Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Glossary and Terminology

TermDefinition
Active ThreatAn endpoint that has contacted an unused address and has tried to exchange data.
Admin (account)A Ridgeback account with administrative privileges for an organization.
AnnotationA label placed on a set of network events or other entities.
AutomationThe process of setting up systems or tools to perform repetitive tasks or workflows without manual intervention.
BackupA copy of data that is stored separately to ensure it can be restored in case of loss, corruption, or attack.
Black Hole (icon)An icon representing where an Rcore observed traffic going to an endpoint, but no traffic was observed coming back.
BreachAn incident where unauthorized access to data, systems, or networks has occurred, potentially compromising security.
BroadcastThe transmission of data packets to all devices in a network segment rather than a specific recipient.
CapacityThe number of network addressable devices on a network.
Complexity (network)A measure of the interconnectedness and intricacy of devices, protocols, and configurations in a network.
Complexity HistogramA graphical representation showing the distribution of network complexity across various devices or segments.
ContainerA lightweight, standalone software package that includes code and dependencies, isolated from the host system.
Data LeakageData unintentionally crossing between network segments.
Data Retention PolicyGuidelines governing the duration and method for storing and disposing of data within an organization.
DatabaseAn organized collection of structured data that can be accessed, managed, and updated.
DFIRDigital forensics and incident response.
Digital ForensicsThe process of collecting, preserving, analyzing, and presenting digital evidence from electronic devices.
Disaster RecoveryA set of strategies and procedures to restore critical systems and data after a disruptive event.
DNSThe Domain Name System, which translates human-readable domain names to IP addresses for network routing.
DockerAn open-source platform for developing, shipping, and running applications in containers.
EndpointAn address attached to a physical or virtual device used for communications.
Endpoint LoadThe average number of endpoints per device.
EnumerationThe process of gathering detailed information about network devices and resources, often as a precursor to attacks.
ExploitA piece of code or technique that takes advantage of a vulnerability to compromise a system or data.
Exposure (network)The extent to which a network’s devices, data, or resources are visible or accessible to potential threats.
Exposure HistogramA visual representation showing the frequency or level of exposure of devices or segments within a network.
Incident ResponseAn approach for responding to security incidents to minimize damage, recover operations, and prevent future incidents.
Insecure Hostname RequestA network request where a hostname is queried without encryption or authentication, potentially exposing data to threats.
IP AddressA unique identifier assigned to each device on a network, enabling it to communicate with other devices.
LLMNRLink-Local Multicast Name Resolution, an insecure protocol for name resolution in small, local networks.
Lateral MovementA technique used by attackers to move within a network to gain access to additional resources or data.
Layer 2The data link layer in the OSI model, responsible for node-to-node data transfer and MAC addressing.
Leaky Pipe (icon)An icon representing an insecure hostname request.
License KeyA code that grants permission to use Ridgeback in compliance with the terms of a license agreement.
License NameThe official name of the license under which Ridgeback is authorized for use.
LinkA connection between two endpoints.
Link LoadThe average number of links per endpoint.
MAC AddressA unique identifier assigned to network interfaces for communications at the data link layer (i.e., layer 2).
mDNSMulticast DNS, an insecure protocol allowing devices on the same local network to resolve hostnames to IP addresses.
MicrosegmentationDividing a network into smaller, isolated segments to limit the spread of threats and increase control.
Multi-Factor Authentication (MFA)An authentication method requiring multiple forms of verification to access a system or service.
MulticastA method of data transmission where packets are sent to multiple recipients on a network simultaneously.
NameserverA server that translates domain names into IP addresses for network routing.
Network Access Control (NAC)Policies and technologies used to regulate access to network resources based on device identity and security.
Network Address Translation (NAT)A method of mapping private IP addresses to a public IP address for devices to communicate outside a local network.
Network GraphA visual diagram showing the relationships and connections between endpoints and devices within a network.
Network HygieneRegularly maintaining and securing a network to prevent vulnerabilities, ensure compliance, and sustain optimal performance.
Network SegmentA defined portion of a network, often isolated to improve security and traffic management.
PacketA small unit of data transmitted over a network, containing both header information and payload data.
PhantomRidgeback's response to attempts to contact unused addresses.
PortA virtual point for network communication, allowing services and applications to receive specific traffic.
PowerShellA command-line shell and scripting language often used for task automation on Windows systems.
ProtocolA set of rules governing data exchange between devices on a network, ensuring compatible communication.
ProxMoxAn open-source platform for virtualization, supporting virtual machines, containers, and clusters.
RcoreRidgeback's component used to read and inject network traffic.
Recon ThreatAn endpoint that has contacted an unused address and has not tried to exchange data.
ReconnaissanceThe act of scanning or exploring a network or system to identify vulnerabilities and gather intelligence.
SQLStructured Query Language, a standard language for managing and querying relational databases.
ScriptA sequence of instructions or commands executed to automate tasks on a computer or network.
SegmentationDividing a network into smaller parts to improve security, performance, and control over traffic.
ServiceA network or system function that provides specific capabilities, such as file sharing, web hosting, or databases.
Service LoadThe average number of services per endpoint.
Shield (icon)The shield icon represents where and endpoint has tried to contact a phantom.
Superadmin (account)A Ridgeback account with administrative privileges for an entire Ridgeback installation.
System Security Plan (SSP)A documented framework outlining security requirements, controls, and practices for a system or network.
TCPTransmission Control Protocol, a reliable communication protocol ensuring ordered and error-checked data delivery.
ThreatWithin the context of Ridgeback, a threat represents any potential risk, vulnerability, or adversarial path that could compromise the integrity, confidentiality, or availability of network assets.
UserAn account or individual with access to a network or system, typically with restricted privileges.
VLANVirtual Local Area Network, a logical subdivision of a network that isolates devices as if on separate networks.