Scirge Glossary Index

The industry is filled with jargon and acronyms; Shadow IT and cloud access security are no exception. This is where you can find definitions, explanations, and learn more.
Account Takeover

What Is Account Takeover? Account takeover happens when a fraudster gains unauthorized access or control over a legitimate customer’s account. Account takeover (account compromise) attacks mainly target SaaS web applications.

Learn more about
Account Takeover
Brute Force

What Is Brute Force? Brute Force is a type of cryptographic attack which involves exhaustive search. Brute force employs techniques in which a password is guessed based on possible combinations of the required password until the correct password is discovered.

Learn more about
Brute Force
Combo List

What Is Combo List? A combo list is a text file that contains a list of leaked usernames and passwords in a specific format. The passwords are usually obtained from different breaches and collectively stored within a file.

Learn more about
Combo List
Credential Stuffing

What Is Credential Stuffing? Credential-related threats and attacks are one of the most widely-used vectors by attackers. Credential stuffing is one of these techniques: stolen or otherwise compromised account credentials—typically in a database or list format—are used to gain unauthorized access to resources using highly-scalable automation processes.

Learn more about
Credential Stuffing
Data Breach

What Is Data Breach? Data Breach is a security incident where critical information or data is exposed or stolen without the knowledge and consent of the system owner. Almost any individual or organization may it be small or large can suffer from a data breach.

Learn more about
Data Breach
Dictionary Attack

What Is Dictionary Attack? A form of brute-force technique where adversaries try to bypass an authentication mechanism by trying dictionary words as passwords until the correct password is found. Dictionary attacks require fewer resources and time as a list of selected dictionary words are used as compared to trying every possible combination until the correct password is identified.

Learn more about
Dictionary Attack
Domain Reputation

What Is Domain Reputation? Domain reputation allows us to know the overall health of our domain. Domain reputation works on a scoring system, a higher score obtained from data, engagements, and email practices will place your domain at a greater rank.

Learn more about
Domain Reputation
Hashing

What Is Hashing? Hashing involves taking a variable-length block of data as an input and producing a fixed-length output. The process produces a new value provided input to the hash function.

Learn more about
Hashing
K-anonymity

What Is K-anonymity? K-anonymity was introduced to solve the problem: "Given person-specific field-structured data, produce a release of the data with scientific guarantees that the individuals who are the subjects of the data cannot be re-identified while the data remain practically useful”.

Learn more about
K-anonymity
Least Privilege

What Is Least Privilege? Least Privilege is also known as the Principle of Least Privilege (POLP) is a concept of restricting a user, program, or process to access only those resources which are necessary to perform routine and legitimate activities. Applying the principle on people, minimum access rights and clearance level is granted so that the user can perform his/her role.

Learn more about
Least Privilege
OSINT

What Is OSINT (Open-source Intelligence)? Open-source intelligence is a wide set of tools and methods to collect publicly available information. For hackers and attack groups, OSINT based information is commonly used to guess passwords or create targeted phishing attacks.

Learn more about
OSINT
Offline Password Cracking

What Is Offline Password Cracking? Offline password cracking technique involves recovering passwords from an already obtained password hash file. This happens after a hacker has already gained local access to an infected endpoint and starts to collect locally stored hashes or conducts other methods to attack the network, such as LLNMNR poisoning.

Learn more about
Offline Password Cracking
Password Guessing

What Is Passwod Guessing? Password guessing is a form of gaining access via using previously gathered intelligence from the account holder. This may result in OSINT-based information or also previously breached passwords of the same individual.

Learn more about
Password Guessing
Password Masking

What Is Password Masking? Password Masking is a very common practice that is being utilized by web applications, websites, and user account password fields. When a password is entered into a password field of a web application or a user account the characters entered are not shown instead “asterisks” or “bulleted points” are shown.

Learn more about
Password Masking
Password Reuse

What Is Password Reuse? Password reuse is a serious password hygiene issue. People tend to use a single password across different platforms such as third-party software, web or cloud applications, etc.

Learn more about
Password Reuse
Password Space

What Is Password Space? Password space is the total amount of passwords that can be potentially created from a given alphabet, or set of characters for a given maximum password length. This is a measure of how many random guesses one needs to perform during a brute force attack to find any password within, and thus is a measure of security and vulnerability of passwords.

Learn more about
Password Space
Password Spraying

What Is Password Spraying? Password spraying is an adversarial password attack technique in which a few commonly used passwords are utilized on multiple accounts. Rather than applying multiple passwords on the same account as done in a brute force attack, multiple accounts are targeted.

Learn more about
Password Spraying
Rainbow Table Attack

What Is Rainbow Table Attack? A rainbow table is a large database of pre-computed hash values for plain text passwords. The database corresponds to hash values for a large set of passwords.

Learn more about
Rainbow Table Attack
Salting

What Is Salting? Salting is a process of adding random data to a password before applying a hash function to it, this technique adds an extra layer of security. In this way, no similar hashes are produced when a string is hashed.

Learn more about
Salting
Segregation of Duties

What Is Segregation of Duties? The Segregation of Duties concept states that no task, process, or duty should be assigned to a single resource/person. The responsibilities are divided among different people in an organization to prevent the danger of critical mistakes, errors, fraud, embezzlement, etc.

Learn more about
Segregation of Duties
Shadow AI

Shadow AI is the unsanctioned adoption of AI tools by employees, leading to security risks and compliance issues within organizations.

Learn more about
Shadow AI
Shadow IT

What Is Shadow IT? Shadow IT refers to resources utilized without the knowledge of the company's IT department. This can include hardware and software, though it mainly refers to cloud-based SaaS applications.

Learn more about
Shadow IT
Shadow SSO

Shadow SSO involves the unauthorized use of personal or unmanaged SSO accounts to access work-related applications, leading to visibility gaps and security risks.

Learn more about
Shadow SSO
Software as a Service

What Is Software as a Service? Software as a Service (SaaS) is a software hosting, delivery, and licensing model. SaaS products are typically licensed on a subscription basis.

Learn more about
Software as a Service
Zero Trust

What Is Zero Trust? Zero Trust is a security initiative/concept that enforces that every user outside or inside an organization gets authenticated, authorized, and comply with various security configurations and the organisation’s security posture. The principle followed by the Zero trust model is “never trust, always verify”.

Learn more about
Zero Trust
About Scirge
Shedding Light on Shadow IT

Scirge gives organizations the tools to discover and manage Shadow IT by tracking where and how corporate credentials are used across SaaS, supply-chain, GenAI, and other web applications. It helps discover Shadow SaaS and Shadow AI, and identify risks like password reuse, shared accounts, and phishing, while providing real-time awareness messages, automated workflows, and actionable insights.

Trusted by
Ready to discover
Shadow IT?
Shadow AI?
any SaaS app?
any GenAI app?
any supply chain access?
corporate password reuse?
shared accounts?
successful phishing?
SSO accounts?
weak online passwords?
overlapping services?
Contact us