1/8
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
APT
Advanced Persistent Threat is a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period, often to steal data or surveil the organization.
OSINT
OSINT is the first step an attacker needs to complete to carry out the further phases of an attack. The attacker needs to study the victim by collecting every available piece of information on the company and its employees, such as the company's size, email addresses, phone numbers from publicly available resources to determine the best target for the attack.This information can include social media profiles, company websites, and public records.
IRC
Internet Relay Chat
Shadow Copy
is a Microsoft technology that can create backup copies, snapshots of computer files, or volumes.
TTP
tactics, techniques, and procedures
UKC
Unified Kill chain
STRIDE
(Spoofing identity, Tampering with data, Repudiation threats, Information disclosure, Denial of Service and Elevation of privileges
PASTA
PASTA (Process for Attack Simulation and Threat Analysis) is a risk-centric threat modeling framework that helps organizations identify and analyze potential threats to their systems. It focuses on understanding the attacker's motivations and methods to improve security measures.
D3FEND
Detection, Denial, and Disruption Framework Empowering Network Defense