Find the Right Insurance Designation to Advance Your Career

Glossary

A

Account Takeover (ATO) — When attackers steal or guess login credentials and impersonate a user.

Adversary‑in‑the‑Middle (AiTM) — Intercepting and altering communication between two parties.

B

Backups — Copies of data stored separately for recovery after an incident.

BEC (Business Email Compromise) — Impersonating executives or vendors to redirect payments.

BitB (Browser‑in‑the‑Browser) — A fake login window that looks identical to a real one.

Brute Force Attack — Trying many password combinations until one works.

C

Clickjacking — Tricking a user into clicking something different from what they see.

Credential Stuffing — Using stolen passwords from one site to break into another.

CVE — A standardized ID number for known software vulnerabilities.

Cyber Kill Chain — A model describing the stages of a cyberattack.

D

Data Encryption — Scrambling data so only authorized parties can read it.

Deepfake (Voice/Video) — AI‑generated impersonations used to deceive or manipulate.

DNS Spoofing — Redirecting users to fake websites by tampering with DNS.

E

EDR (Endpoint Detection & Response) — Security software that monitors devices for malicious behavior.

Email Spoofing — Sending emails that appear to come from someone else.

Encryption — See Data Encryption.

F

Firewall — A digital gatekeeper that controls what traffic is allowed in or out.

Formjacking — Injecting malicious code into web forms to steal data.

I

Identity Provider (IdP) — A system that manages user authentication.

IOC (Indicator of Compromise) — A clue that an attack has happened.

L

Lateral Movement — Attackers moving from one system to another inside a network.

Least Privilege — Giving users only the access they need — nothing more.

M

Man‑in‑the‑Middle Attack — Intercepting communication between two parties.

MFA (Multi‑Factor Authentication) — A login that requires more than just a password.

MITRE ATT&CK — A global framework that catalogs attacker behavior.

N

Network Segmentation — Dividing a network into smaller zones to limit attacker movement.

P

PAM (Privileged Access Management) — Tools and processes that control high‑level accounts.

Password Spraying — Trying common passwords across many accounts.

Patching — Updating software to fix vulnerabilities.

Phishing — A deceptive message designed to trick someone into clicking or revealing information.

Phishing‑as‑a‑Service — Criminals selling ready‑made phishing kits.

R

Ransomware — Malware that encrypts data and demands payment.

S

Segmentation — See Network Segmentation.

SIEM — A system that collects logs and alerts on suspicious activity.

Smishing — Phishing via SMS text message.

Social Engineering — Manipulating people into doing something harmful.

SPF/DKIM/DMARC — Email authentication tools that prevent spoofing.

Supply Chain Attack — Compromising a vendor to reach their customers.

Synthetic Identity Fraud — Creating a fake identity using real and fabricated information.

T

Third‑Party Risk — Risk introduced by vendors with access to your systems.

TTPs — The repeatable methods attackers use.

Typosquatting — Registering look‑alike domains to trick users.

V

Vishing — Phishing via voice call.

Vulnerability — A flaw in software or configuration that attackers can exploit.

Z

Zero‑Day — A vulnerability exploited before a patch exists.

Zero Trust — A security model that assumes no user or device is trustworthy by default.

Thanks for Visiting Us!
Would you mind answering 3 quick questions so we can better serve insurance professionals?

How useful have you found Insurance Designation Lookup to be as a way to explore insurance designation options?

Would anything make it more helpful to you or a colleague?

Would you recommend it to a colleague?