Encyclopedia of Cybersecurity

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Lateral Movement

Lateral movement refers to the tactic used by cyber attackers to progressively move through a network environment, gaining access to different systems, resources, or assets after initially compromising a single entry point. Once attackers have breached the perimeter or gained initial access to a network, they use lateral movement techniques to explore the network, escalate […]

Lateral Movement Read More »

LDAP Injection

LDAP injection is a type of security vulnerability that occurs when untrusted data is inserted into an LDAP (Lightweight Directory Access Protocol) query in a way that alters the logic of the query, allowing an attacker to manipulate the query’s behavior or access unauthorized information from the LDAP directory. LDAP is a protocol used to

LDAP Injection Read More »

Least Privilege

Least privilege is a security principle and access control strategy that aims to restrict user permissions or privileges to the minimum level necessary to perform authorized tasks or functions. The principle of least privilege is based on the concept that users, processes, or systems should only have access to the resources, data, or capabilities that

Least Privilege Read More »

Load Balancer Security

Load balancer security refers to the measures and best practices implemented to protect load balancers from various security threats and vulnerabilities. Load balancers are critical components of network infrastructure that distribute incoming network traffic across multiple servers or resources to ensure high availability, scalability, and reliability of web applications and services. Securing load balancers is

Load Balancer Security Read More »

Log File Integrity Monitoring

Log File Integrity Monitoring (LFIM) is a security practice that involves continuously monitoring and analyzing log files generated by various systems, applications, and devices to detect unauthorized changes, tampering, or anomalies that may indicate security incidents or compliance violations. LFIM helps organizations maintain the integrity of their log data, ensure its accuracy and completeness, and

Log File Integrity Monitoring Read More »

Log Management

Log management refers to the process of collecting, storing, analyzing, and managing log data generated by various systems, applications, and devices within an IT environment. Logs are records of events, activities, and actions that occur within an organization’s IT infrastructure, including servers, network devices, security appliances, databases, applications, and endpoints. Key aspects of log management

Log Management Read More »

Logic Attack

A “logic attack” is a term that is not widely used in cybersecurity or computer science, but it may refer to a type of cyber attack that exploits flaws or vulnerabilities in the logical flow of a system, application, or protocol. This type of attack aims to manipulate the normal operation of a system by

Logic Attack Read More »

Logic Bomb

A logic bomb is a type of malicious code or software program that is intentionally inserted into a computer system or network to execute a harmful action when specific conditions are met. Unlike traditional malware, which may spread indiscriminately or operate continuously, a logic bomb remains dormant until triggered by predefined criteria, such as a

Logic Bomb Read More »

Scroll to Top