Browser mode in which all session data and cache is discarded and tracking protection features are enabled by default.
Private/incognito browsing mode
Software that illegally copies or imitates a commercial product or brand.
bootleg app
Remote access tool and protocol. ___ is the basis of macOS screen-sharing.
VNC Virtual Network Computing
Information sheet accompanying hazardous products or substances that explains the proper procedures for handling and disposal.
material safety data sheet (MSDS)
KB
knowledge base
Where a threat actor exploits an unlocked and unattended desktop or mobile device to gain unauthorized access.
lunchtime attack
Android app package format used when sideloading software from a source other than a trusted store.
.APK
3-2-1 backup rule
Best practice maxim stating that at any given time there should be at least three copies of data stored on two media types, with one copy held off site.
Process through which changes to the configuration of information systems are implemented as part of the organization's overall configuration management efforts.
Change management
AUP
acceptable use policy
Malicious software program hidden within an innocuous-seeming piece of software. Usually, the Trojan is used to try to compromise the security of the target computer.
Trojans
Mobile device feature designed for testing apps during development that may weaken corporate security protections if misused.
developer mode
Procedures and guidelines covering appropriate priorities, actions, and responsibilities in the event of security incidents, divided into preparation, detection/analysis, containment, eradication/recovery, and post-incident stages.
incident response plan (IRP)
Documentation showing how network nodes are connected by cabling or how they are logically identified and connected, such as in IP networks.
network topology diagram
MSRA
Microsoft Remote Assistance
Installer package whose authenticity and integrity cannot be verified.
untrusted source
Removes the protective seal and any OS specific restrictions to give users greater control over the device.
Jailbreak
Extension for the PowerShell script format.
.PS1
Documentation of best practice and work instructions to use to perform a common administrative task.
standard operating procedure (SOP)
RMM
Remote monitoring and management
Browser feature or extension that prevents sites from creating new browser windows.
Pop-up blockers
Gaining superuser level access over an Android-based mobile device.
Root access
Scripting language used to add interactivity to web pages and HTML-format email.
JavaScript
Database software designed to implement a structured support process by identifying each case with a unique job ticket ID and with descriptive fields to record how the issue was resolved.
ticketing system
RAT
remote access Trojan