Skip to main content

Terms and Concepts in Hyver

Key terms and cybersecurity concepts you’ll see in the Hyver platform.

Updated over 5 months ago

Overview

Hyver uses a set of consistent terms to describe cyber risk, findings, assets, and mitigation strategies. This article defines the most important concepts you’ll encounter — whether you're exploring the dashboard or interpreting a maturity report. Familiarity with this language will make it easier to navigate and understand Hyver’s insights. 


Core Hyver Concepts

  • Business Assets
    Critical entities that need protection — like customer data, intellectual property, or operational systems.

  • Cost of Breach (CoB)
    A dollar estimate of the financial damage your organization could face from a successful breach, including direct and indirect losses.

  • Cyber Risk Quantification (CRQ)
    Converts cyber threats into measurable financial impact to help you prioritize actions based on risk exposure.

  • Exposure
    The current monetary risk tied to your assets. Calculated using likelihood of attack and impact severity.

  • Exposure Reduction Quantification
    Shows how much your exposure will drop if a specific finding is mitigated.

  • Engagement
    A project in Hyver that defines what will be assessed (e.g., asset discovery, cloud assessment).

  • Finding
    A validated vulnerability or weakness that can be mitigated to reduce organizational risk.

  • Finding Templates
    Predefined vulnerability types you can use to quickly create new findings in Hyver.

  • Mitigation Plan
    A prioritized action plan designed to reduce risk by resolving specific findings.

  • Maturity Assessment
    Measures how well your organization is aligned with cybersecurity best practices (like NIST CSF), and where it can improve.


Threats and Security Terms

  • Threats
    Internal or external actors (e.g., attackers from the internet or rogue employees) that pose risk to your business assets.

  • Advanced Persistent Threats (APT)
    Targeted, sustained attacks by determined threat actors trying multiple paths to breach your environment.

  • Residual Risk
    The risk that remains after you’ve applied all planned mitigation actions.

  • Risk Assessment
    The process of identifying potential risks and evaluating their possible impact.

  • Risk Tolerance
    The amount of risk your organization is willing to accept, recognizing that risk can never be eliminated completely.

  • Security Posture
    Your organization’s overall ability to identify, protect against, detect, and respond to cyber threats.

  • Reputation
    The long-term brand and trust impact from a breach — often factored into breach cost calculations.

  • Business Continuity
    Your ability to maintain essential operations during and after a cyber event.

  • Disaster Recovery Plan (DRP)
    A technical plan for restoring systems and data following a serious incident or breach.


Testing, Logging, and Controls

  • Black Box Testing
    Security testing with no internal system knowledge — simulates an external attacker.

  • White Box Testing
    Security testing with full internal knowledge — useful for in-depth assessments.

  • Audit Log
    A record of who did what, when — used for compliance and forensic reviews.

  • Baselining
    Defining what “normal” looks like on your systems to detect anomalies.

  • Configuration Management
    Tracking and controlling system changes to avoid unintended security consequences.

  • Operations Security (OpSec)
    Protecting sensitive information through secure operations and behavior.


Tools, Frameworks, and Acronyms

  • Multi-Factor Authentication (MFA) / Two-Factor Authentication (2FA)
    Requiring more than one method of identity verification (e.g., password + mobile code).

  • Role-Based Access Control (RBAC)
    Permissions tied to roles, not individual users — helps manage who can access or modify specific content.

  • OWASP
    The Open Web Application Security Project — a leading authority on web app vulnerabilities.

  • NIST
    The National Institute of Standards and Technology — the origin of the NIST Cybersecurity Framework used in Hyver.

  • SIEM
    Security Information and Event Management — collects and analyzes security-related data from across your infrastructure.

  • SCADA
    Supervisory Control and Data Acquisition — industrial systems used in power plants, factories, etc., often highly sensitive.

  • Web Application Firewall (WAF)
    A firewall that monitors and filters traffic between your web apps and the internet.

  • Zero-Day Attack
    An exploit that targets a vulnerability before the vendor or defender even knows it exists.


Important notes

  • Many of these terms appear in Hyver dashboards, reports, or graph views.

  • Some (like CoB or Maturity) are tied directly to platform features and calculations.

  • For full definitions used in Hyver's logic and visualizations, refer to the Glossary when needed.


Wrap-up / Next Steps

Understanding the language of Hyver helps you navigate the platform more effectively. Don’t worry about memorizing everything — you can always return to this guide if something’s unclear along the way.

Did this answer your question?