Lateral Movement

The techniques that a cyberattacker uses after gaining initial access to move deeper into a network, mapping out its structure, searching for sensitive data and other high-value assets. By moving from the initial machine that was first breached, attackers are often able to prolong their access, even if the original attack site is discovered. Attackers will typically try to obtain additional credentials and elevate their access privileges as they go.

Related Terms

Access Tier

An Access Tier is an identity-aware proxy and gateway that mediates access into a private network segment within ...

Bastion Host

Bastion Host is a special-purpose internet-accessible server that accepts SSH connections for the purpose of ...

Host computer

The computer that is being accessed remotely. It is also referred to as the "server" or "remote machine."

Hybrid Cloud Security

Hybrid Cloud Security refers to a mixed computing, storage, and services environment made up of on-premises ...

Idle Timeout

A security feature that automatically disconnects a remote desktop session after a period of inactivity to protect ...

Information Security

The practice of protecting information and information systems from unauthorized access, use, disclosure, ...

Infrastructure as a Service (IaaS)

Infrastructure as a Service (IaaS) represents a pivotal model in the realm of cloud computing. This service, often ...

Man in the Middle (MitM) Attack

A type of cyber attack where the attacker secretly relays and possibly alters the communications between two ...

NIST SP 800-207 Zero Trust Architecture

The National Institute of Standards and Technology (NIST) architecture is a series of cybersecurity measures and ...

Platform as a Service (PaaS)

Platform as a service (PaaS) is a complete development and deployment environment in the cloud, with resources ...

Policy

A Policy is a set of authorization rules that specify which users can access a given service or application. ...

Privilege Access Management (PAM)

Privileged Access Management (PAM) is a cybersecurity strategy to control, monitor, audit and safeguard all ...