infecting them with malware.

    Know more
  • Whaling

    Whaling is a type of phishing that specifically targets high-ranking executives or individuals with privileged access by impersonating trusted colleagues

    Know more
  • Z
  • Zero Trust

    Zero Trust is a security model that assumes no user or system is inherently trustworthy and requires continuous verification for

    Know more
  • Zero-Day Vulnerability

    A zero-day vulnerability is an unknown software flaw that attackers exploit before the vendor has issued a patch, leaving systems

    Know more