Search Concepts

Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages

Clickjacking

Clickjacking is a malicious technique that tricks a user into clicking on a malicious link, potentially revealing confidential information or giving up control of their computer to a third-party. The attacker can manipulate the user's computer by taking advantage of vulnerabilities present in applications and web pages. Let's take a simple example to see how clickjacking works. On a clickjacked page, the attackers load another page over it in a transparent layer. So, when an unsuspecting user clicks the visible buttons on these pages, they are actually operating on the invisible layer underneath. Netenrich’s Enterprise Security can help keep track of the IPs that your team has recently dealt with. If they have interacted with a suspicious IP, Netenrich immediately flags them and sends an alert to your SOC.     

Cloud operations

The process of managing the delivery and optimization of cloud infrastructure and services is cloud operations or CloudOps. The important components of cloud operations include maintaining availability, performance and cost optimization, adhering to compliance, and meeting SLAs.

Command & Control

A command-and-control [C&C] server is by an attacker to remotely send commands to systems compromised by malware. In exchange, they can receive stolen data from the victim right on the C&C servers. C&Cs tend to hide in plain sight by blending in with normal traffic to avoid any detection. Some malware can remain undetected for ages, stealing your data, and damaging your systems. It can communicate with its Command & Control center (C&C) to conduct new attacks after seeping into your organizational ecosystem.       

Common Vulnerabilities and Exposures

Common Vulnerabilities and Exposures (CVE) is an online database of attacks, exploits, and compromises maintained by the MITRE organization. This system was officially launched for the public in September 1999. CVEs are assigned by a CVE Numbering Authority (CNA). CVE numbers can be assigned by: 

  • The MITRE corporation functions as Editor and Primary CNA.
  • The vendors assign CVE numbers to their own products.
  • Third-party coordinators such as the CERT Coordination Center. 
       

Configuration change management

With growing network complexity, multiple configuration changes take place daily. Network admin can carry out the changes manually. But there is a high possibility that manual changes might lead to errors, resulting in faulty configurations. Consequently, it is easily prone to vulnerabilities which might even cause a network downtime. Also, in a hybrid network environment consisting of thousands of devices and many network admins, it is hard to keep track of who makes the change. Netenrich helps automate and control the entire life cycle of configuration change management. We offer solutions for multi-vendor network change, configuration, as well as compliance management for routers, switches, firewalls, and network devices. You can also schedule device configuration backups. Netenrich makes it easy to track user activity and spot changes by comparing configuration versions. By automating repetitive, mundane configuration management tasks, our solutions centrally apply configuration changes to bulk devices.

Credential stuffing

Credential stuffing is a special form of brute force attack that works on a very simple assumption. Usually, users tend to keep one password across all their social media and email accounts. In this case, the attackers need only crack one primary account to gain access to everything else. As you can guess, this has serious identity theft repercussions.         

Cryptojacking

Cryptojacking is the unauthorized use of a user’s device to mine cryptocurrencies. Instead of spending capital on mining equipment, these attackers use their victim’s computational resources for free to mine cryptocurrencies. In Q4 2017, there was a sudden spike in the number of cryptojacking attacks. As per McAfee, the amount of cryptojacking incidents jumped from 500,000 in Q4 2017 to nearly 4 million by Q3 2018. Netenrich's built-in SIEM and proprietary threat intelligence warn our clients of any possible cryptojacking attacks. Our threat intel will scour the internet and collect all the IP addresses engaged in cryptojacking attacks. Simultaneously, we will set specific rules within our SIEM, which will generate an alert that if any of our client’s assets are interacting with those flagged IP addresses. and provide remediation recommendations.         

Data breach

A data breach is an intentional or unintentional release of internal data made available to external entities without authorization. Data breaches can also be termed as unintentional information disclosure, data leak, information leakage, and also data spill. Data breaches can be very costly to your organization both financially and reputation-wise.         

Data contextualization

Data contextualization means adding related information to any data to make it more actionable. Trends, patterns, and correlations stand out against a background of context. When you start integrating data into various sets that provide context for IT events, you get a lot more value from the data. Contextualization is crucial to delivering and maintaining quality services. But, the seamless implementation of incident management process cannot be formulated overnight. You need to discover incidents that affect system performance, availability, and productivity with full-context alerts across your IT operations monitoring systems. Machine-driven operations can automatically pinpoint incident root-cause to fix an outage and minimize downstream impact before it affects service delivery. Automated context can also predict and evaluate service impact by experimenting with what-if models. It will reduce firefighting and restore services faster.

Data insights

Data becomes valuable when you translate it into actionable insights. Achieving these insights starts with figuring out what you want from your data, finding its value. You need to understand the context, need, vision, and outcome of your data, and create a strategy for turning data into meaningful stories and business successes.

Data lake

A data lake is a unified repository that stores big data from multiple sources in its raw format. It can include structured, semi-structured, unstructured, and binary data. This allows data to be stored in a flexible format for later use and helps data scientists analyze it faster and more accurately.

Data warehouse

A data warehouse is an integral component of business intelligence where structured data is collated from one or more sources for analysis and reporting. It’s usually leveraged to correlate business data and deliver insights into organizational performance.

DevOps

DevOps refers to the culture of combining “development” and “operations” for rapid IT service delivery. It requires the adoption of agile principles, collaboration between teams, and utilizing automation to shorten the software development life cycle by enabling fast feedback loops for deployment of new features or fixes.

Dictionary attacks

Dictionary attacks are the most common among brute force attacks. The idea behind this is pretty simple: use a list of words in the dictionary to crack passwords. Attempts typically begin with assumptions about common passwords (like “password,” “12345,” etc.) and to guess the correct one from the list in the dictionary.           

Digital experience monitoring

Digital experience monitoring is a performance analysis practice that helps in optimizing the user experience with applications and services delivered by an organization. The digital experience of customers and employees is a critical business outcome and it’s important to monitor its impact, instead of just application or infrastructure performance.

Digital footprint

The organization's digital footprint encompasses all the traceable digital activities, actions, contributions, or communications across the internet or on devices. With the increased incorporation of cloud infra and services, it's becoming increasingly difficult to track the organization's footprint.  An organization's cybersecurity strategy can be considered robust only if it monitors all the unique digital footprints across all business lines and subsidiaries. In today’s world, your organization’s digital footprint, and attack surface, may soon get out of control of your SecOps team. Netenrich’s always-on Attack Surface Intelligence continually keeps track of your attack surface.           

Digitalization

Digitalization refers to the Digital Transformation of businesses and subsequently their IT organizations. It mandates the use of digital technologies to transform the business model and provide innovative revenue and value-generating opportunities while moving to a future-ready paradigm.

Distributed architecture

A distributed architecture supports distributed systems by connecting components to achieve a common goal. These may include physical servers, computers, network devices, containers, and virtual machines working as a single unit.

Dynamic capacity orchestration

Dynamic capacity orchestration refers to facilitating rapid deployment and automation across hybrid physical and virtual networks. Companies leverage dynamic capacity orchestration to achieve faster time to market and better service delivery.

Dynamic operations

Dynamic operations are an integral component of modern hybrid environments that are fluid and temporal, allowing applications to be available continuously through virtualization. Dynamic ops facilitate automated provisioning, intelligent prioritization and scheduling, and integrations for holistic infrastructure management.