Ransomware Glossary (A)

  • Ransomware Glossary (A)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book.

Acceptable Use Policy – A policy that defines how an organization’s devices and systems can and cannot be used by employees.

ACLs (Access Control Lists) – Network security rules that control which traffic is allowed or blocked between network segments or devices.

ACSC (Australian Cyber Security Centre) – Australia’s national cybersecurity agency providing 24/7 incident support via 1300 CYBER1.

Active Directory (AD) – Microsoft’s directory service that manages network resources, user authentication, and permissions in Windows environments.

AI (Artificial Intelligence) – Computer systems that can perform tasks requiring human-like intelligence, used in detection systems to identify patterns and anomalies.

Air Gap/Air-gapped – A security measure where systems or data are physically isolated from networks, with no direct connection to other systems or the internet.

Alert Fatigue – A condition where security personnel become desensitized to alerts due to excessive false positives, potentially causing them to ignore genuine threats.

ALPHV/BlackCat – A sophisticated ransomware variant known for polymorphic code and double extortion tactics.

Antivirus/Anti-malware – Software designed to detect, prevent, and remove malicious software from systems.

API (Application Programming Interface) – A set of protocols that allows different software applications to communicate with each other.

Application Whitelisting/Allowlisting – Security approach that only allows pre-approved applications to execute on a system, blocking all others.

Asset Inventory – A comprehensive catalog of all IT assets including hardware, software, and data within an organization.

ATA SECURE ERASE – A command that instructs a storage device’s firmware to cryptographically erase all data, including hidden areas like remapped sectors and over-provisioning space.

Attack Surface – The total number of points where an attacker could potentially gain unauthorized access to a system or network.

Availability Zone – Independent data centers within a cloud region, separated by miles but close enough for fast data transfer, protecting against individual data center failures.

AWS CloudTrail – Amazon’s audit logging service that records API calls and activities across AWS infrastructure.

Azure Activity Logs – Microsoft Azure’s logging service that tracks resource access, modifications, and security events.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.