Skip to main content

Glossary

TermDefinition
Adaptive empirical analysis (AEA)The methodology of how the SixMap platform discovers ports (i.e., TCP/IP).
Advanced persistent threat (APT)A stealthy threat actor, typically a state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.
Autonomous System (AS)A large network that connects with other networks to form the internet.
Autonomous System Number (ASN)Unique identifier associated with the organization that holds the rights to the IP addresses in the network and connects them to the internet. Regional internet registries assign identifiers to the networks of large organizations.
Common platform enumeration (CPE)A standardized and machine readable way to refer to operating systems, hardware, and software.
Common Vulnerabilities and Exposures (CVE)A cybersecurity flaw assigned to a number by a CVE Numbering Authority (CNA). CNAs include security companies, research organizations, and major IT companies such as IBM and Cisco. The MITRE Corporation manages the numbering system with funding from the Cybersecurity and Infrastructure Security Agency (CISA), part of the U.S. Department of Homeland Security.
Common Vulnerability Scoring System (CVSS)A standard for assessing the severity of a vulnerability and assigning a score to it.
Computational mappingA proprietary method SixMap’s engineering pipeline uses to scan the available ports for each active IP address identified for an organization and determine whether any are open. If a port is open, the pipeline identifies which service is running, the product that’s running the service, the version of the product, and the common platform enumeration (CPE).
DepthThe number of subdomains in a domain name plus the root domain. For example, shop.abc.com has a depth of two since there is one subdomain shop. for the root abc.com. By default, the table and graph include all the domains and subdomains in your networks.
DescendantA domain that is a child, grandchild, great-grandchild, etc., of a root domain or subdomain. For example, if the root abc.com has two subdomain children, shop.abc.com and blog.abc.com, and one grandchild subdomain cart.shop.abc.com, it has three descendants and shop.abc.com has one descendant.
Domain nameA string of text, such as www.example.com, that maps to the IP address of a device connected to the internet. Domain names help users navigate the internet because text is easier to remember than numeric IP addresses.
Domain name system (DNS)An automated process that translates domain names to IP addresses.
Ephemeral portA temporary communication endpoint of a transport layer protocol of the internet protocol suite that is used for only a short period of time for the duration of a communication session.
Exploit Prediction Scoring System (EPSS)A model for estimating the probability that a vulnerability will be exploited.
Forward DNS lookup (FDNS)A DNS request that uses a domain name to identify the corresponding IP address.
HostA device that’s connected to a network and capable of sending and receiving data.
Internet protocol (IP)The set of rules that governs how networks communicate with each other to send data.
IP addressA unique numerical label that identifies a device within a network.
Known Exploited Vulnerabilities (KEV)An authoritative catalog maintained by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), which lists vulnerabilities that threat actors are known to have already used.
NetblockA range of IP addresses that Regional internet registries (RIRs) assign to organizations that need large numbers of IP addresses.
Network nodeThe connection point among network devices such as routers, printers, or switches that can receive and send data from one endpoint to the other.
OrganizationA SixMap lead, prospect, or customer comprised of related organizations such as companies, subsidiaries, or other entities in which the organization has a vested interest. SixMap translates the relationships into an organizational hierarchy.
OriginAn organization that holds the rights to an IP address in a network and connects it to the internet. Typically, it is the organization associated with the Autonomous System Number (ASN) for the network.
PortA connection endpoint within an operating system for a process or service, such as web pages and email.
PrefixThe portion of an IP address that identifies the netblock it belongs to.
Regional internet registry (RIR)A non-profit organization that’s authorized by the Internet Assigned Numbers Authority (IANA) to allocate internet numbers to internet service providers and other organizations within a designated section of the world.
Reverse DNS lookup (RDNS)A DNS request that uses an IP address to identify a domain name.
Root domainThe main part of a website's domain name which includes the second-level and top-level domains. The root domain example.com consists of the second level domain (example) and the top-level domain (.com).
Second-level domain (SLD)In the DNS system, the first section left of the top-level domain (TLD). In example.com, example is the SLD and .com is the TLD.
SubdomainA separate site within a domain represented by text and a dot before the root domain name. For example, in my.example.com, my. is the subdomain.
SubnetA collection of network IP addresses that belong to a logical group. A subnet differs from a netblock because a netblock is an allocation of IP addresses assigned to an organization by a Regional internet registry (RIR).
Top-level domain (TLD)In the DNS system, the last section in a domain name such as .com, .org, or .uk.
VulnerabilityA cybersecurity flaw associated with a Common Vulnerabilities and Exposures (CVE) number.