Cybersecurity Glossary
To implement effective cybersecurity solutions built for the digital world, it’s important to understand common industry concepts and definitions. This glossary provides you with cybersecurity terms to be aware of as you look to protect your organization against cyber threats.
Document object model (DOM) reconstruction is a form of remote browser isolation (RBI) that attempts to remove malicious content from webpage elements—such as HTML and CSS. Once removed, the solution reconstructs the webpage elements and delivers it to the user’s local endpoint. DOM reconstruction is an alternative to the pixel pushing and network vector rendering (NVR) methods of RBI. While solving issues of latency, DOM reconstruction presents security and usability risks.
Domain spoofing is a phishing attack where cybercriminals use a fake version of a legitimate email address to scam users. Unlike display name or close cousin spoofing, domain name spoofing replicates the legitimate email address exactly. This form of email spoofing is less common because of Sender Policy Framework (SPF) and Domain Keys Identified Mail (DKIM). Once SPF and DKIM are incorporated into DNS settings, they prevent unauthorized use of domain names for spoofing attacks.
Read more ›A drive-by download is a type of malicious software that is downloaded to a user's computer without their knowledge or consent. This type of download often occurs when a user visits an infected website or clicks on an infected advertisement. The malicious software can be used to steal data, hijack the user's computer, or gain control of their system. It can also be used to spread other types of malware, such as ransomware or spyware.