C E I P S T W X
  • Jean-Christoph von Oertzen
  • Blog
  • Infosec glossary
  • Home
  • |
  • Tag: threat hunting

networking, vulnerabilities, threats, attacks and countermeasures

C2

C2: Command and Control (server|connection) Command and Control (C2) refers to the infrastructure and ...

Read More

lingo

COA

COA: Course Of Action A Course of Action (COA) is a strategy or plan ...

Read More

lingo

CTI

CTI: Cyber Threat Intelligence Cyber Threat Intelligence refers to the collection, analysis, and dissemination ...

Read More

lingo

CTL

CTL: Cyber Threat Landscape The Cyber Threat Landscape refers to the overall environment of ...

Read More

vulnerabilities, threats, attacks and countermeasures

CVE

CVE: Common Vulnerabilities and Exposures CVE, or Common Vulnerabilities and Exposures, is a standardized ...

Read More

vulnerabilities, threats, attacks and countermeasures

EASM

EASM: External Attack Surface Management "[…] is the process of continuously discovering, monitoring, evaluating, ...

Read More
Load More

Copyright 2025 Jean-Christoph von Oertzen - Privacy policy - Imprint