Speak the
same language.
A working reference of technical terms, threat actors, compliance frameworks, and LaunchPad vocabulary. If you are going to operate in the architecture, you need to understand the taxonomy.
Air-Gapped
NETWORKA security measure where a secure computer network is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network.
Attack Vector
THREAT INTELA path or means by which a hacker can gain access to a computer or network server in order to deliver a payload or malicious outcome.
CTI
THREAT INTELCyber Threat Intelligence. Evidence-based knowledge, including context, mechanisms, indicators, implications, and actionable advice, about an existing or emerging menace or hazard to assets.
Digital Sovereignty
PRIVACYThe principle that an individual, organization, or state has complete control over its own digital data and the infrastructure that processes it, free from external control or platform lock-in.
Encryption (E2EE)
PRIVACYEnd-to-End Encryption. A system of communication where only the communicating users can read the messages. In principle, it prevents potential eavesdroppers — including telecom providers, Internet providers, and even the provider of the communication service — from being able to access the cryptographic keys needed to decrypt the conversation.
GRC
COMPLIANCEGovernance, Risk, and Compliance. The integrated collection of capabilities that enable an organization to reliably achieve objectives, address uncertainty, and act with integrity.
Incident Response (IR)
SOCAn organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident, or security event.
Indicator of Compromise (IoC)
THREAT INTELAn artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion.
InnerCircle
LAUNCHPADA vetted, invite-only community operated by Progeta Technologies for people who are serious about what they are doing with their time and want to be held to the standard of seriousness and contribution.
Lateral Movement
NETWORKTechniques that adversaries use to enter and control systems on a network. Adversaries might install their own remote access tools or use legitimate credentials and native network tools to move from system to system.
LaunchPad
LAUNCHPADThe educational and operational training division of Progeta Technologies, providing tracks, modules, and certifications for specific cybersecurity roles.
Local-First
ARCHITECTUREA software architecture paradigm where the primary copy of the data is stored locally on the user's device, with synchronization to other devices or cloud servers occurring asynchronously.
MITRE ATT&CK
THREAT INTELA globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. It is used as a foundation for the development of specific threat models and methodologies.
OSINT
THREAT INTELOpen-Source Intelligence. Data collected from publicly available sources to be used in an intelligence context.
Playbook
SOCA detailed, step-by-step guide outlining how an incident response team or SOC analyst should handle a specific type of security incident.
Risk Appetite
COMPLIANCEThe amount and type of risk that an organization is willing to take in order to meet their strategic objectives.
SelfOS
PRODUCTA local-first personal operating system built by Progeta Technologies designed to manage tasks, knowledge, and goals without relying on centralized cloud storage.
SIEM
SOCSecurity Information and Event Management. A technology that provides real-time analysis of security alerts generated by applications and network hardware.
SOC
SOCSecurity Operations Center. A centralized unit that deals with security issues on an organizational and technical level.
Threat Actor
THREAT INTELA person or entity that is responsible for an event or incident that impacts, or has the potential to impact, the safety or security of another entity.
Triage
SOCThe process of analyzing an alarm or an incident to determine its severity, scope, and the necessary urgency of response.
Zero Trust
ARCHITECTUREA security concept centered on the belief that organizations should not automatically trust anything inside or outside their perimeters and must verify anything trying to connect to its systems.
Zero-Knowledge
PRIVACYA method by which one party can prove to another party that a given statement is true without conveying any additional information apart from the fact that the statement is indeed true (e.g., Zero-Knowledge Proof).
Looking for something else?
If you encountered a term in our modules or briefs that isn't defined here, let us know.
Suggest a Term →