Cybersecurity Glossary

All | # A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
N
Netiquette
A play on the word etiquette, this is the proper and acceptable way to communicate on the internet. As in using all caps in an email is frowned upon because it suggests the writer is yelling.
Network Sniffing
Is a packet analyser that monitors all of the data that travels over a network. It only takes a snapshot of the traveling data; it does not alter it in any way. Network sniffing can be performed for both legitimate or illegitimate purposes. A network or system administrator can use a network sniffer to monitor traffic, or to troubleshoot bottlenecks or other network issues. Sniffers can be used to read the packet data which could include the source and destination addresses. This could contribute to nefarious use by a bad actor. Sniffers can be difficult to detect making them a security nightmare.
Neutrino
A sub atom ic particle that does not have an electrical charge, and are able to propagate, almost unaffected, over long distances through solid matter. Originally it was believed they had no mass. Now the belief is they have mass but it is extremely small, about a fraction of the mass of a proton. There are three flavors of neutrinos. One related to the electron, one to the particle muon, and a third flavour related to the particle tau.
Non-Repudiation
A system’s ability to prove that a specific user (and that user alone) sent a message, and that the message hasn’t been modified in any way.
Nuclear Exploit Kit
A highly effective exploit kit which appeared in 2010 and gave cyber criminals the opportunity to exploit a wide range of software vulnerabilities in applications such as Flash, Silverlight, PDF reader, Internet Explorer and more. Polymorphic in nature, Nuclear advanced over the years into a notorious tool used for launching Zero Day attacks, spreading ransomware or for data exfiltration operations. Nuclear was often used in highvolume compromises and gave attackers the possibility to customize their attacks to specific locations and computer configurations. This constantly evolving exploit kit features various obfuscation tactics in order to avoid being detected by traditional antivirus and antimalware solutions.