PROGETA
Technologies
000
REFERENCE · RESOURCES

Speak the
same language.

A working reference of technical terms, threat actors, compliance frameworks, and LaunchPad vocabulary. If you are going to operate in the architecture, you need to understand the taxonomy.

Showing 23 terms

Air-Gapped

NETWORK

A security measure where a secure computer network is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network.

Attack Vector

THREAT INTEL

A path or means by which a hacker can gain access to a computer or network server in order to deliver a payload or malicious outcome.

CTI

THREAT INTEL

Cyber Threat Intelligence. Evidence-based knowledge, including context, mechanisms, indicators, implications, and actionable advice, about an existing or emerging menace or hazard to assets.

Digital Sovereignty

PRIVACY

The principle that an individual, organization, or state has complete control over its own digital data and the infrastructure that processes it, free from external control or platform lock-in.

Encryption (E2EE)

PRIVACY

End-to-End Encryption. A system of communication where only the communicating users can read the messages. In principle, it prevents potential eavesdroppers — including telecom providers, Internet providers, and even the provider of the communication service — from being able to access the cryptographic keys needed to decrypt the conversation.

GRC

COMPLIANCE

Governance, Risk, and Compliance. The integrated collection of capabilities that enable an organization to reliably achieve objectives, address uncertainty, and act with integrity.

Incident Response (IR)

SOC

An organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident, or security event.

Indicator of Compromise (IoC)

THREAT INTEL

An artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion.

InnerCircle

LAUNCHPAD

A vetted, invite-only community operated by Progeta Technologies for people who are serious about what they are doing with their time and want to be held to the standard of seriousness and contribution.

Lateral Movement

NETWORK

Techniques that adversaries use to enter and control systems on a network. Adversaries might install their own remote access tools or use legitimate credentials and native network tools to move from system to system.

LaunchPad

LAUNCHPAD

The educational and operational training division of Progeta Technologies, providing tracks, modules, and certifications for specific cybersecurity roles.

Local-First

ARCHITECTURE

A software architecture paradigm where the primary copy of the data is stored locally on the user's device, with synchronization to other devices or cloud servers occurring asynchronously.

MITRE ATT&CK

THREAT INTEL

A globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. It is used as a foundation for the development of specific threat models and methodologies.

OSINT

THREAT INTEL

Open-Source Intelligence. Data collected from publicly available sources to be used in an intelligence context.

Playbook

SOC

A detailed, step-by-step guide outlining how an incident response team or SOC analyst should handle a specific type of security incident.

Risk Appetite

COMPLIANCE

The amount and type of risk that an organization is willing to take in order to meet their strategic objectives.

SelfOS

PRODUCT

A local-first personal operating system built by Progeta Technologies designed to manage tasks, knowledge, and goals without relying on centralized cloud storage.

SIEM

SOC

Security Information and Event Management. A technology that provides real-time analysis of security alerts generated by applications and network hardware.

SOC

SOC

Security Operations Center. A centralized unit that deals with security issues on an organizational and technical level.

Threat Actor

THREAT INTEL

A person or entity that is responsible for an event or incident that impacts, or has the potential to impact, the safety or security of another entity.

Triage

SOC

The process of analyzing an alarm or an incident to determine its severity, scope, and the necessary urgency of response.

Zero Trust

ARCHITECTURE

A security concept centered on the belief that organizations should not automatically trust anything inside or outside their perimeters and must verify anything trying to connect to its systems.

Zero-Knowledge

PRIVACY

A method by which one party can prove to another party that a given statement is true without conveying any additional information apart from the fact that the statement is indeed true (e.g., Zero-Knowledge Proof).

Looking for something else?

If you encountered a term in our modules or briefs that isn't defined here, let us know.

Suggest a Term →