A
Access Control
Security controls that define who can access systems, data, and actions.
A simple reference for cybersecurity and darknet terms used across DarkScout workflows.
Quick reference terms used throughout the platform.
A
Security controls that define who can access systems, data, and actions.
A
The total set of external and internal points an attacker could target.
B
Unauthorized access to data, services, or systems.
B
A set of compromised devices remotely controlled by an attacker.
D
Encrypted networks that require special software and are commonly used for anonymous activity.
D
Policies and technologies designed to prevent sensitive data leakage.
P
Deceptive messages intended to steal credentials, payments, or sensitive information.
R
Malware that encrypts files or systems and demands payment to restore access.
Z
A vulnerability that is exploited before an official fix is available.
Z
Security model that requires verification for every access request, regardless of network location.