imphash
0001-01-01
Import Hash (ImpHash) is a hash over the imported functions in a PE file commonly used for malware identification purposes.
Read More
implant
0001-01-01
An implant in a cybersecurity context is a stealthy, persistent piece of malware that aims to maintain unauthorized access for an attacker.
Read More
Import Address Table
0001-01-01 pe
The Import Address Table is a data structure within a PE file that contains information about the addresses of functions imported from other PE files. ...
Read More
incident responder
0001-01-01
An incident responder is one who is engaged in incident response.
Read More
incident response
0001-01-01
Incident Response is a strategic approach to detecting and managing cyberattacks in a manner that prioritizes minimizing damage, decreases recovery ...
Read More
incident response plan
0001-01-01
An incident reponse plan is a formalized set of instructions providing guidance for an organization to detect, respond to, and recover from ...
Read More
Indicators of Compromise (IoC)
0001-01-01
An Indicator of Compromise (IoC) is a piece of digital forensics that suggests that a computer resource has been breached.
IoC monitoring is a ...
Read More
industrial espionage
0001-01-01
industrial espionage (corporate espionage) is the act of illegally gathering confidential information or intelligence from a competitor. This isoften ...
Read More
inferior position
0001-01-01
In BJJ, inferior positions refer to positions where the practitioner is being pinned or held in a disadvantageous manner, allowing their attacker more ...
Read More
infinite loop
0001-01-01
In computer programming, an infinite loop (endless loop) is a sequence of instructions that will continue repeatedly, forever or until the program is ...
Read More