Cybersecurity glossary

An information protection tool that runs a file in an isolated virtual environment, analyzes the actions performed by the file, and issues a verdict of whether the file is safe or not.

An action in which the attacker obtains data or privileges needed to proceed further with the attack.