Canopius - Cyber Insurance Glossary

What is WAN?

A Wide Area Network (WAN) is a telecommunications network that connects multiple smaller networks over long distances. WANs are used to link computers, devices, or networks from different locations. This enables them to communicate as if they were in…

Read more

What is a Keylogger?

A keylogger is a type of malicious software (malware) designed to record the keystrokes made on a computer or device. When it’s installed, it operates silently in the background, capturing everything a user types. This can include sensitive information…

Read more

What is Spyware?

Spyware is a type of malicious software that infiltrates a device to monitor and collect information about the user without their knowledge. It can secretly track activities such as your browsing habits, personal information, and even login credentials. This…

Read more

What Is Unified Threat Management?

Unified Threat Management is a security solution that has multiple security features into a single device or platform. It is designed to protect networks from various cyber threats, including viruses, malware, and unauthorised access. UTM solutions help simplify network…

Read more

What Is Single Sign-on?

Single Sign-On (SSO) is an authentication method that gives users access to multiple applications or systems with just one set of login credentials. Instead of needing to remember separate usernames and passwords for each service, users log in once…

Read more

What Is A Port Scan?

A port scan is a technique that is used to identify open or vulnerable ports on a network or device. An attacker or security professional can gather information about the services running on a system and determine any potential…

Read more

What is DMZ?

A DMZ, or Demilitarised Zone, in computer networking, refers to a subnetwork that sits between an internal network and an external network, such as the internet. The DMZ acts as a buffer zone, where services exposed to the public…

Read more

What is ARP?

ARP, otherwise known as Address Resolution Protocol, is a network protocol that maps an IP address to a physical MAC (Media Access Control) address within a local area network (LAN). This process allows devices on a network to communicate…

Read more

What is Trojan Horse Malware?

Trojan Horse malware is a malware type that gives the illusion of a legitimate or useful software. It tricks users into downloading or installing it by masquerading as a harmless file or program,  such as fake antivirus software or…

Read more

What is Hacking?

Hacking is when an individual manipulates computer systems or networks to gain unauthorised access. They do this by exploiting security weaknesses to infiltrate systems for malicious purposes; for example, if they want to steal sensitive data. However, it can…

Read more