Cyber Defense Glossary

At Vehere, we believe that understanding cybersecurity begins with understanding the language. This glossary is a resource for cyber analysts, IT professionals, and security leaders whether in national defense or enterprise security who need clarity on core terms shaping the future of cyberspace protection. As threats evolve, so must our vocabulary.

Explore key cyber defense concepts.
Start with any of the three foundational sections below.

Lawful interception solution for telecom operators, ISPs, and law enforcement agencies

The Pyramid of Pain explains why behavioral detection disrupts attackers more effectively than blocking static indicators like hashes or IPs. By focusing on tools, techniques, and tradecraft, organizations can reduce attacker dwell time, improve resilience, and build stronger, long-term cyber defenses. 

Target Monitoring is a selector-driven interception method focused on specific individuals, devices, or accounts under legal authorization. Used in lawful interception, criminal investigations, and national security operations, it enables precise, accountable intelligence collection. Unlike mass monitoring, it targets known suspects, ensuring focused surveillance with defined scope, oversight, and evidentiary integrity. 

Chain of custody ensures that digital evidence remains authentic, traceable, and legally defensible from capture to court or regulatory review. It governs how communication records, network traffic, and reconstructed sessions are collected, preserved, analyzed, and disclosed. Across crime investigations and cybersecurity operations, strong custody controls protect evidentiary integrity, compliance outcomes, and attribution credibility. 

Bulk interception enables authorized agencies to analyze large-scale communication data for threat detection, network mapping, and investigative reconstruction. It supports intelligence operations through correlation, context building, and lawful oversight, helping transform weak signals into actionable evidence across complex and cross-border environments.

Metadata analysis helps investigators and security teams understand digital activity by examining contextual information such as communication patterns, network behavior, and system records. By focusing on who interacted, when, where, and how often, it enables law enforcement and cybersecurity professionals to detect threats, reconstruct incidents, and uncover hidden connections, even in encrypted environments. It plays a critical role in modern digital investigations, threat hunting, and incident response.

IPDR Monitoring enables lawful collection and analysis of Internet Protocol Detail Records to support cybercrime investigations, national security, and digital forensics. By examining session-level metadata such as IP addresses, timestamps, and ports, agencies can reconstruct timelines, attribute activity, and identify communication patterns, even in encrypted environments.

A deepfake is AI-generated synthetic media that imitates real people’s voices, faces, or actions to appear authentic. Created using deep learning and large datasets, it can take the form of videos, audio clips, images, or text. While deepfakes have legitimate uses, they are often exploited for fraud, impersonation, and misinformation, making detection difficult and challenging traditional methods of verification. 

Criminal intelligence is a structured discipline that transforms communication records, network metadata, and investigative inputs into actionable insight. It explains how IPDR analysis, lawful monitoring, and metadata correlation support network mapping, evidence development, and informed decision-making across law enforcement and intelligence environments. 

Ransomware activity is typically preceded by network behavior such as unusual authentication, lateral movement, and command-and-control communication. Network Detection and Response (NDR) identifies these patterns across systems and time, enabling earlier detection and containment before encryption occurs.

International Gateway Monitoring (IGM) refers to the monitoring and analysis of cross-border telecommunications and internet traffic at a nation’s international network ingress and egress points for national security and intelligence purposes.

Multidomain Intelligence unifies cyber, telecom, physical, radio, and open-source data to reveal hidden links, strengthen threat detection, and provide a clearer, connected understanding of activities across digital and physical domains.

Mass Network Intelligence (MNI) is the large-scale collection and analysis of network data to deliver actionable insights. It enables governments, telecoms, and security agencies to detect threats, uncover patterns, and predict emerging risks across entire communication ecosystems. It uses AI, behavioral analytics, and metadata intelligence for national-scale visibility.

COMSEC, short for Communications Security, refers to the discipline of protecting information as it is transmitted across communication systems to prevent unauthorized interception, exploitation, manipulation, or disruption. It encompasses the coordinated use of technologies, procedures, and controls that ensure the confidentiality, integrity, authenticity, and availability of communications.

COMJAM (Communication Jamming) is a set of electromagnetic operations designed to monitor, analyze, and influence adversary communications in contested environments. Traditionally focused on signal denial, modern COMJAM prioritizes intelligence-driven interception, characterization, and analysis to enable informed decisions on exploiting or selectively disrupting communications.

A Man-in-the-Middle (MitM) attack is a cyberattack where an attacker intercepts and manipulates communication between two parties, compromising confidentiality and integrity. These attacks often target weak encryption or insecure networks and can lead to data theft and unauthorized access.

 

Geospatial Intelligence (GEOINT) is the systematic collection, analysis, and application of imagery and geospatial data to describe, assess, and visually depict physical features and human activities on Earth. It combines spatial information with analytical techniques to reveal patterns, trends, and relationships that support decision-making in complex environments. 

Financial Intelligence (FININT) is the analysis of financial and transactional data to detect and disrupt criminal, terrorist, and national security threats. It combines financial records, KYC/KYT data, blockchain and payment metadata, and network communications to support investigations, sanctions enforcement, and prosecutions while ensuring legal compliance and evidence integrity.

CEMA, or Cyber and Electromagnetic Activities, is a modern military and security concept that combines cyber operations, electronic warfare, and spectrum management to gain advantage in today’s information-driven environment. As technology becomes central to communication, navigation, and decision-making, CEMA plays a critical role in protecting systems and influencing adversaries.

Advertising Intelligence (ADINT) analyzes data from digital advertising ecosystems to derive behavioral, location, and identity-based intelligence insights.

Geofencing is a location-based technology that creates a virtual boundary around a real-world geographic area. This boundary allows systems, applications, or platforms to automatically detect when a device, vehicle, or individual enters, exits, or remains within a defined location. Once this condition is met, predefined actions or alerts are triggered in real time.

A National Monitoring Center is a centralized, secure facility used by governments to monitor communications and cyber activity across a country. Its purpose is to detect, analyse, and respond to threats, including cybercrime, terrorism, and attacks on critical infrastructure, using lawful and sanctioned monitoring tools.

 

The International Mobile Subscriber Identity (IMSI) is a globally unique number assigned to every mobile subscriber.

SS7 is a signaling protocol suite used by telecom networks to manage call setup, routing, and mobility functions.

Incident Response is a coordinated process to detect, analyze, contain, and recover from security incidents affecting systems.

Learn how in-line traffic management secures networks with real-time inspection, policy enforcement, and threat mitigation.

IP Network Monitoring is the continuous monitoring and analysis of IP network traffic to ensure availability, performance, and security.

Border Intelligence is the integrated collection and analysis of multi-domain data, emphasizing cyber intelligence (CYBINT) and signals intelligence (SIGINT). It monitors networks, endpoints, communications, and critical infrastructure for intrusions, malware, and coordinated cyber-physical threats. By fusing cyber indicators with physical and open-source data, it provides security forces with a unified operational picture to detect, assess, and respond proactively to hybrid threats.

Cyber Situational Awareness provides comprehensive visibility into network activities, enabling real-time detection of anomalies, prioritization of risks based on context, and strengthening resilience against evolving threats. By integrating advanced analytics and deep traffic inspection, it helps organizations and national infrastructures maintain operational integrity and informed decision-making in complex environments.

Digital Forensics is the legally compliant process of collecting, analyzing, and interpreting data from digital devices to uncover evidence. It helps investigators identify criminal activity, reconstruct events, attribute actions, and support legal, corporate, and national security investigations.

Predictive policing uses data and algorithms to forecast crime, identify high-risk areas, and highlight individuals or groups needing law enforcement attention.

IPDR Analysis is the examination of ISP-generated metadata logs that detail a user’s internet activity patterns.

Blockchain Intelligence is the analysis of blockchain data to uncover transaction patterns, user behavior, and hidden relationships.

CDR Analysis is the examination of telecom metadata to identify communication patterns, map associations, track movement, and build timelines.

MTTD measures how long an organization takes to detect a security incident, showing the speed and effectiveness of its threat visibility.

Open Source Intelligence is the collection, analysis, and interpretation of information available from legally obtainable sources.

Attack Timeline Reconstruction is the process of piecing together the sequence of events that occurred before, during, and after a cyberattack.

Timely, actionable insights from intercepted signals to support immediate operational decisions and threat response.

Understand Lawful Interception and its compliance role for Telcos and ISPs, key components, and passive vs active interception.

Learn what Mean Time to Respond (MTTR) means, why it matters, and how NDR helps reduce MTTR for faster incident response and stronger security posture.

Discover the types of detection and response including EDR, NDR, XDR, and MDR, and how they enhance visibility and strengthen cyber defense.

Learn what Detection Engineering is, why it matters, and how NDR enhances threat detection for modern cybersecurity teams.

Discover what Confirmation of Compromise means, its key steps, and how NDR ensures accurate breach validation and faster incident response.

Understand PCI DSS compliance, its main requirements, and how NDR improves security in cardholder data environments. 

EDR vs. NDR vs. XDR: Learn why NDR is the backbone of modern security, detecting lateral movement and threats endpoint tools miss.

Learn how active and passive interception differ in lawful intelligence and why passive interception offers stealth, scalability, and proactive monitoring.

Discover key differences between NDR and EDR, why both matter for cybersecurity, and how NDR delivers unmatched visibility to stop advanced threats. 

Learn how Command and Control channels work, why they matter, and how NDR and EBA help detect stealthy cyberattacks.

Learn how lateral movement enables stealthy attacks and how Machine Learning and Network Detection & Response (NDR) help detect and stop them in real time. 

Packet Capture (PCAP) is the process of intercepting and logging network traffic as it passes through a digital network. At its core, PCAP records the raw data packets, the smallest units of communication across networks, allowing administrators, analysts, and security tools to analyze them for performance monitoring, troubleshooting, and threat detection. 

Hybrid Network Monitoring is an approach that combines on-premises network monitoring and cloud-based monitoring into a single, integrated solution. This ensures that organizations can see every part of their network from internal traffic between servers (east–west) to traffic entering or leaving the network (north–south), without blind spots. 

Machine Learning (ML) is a powerful subset of Artificial Intelligence (AI) that enables systems to learn from data, identify patterns, and make intelligent decisions without being explicitly programmed.

Heuristic analysis is a cybersecurity detection method that focuses on uncovering malicious activity by evaluating programs, files, or network behaviors for suspicious characteristics or actions, rather than just matching them to a database of known malware signatures.

Signature-based detection is a foundational method in cybersecurity used to identify and mitigate malicious threats based on unique identifiers or “signatures.” These signatures are distinctive patterns, such as byte sequences, code fragments, command strings, or behavioral footprints that are characteristic of specific malware, attack methodologies, or vulnerabilities.  

Anomaly detection is the process of identifying data points, events, or patterns that deviate significantly from what is considered normal or expected behavior. These unusual observations are often referred to as anomalies.  

Behavioral analytics is the study of user and system activity patterns over time. It analyzes what users typically do, when they log in, what files they access, what commands they run and then watches for abnormal behavior that could indicate a threat. 

A Security Operations Center (SOC) is a centralized unit responsible for managing an organization’s information security. It combines people, processes, and technologies to protect digital assets through continuous monitoring, threat detection, and incident response.

Think of the SOC as the nerve center of your organization’s cybersecurity posture, a command center where skilled analysts oversee real-time threats and orchestrate swift defensive actions.

The MITRE Framework, more formally known as MITRE ATT&CK, is a globally accessible knowledge base of cyber adversary tactics, techniques, and procedures (TTPs) based on real-world observations. It was developed by the MITRE Corporation, a U.S.-based nonprofit that operates federally funded research and development centers (FFRDCs).

The framework helps cybersecurity professionals understand how attackers behave, enabling them to build better detection, defense, and response strategies.

Network packet capture is the process of recording data packets as they travel across a network. It is used to troubleshoot performance issues, monitor traffic, and detect security threats. 

Entity Behavior Analytics (EBA) is a next-generation cybersecurity approach that uses machine learning, statistical models, and advanced analytics to monitor and understand how non-human actor such as servers, cloud resources, IoT devices, applications, and service accounts normally behave.

Security Information and Event Management is a cybersecurity solution that helps organizations detect, investigate, and respond to security threats in real time. SIEM works by collecting and analyzing data (logs and events) from across an organization’s IT infrastructure like firewalls, servers, applications, and endpoints.

An Intrusion Prevention System (IPS) is a network security solution that detects and blocks known and unknown threats in real time. Unlike Intrusion Detection Systems (IDS), which only monitor and alert, IPS tools are proactive and automated, capable of disrupting malicious traffic as it traverses the network.

Network Detection and Response (NDR) is a cybersecurity solution that continuously monitors network traffic in real time to detect malicious activities.