V
Variable: A container that stores data.
Virtual Machine (VM): A virtual version of a physical computer.
Virtual Private Network (VPN): A restricted-use, logical (i.e., artificial or simulated) computer network that is constructed from the system resources of a relatively public, physical (i.e., real) network (such as the Internet), often by using encryption (located at hosts or gateways), and often by tunneling links of the virtual network across the real network. For example, if a corporation has LANs at several different sites, each connected to the Internet by a firewall, the corporation could create a VPN by (a) using encrypted tunnels to connect from firewall to firewall across the Internet and (b) not allowing any other traffic through the firewalls. A VPN is generally less expensive to build and operate than a dedicated real network because the virtual network shares the cost of system resources with other users of the real network.
Virus: A hidden, self-replicating section of computer software, usually malicious logic, that propagates by infecting – i.e., inserting a copy of itself into and becoming part of – another program. A virus cannot run by itself; it requires that its host program be run to make the virus active. A malicious code was written to interfere with computer operations and cause
VirusTotal: Analyse suspicious files, domains, IPs, and URLs to detect malware and other breaches, and automatically share them with the security community.
Vishing (Voice or VoIP Phishing): A type of cyber attack that uses voice and telephony technologies to trick targeted individuals into revealing sensitive data to unauthorized entities. The data might include personal information, such as a Social Security Number (SSN) or details about a financial account, or it might be related to a business setting.
Visual Dashboard: A way of displaying various types of data quickly in one place.
Voice Firewall: A physical discontinuity in a voice network that monitors, alerts, and controls inbound and outbound voice network activity based on user-defined call admission control (CAC) policies, voice application layer security threats, or unauthorized service use violations.
Voice Intrusion Prevention System (IPS): Voice IPS is a security management system for voice networks that monitors voice traffic for multiple calling patterns or attack/abuse signatures to proactively detect and prevent toll fraud, Denial of Service, telecom attacks, service abuse, and other anomalous activity.
Vulnerability Assessment: A vulnerability assessment is a systematic review of security weaknesses in an information system. It evaluates if the system is susceptible to any known vulnerabilities, assigns severity levels to those vulnerabilities, and recommends remediation or mitigation, if and whenever needed.
Vulnerability Management: Vulnerability management is the ongoing practice that helps organizations identify, assess, prioritize, and fix vulnerabilities in their system. Ultimately, the goal of vulnerability management is to reduce the risks posed by vulnerabilities by using techniques such as patching, hardening, and configuration management.
Vulnerability Scanner: Vulnerability scanning or vulnerability assessment is a systematic process of finding security loopholes in any system and addressing potential vulnerabilities. The purpose of vulnerability assessments is to prevent the possibility of unauthorized access to systems.
Vulnerability: A vulnerability is a weakness, flaw, or other shortcoming in a system (infrastructure, database, or software), but it can also exist in a process, a set of controls, or simply just the way that something has been implemented or deployed.
« Back to Glossary Index