Untitled Flashcards Set


AAA Authentication, Authorization, and Accounting

ACL Access Control List

AES Advanced Encryption Standard

AES-256 Advanced Encryption Standards 256-bit

AH Authentication Header

AI Artificial Intelligence

AIS Automated Indicator Sharing

ALE Annualized Loss Expectancy

AP Access Point

API Application Programming Interface

APT Advanced Persistent Threat

ARO Annualized Rate of Occurrence

ARP Address Resolution Protocol

ASLR Address Space Layout Randomization

ATT&CK Adversarial Tactics, Techniques, and Common Knowledge

AUP Acceptable Use Policy

AV Antivirus

BASH Bourne Again Shell

BCP Business Continuity Planning

BGP Border Gateway Protocol

BIA Business Impact Analysis

BIOS Basic Input/Output System

BPA Business Partners Agreement

BPDU Bridge Protocol Data Unit

BYOD Bring Your Own Device

CA Certificate Authority

CAPTCHA Completely Automated Public Turing Test to tell Computers and Humans Apart

CAR Corrective Action Report

CASB Cloud Access Security Broker

CBC Cipher Block Chaining

CCMP Counter Mode/CBC-MAC Protocol

CCTV Closed-circuit Television

CERT Computer Emergency Response Team

CFB Cipher Feedback

CHAP Challenge Handshake Authentication Protocol

CIA Confidentiality, Integrity, Availability

CIO Chief Information Officer

CIRT Computer Incident Response Team

CMS Content Management System

COOP Continuity of Operation Planning

COPE Corporate Owned, Personally Enabled

CP Contingency Planning

CRC Cyclical Redundancy Check

CRL Certificate Revocation List

CSO Chief Security Officer

CSP Cloud Service Provider

CSR Certificate Signing Request

CSRF Cross-site Request Forgery

CSU Channel Service Unit

CTM Counter Mode

CTO Chief Technology Officer

CVE Common Vulnerability Enumeration

CVSS Common Vulnerability Scoring System

CYOD Choose Your Own Device

DAC Discretionary Access Control

DBA Database Administrator

DDoS Distributed Denial of Service

DEP Data Execution Prevention

DES Digital Encryption Standard

DHCP Dynamic Host Configuration Protocol

DHE Diffie-Hellman Ephemeral

DKIM DomainKeys Identified Mail

DLL Dynamic Link Library

DLP Data Loss Prevention

DMARC Domain Message Authentication Reporting and Conformance

DNAT Destination Network Address Translation

DNS Domain Name System

DoS Denial of Service

DPO Data Privacy Officer

DRP Disaster Recovery Plan

DSA Digital Signature Algorithm

DSL Digital Subscriber Line

EAP Extensible Authentication Protocol

ECB Electronic Code Book

ECC Elliptic Curve Cryptography

ECDHE Elliptic Curve Diffie-Hellman Ephemeral

ECDSA Elliptic Curve Digital Signature Algorithm

EDR Endpoint Detection and Response

EFS Encrypted File System

ERP Enterprise Resource Planning

ESN Electronic Serial Number

ESP Encapsulated Security Payload

FACL File System Access Control List

FDE Full Disk Encryption

FIM File Integrity Management

FPGA Field Programmable Gate Array

FRR False Rejection Rate

FTP File Transfer Protocol

FTPS Secured File Transfer Protocol

GCM Galois Counter Mode

GDPR General Data Protection Regulation

GPG Gnu Privacy Guard

GPO Group Policy Object

GPS Global Positioning System

GPU Graphics Processing Unit

GRE Generic Routing Encapsulation

HA High Availability

HDD Hard Disk Drive

HIDS Host-based Intrusion Detection System

HIPS Host-based Intrusion Prevention System

HMAC Hashed Message Authentication Code

HOTP HMAC-based One-time Password

HSM Hardware Security Module

HTML Hypertext Markup Language

HTTP Hypertext Transfer Protocol

HTTPS Hypertext Transfer Protocol Secure

HVAC Heating, Ventilation Air Conditioning

IaaS Infrastructure as a Service

IaC Infrastructure as Code

IAM Identity and Access Management

ICMP Internet Control Message Protocol

ICS Industrial Control Systems

IDEA International Data Encryption Algorithm

IDF Intermediate Distribution Frame

IdP Identity Provider

IDS Intrusion Detection System

IEEE Institute of Electrical and Electronics Engineers

IKE Internet Key Exchange

IM Instant Messaging

IMAP Internet Message Access Protocol

IoC Indicators of Compromise

IoT Internet of Things

IP Internet Protocol

IPS Intrusion Prevention System

IPSec Internet Protocol Security

IR Incident Response

IRC Internet Relay Chat

IRP Incident Response Plan

ISO International Standards Organization

ISP Internet Service Provider

ISSO Information Systems Security Officer

IV Initialization Vector

KDC Key Distribution Center

KEK Key Encryption Key

L2TP Layer 2 Tunneling Protocol

LAN Local Area Network

LDAP Lightweight Directory Access Protocol

LEAP Lightweight Extensible Authentication Protocol

MaaS Monitoring as a Service

MAC (permissions context) Mandatory Access Control

MAC (network context) Media Access Control

MAC (cryptography context) Message Authentication Code

MAN Metropolitan Area Network

MBR Master Boot Record

MD5 Message Digest 5

MDF Main Distribution Frame

MDM Mobile Device Management

MFA Multifactor Authentication

MFD Multifunction Device

MFP Multifunction Printer

ML Machine Learning

MMS Multimedia Message Service

MOA Memorandum of Agreement

MOU Memorandum of Understanding

MPLS Multi-protocol Label Switching

MSA Master Service Agreement

MSCHAP Microsoft Challenge Handshake Authentication Protocol

MSP Managed Service Provider

MSSP Managed Security Service Provider

MTBF Mean Time Between Failures

MTTF Mean Time to Failure

MTTR Mean Time to Recover

MTU Maximum Transmission Unit

NAC Network Access Control

NAT Network Address Translation

NDA Non-disclosure Agreement

NFC Near Field Communication

NGFW Next-generation Firewall

NIDS Network-based Intrusion Detection System

NIPS Network-based Intrusion Prevention System

NIST National Institute of Standards & Technology

NTFS New Technology File System

NTLM New Technology LAN Manager

NTP Network Time Protocol

OAUTH Open Authorization

OCSP Online Certificate Status Protocol

OID Object Identifier

OS Operating System

OSINT Open-source Intelligence

OSPF Open Shortest Path First

OT Operational Technology

OTA Over the Air

OVAL Open Vulnerability Assessment Language

P12 "PKCS #12"

P2P Peer to Peer

PaaS Platform as a Service

PAC Proxy Auto Configuration

PAM Privileged Access Management

PAM Pluggable Authentication Modules

PAP Password Authentication Protocol

PAT Port Address Translation

PBKDF2 Password-based Key Derivation Function 2

PBX Private Branch Exchange

PCAP Packet Capture

PCI-DSS Payment Card Industry Data Security Standard

PDU Power Distribution Unit

PEAP Protected Extensible Authentication Protocol

PED Personal Electronic Device

PEM Privacy Enhanced Mail

PFS Perfect Forward Secrecy

PGP Pretty Good Privacy

PHI Personal Health Information

PII Personally Identifiable Information

PIV Personal Identity Verification

PKCS Public Key Cryptography Standards

PKI Public Key Infrastructure

POP Post Office Protocol

POTS Plain Old Telephone Service

PPP Point-to-Point Protocol

PPTP Point-to-Point Tunneling Protocol

PSK Pre-shared Key

PTZ Pan-tilt-zoom

PUP Potentially Unwanted Program

RA (encryption context) Recovery Agent

RA (PKI context) Registration Authority

RACE Research and Development in Advanced Communications Technologies in Europe

RAD Rapid Application Development

RADIUS Remote Authentication Dial-in User Service

RAID Redundant Array of Inexpensive Disks

RAS Remote Access Server

RAT Remote Access Trojan

RBAC Role-based Access Control

RBAC Rule-based Access Control

RC4 Rivest Cipher version 4

RDP Remote Desktop Protocol

RFID Radio Frequency Identifier

RIPEMD RACE Integrity Primitives Evaluation Message Digest

ROI Return on Investment

RPO Recovery Point Objective

RSA Rivest, Shamir, & Adleman

RTBH Remotely Triggered Black Hole

RTO Recovery Time Objective

RTOS Real-time Operating System

RTP Real-time Transport Protocol

S/MIME Secure/Multipurpose Internet Mail Extensions

SaaS Software as a Service

SAE Simultaneous Authentication of Equals

SAML Security Assertions Markup Language

SAN Storage Area Network

SAN Subject Alternative Name

SASE Secure Access Service Edge

SCADA Supervisory Control and Data Acquisition

SCAP Security Content Automation Protocol

SCEP Simple Certificate Enrollment Protocol

SD-WAN Software-defined Wide Area Network

SDK Software Development Kit

SDLC Software Development Lifecycle

SDLM Software Development Lifecycle Methodology

SDN Software-defined Networking

SE Linux Security-enhanced Linux

SED Self-encrypting Drives

SEH Structured Exception Handler

SFTP Secured File Transfer Protocol

SHA Secure Hashing Algorithm

SHTTP Secure Hypertext Transfer Protocol

SIEM Security Information and Event Management

SIM Subscriber Identity Module

SLA Service-level Agreement

SLE Single Loss Expectancy

SMS Short Message Service

SMTP Simple Mail Transfer Protocol

SMTPS Simple Mail Transfer Protocol Secure

SNMP Simple Network Management Protocol

SOAP Simple Object Access Protocol

SOAR Security Orchestration, Automation, Response

SoC (hardware context) System on Chip

SOC (place) Security Operations Center

SOW Statement of Work

SPF Sender Policy Framework

SPIM Spam over Internet Messaging

SQL Structured Query Language

SQLi SQL Injection

SRTP Secure Real-Time Protocol

SSD Solid State Drive

SSH Secure Shell

SSL Secure Sockets Layer

SSO Single Sign-on

STIX Structured Threat Information eXchange

SWG Secure Web Gateway

TACACS+ Terminal Access Controller Access Control System

TAXII Trusted Automated eXchange of Indicator Information

TCP/IP Transmission Control Protocol/Internet Protocol

Tell Computers and Humans Apart

TGT Ticket Granting Ticket

TKIP Temporal Key Integrity Protocol

TLS Transport Layer Security

TOC Time-of-check

TOTP Time-based One-time Password

TOU Time-of-use

TPM Trusted Platform Module

TSIG Transaction Signature

TTP Tactics, Techniques, and Procedures

UAT User Acceptance Testing

UAV Unmanned Aerial Vehicle

UDP User Datagram Protocol

UEFI Unified Extensible Firmware Interface

UEM Unified Endpoint Management

UPS Uninterruptable Power Supply

URI Uniform Resource Identifier

URL Universal Resource Locator

USB Universal Serial Bus

USB OTG USB On the Go

UTM Unified Threat Management

UTP Unshielded Twisted Pair

VBA Visual Basic

VDE Virtual Desktop Environment

VDI Virtual Desktop Infrastructure

VLAN Virtual Local Area Network

VLSM Variable Length Subnet Masking

VM Virtual Machine

VoIP Voice over IP

VPC Virtual Private Cloud

VPN Virtual Private Network

VTC Video Teleconferencing

WAF Web Application Firewall

WAP Wireless Access Point

WEP Wired Equivalent Privacy

WIDS Wireless Intrusion Detection System

WIPS Wireless Intrusion Prevention System

WO Work Order

WPA Wi-Fi Protected Access

WPS Wi-Fi Protected Setup

WTLS Wireless TLS

XDR Extended Detection and Response

XML Extensible Markup Language

XOR Exclusive Or

XSRF Cross-site Request Forgery

XSS Cross-site Scripting

These three protocols are associated with port ███: SSH, SCP, and SFTP. 22

These three protocols are associated with port 22: ███, SCP, and SFTP. SSH

These three protocols are associated with port 22: SSH, ███, and SFTP. SCP

These three protocols are associated with port 22: SSH, SCP, and ███. SFTP

The ███ protocol is associated with three ports: 137, 138, and 139. NetBIOS

The NetBIOS protocol is associated with three ports: 1█7, 1█8, and 1█9. (Supply the missing number.) 3 (137, 138, 139)

The NetBIOS protocol is associated with three ports: 13█, 13█, and 13█. (Supply the missing numbers.) 7, 8, 9 (137, 138, 139)

███ is associated with two ports (465 and 587). 465 is used for legacy compatibility while 587 aligns with modern best practices outlined in RFC 6409. SMTPS

SMTPS is associated with two ports (███ and 587). ███ is used for legacy compatibility while 587 aligns with modern best practices outlined in RFC 6409. 465

SMTPS is associated with two ports (465 and ███). 465 is used for legacy compatibility while ███ aligns with modern best practices outlined in RFC 6409. 587

RADIUS uses the following ports for ███: 1645 (legacy), 1812 (UDP), 2083 (TCP). authentication and authorization

RADIUS uses the following ports for authentication and authorization: ███ (legacy), 1812 (UDP), 2083 (TCP). 1645

RADIUS uses the following ports for authentication and authorization: 1645 (legacy), ███ (UDP), 2083 (TCP). 1812

RADIUS uses the following ports for authentication and authorization: 1645 (legacy), 1812 (UDP), ███ (TCP). 2083

RADIUS uses the following ports for ███: 1646 (legacy), 1813 (UDP), 2087 (TCP). accounting

RADIUS uses the following ports for accounting: ███ (legacy), 1813 (UDP), 2087 (TCP). 1646

RADIUS uses the following ports for accounting: 1646 (legacy), ███ (UDP), 2087 (TCP). 1813

RADIUS uses the following ports for accounting: 1646 (legacy), 1813 (UDP), ███ (TCP). 2087

Legacy ███ ports are 1645 (Auth) and 1646 (Accounting), but modern best practices use ports 1812 (Auth) and port 1813 (Accounting) for UDP, or ports 2083 (Auth) and port 2087 (Accounting) for TCP. RADIUS

Legacy RADIUS ports are 1645 (Auth) and 1646 (Accounting), but modern best practices use ports 1812 (Auth) and port 1813 (Accounting) for [UDP/TCP], or ports 2083 (Auth) and port 2087 (Accounting) for [UDP/TCP]. UDP -> TCP

Legacy RADIUS ports are ███ (Auth) and ███ (Accounting), but modern best practices use ports 1812 (Auth) and port 1813 (Accounting) for UDP, or ports 2083 (Auth) and port 2087 (Accounting) for TCP. 1645 & 1646

Legacy RADIUS ports are 1645 (Auth) and 1646 (Accounting), but modern best practices use ports ███ (Auth) and port ███ (Accounting) for UDP, or ports 2083 (Auth) and port 2087 (Accounting) for TCP. 1812 & 1813

Legacy RADIUS ports are 1645 (Auth) and 1646 (Accounting), but modern best practices use ports 1812 (Auth) and port 1813 (Accounting) for UDP, or ports ███ (Auth) and port 2087 (Accounting) for TCP. 2083

Legacy RADIUS ports are 1645 (Auth) and 1646 (Accounting), but modern best practices use ports 1812 (Auth) and port 1813 (Accounting) for UDP, or ports 2083 (Auth) and port ███ (Accounting) for TCP. 2087

The network protocol FTP uses port ███. 21

The network protocol ███ uses port 21. FTP

The network protocol SSH uses port ███. 22

The network protocol ███ uses port 22. SSH, SCP, SFTP

The network protocol Telnet uses port ███. 23

The network protocol ███ uses port 23. Telnet

The network protocol SMTP uses port ███. 25

The network protocol ███ uses port 25. SMTP

The network protocol DNS uses port ███. 53

The network protocol ███ uses port 53. DNS

The network protocol TFTP uses port ███. 69

The network protocol ███ uses port 69. TFTP

The network protocol HTTP uses port ███. 80

The network protocol ███ uses port 80. HTTP

The network protocol HTTPS uses port ███. 443

The network protocol ███ uses port 443. HTTPS

The network protocol Kerberos uses port ███. 88

The network protocol ███ uses port 88. Kerberos

The network protocol POP3 uses port ███. 110

The network protocol ███ uses port 110. POP3

The network protocol NNTP uses port ███. 119

The network protocol ███ uses port 119. NNTP

The network protocol RPC uses port ███. 135

The network protocol ███ uses port 135. RPC

The network protocol IMAP uses port ███. 143

The network protocol ███ uses port 143. IMAP

The network protocol SNMP uses port ███. 161

The network protocol ███ uses port 161. SNMP

The network protocol SNMP Trap uses port ███. 162

The network protocol ███ uses port 162. SNMP Trap

The network protocol LDAP uses port ███. 389

The network protocol ███ uses port 389. LDAP

The network protocol SMB uses port ███. 445

The network protocol ███ uses port 445. SMB

The network protocol SMTPS uses ports ███ and 587. 465

The network protocol SMTPS uses ports 465 and ███. 587

The network protocol ███ uses ports 465 and 587. SMPTS

The network protocol Syslog uses port ███. 514

The network protocol ███ uses port 514. Syslog

The network protocol LDAPS uses port ███. 636

The network protocol ███ uses port 636. LDAPS

The network protocol IMAPS uses port ███. 993

The network protocol ███ uses port 993. IMAPS

The network protocol POP3S uses port ███. 995

The network protocol ███ uses port 995. POP3S

The network protocol Microsoft SQL uses port ███. 1433

The network protocol ███ uses port 1433. Microsoft SQL

The network protocol RDP uses port ███. 3389

The network protocol ███ uses port 3389. RDP

The network protocol Syslog TLS uses port ███. 6514

The network protocol███ uses port 6514. Syslog TLS

Security measures implemented through technology like firewalls,  encryption, or authentication systems. Technical controls

Administrative policies and procedures that guide how an organization manages security such as risk assessments and security policies. Managerial controls

Day-to-day security procedures carried out by people like security awareness training or incident response. Operational controls

Security measures that protect facilities and equipment like locks, fences, or security cameras. Physical controls

Security measures designed to stop incidents before they occur. Preventive controls

Measures that discourage potential attackers from attempting security violations. Deterrent controls

Systems that identify and record security violations when they occur. Detective controls

Measures that fix problems or restore systems after a security incident has occurred. Corrective controls

Alternative security measures used when primary controls aren't feasible (e.g. Compensating controls

Controls that direct, specify,  or mandate appropriate and required security behavior. Directive controls

Security triad representing Confidentiality (data privacy), Integrity (data accuracy and trustworthiness), and Availability (access when needed) CIA

Guarantee that someone cannot deny performing an action by providing proof of origin and delivery Non-repudiation

Framework covering Authentication (proving identity), Authorization (granting access rights), and Accounting (tracking actions) AAA

Process of verifying human identity through factors like passwords, biometrics, or security tokens Authenticating persons

Verifying the identity of devices and systems through certificates, tokens, or other cryptographic means Authenticating systems

Frameworks that define how access rights are granted and managed (e.g., RBAC, MAC, DAC) Authorization models

Assessment process that compares current security state against desired security state to identify deficiencies Gap analysis

Security model that assumes no trust and requires verification of every user and device, regardless of location Zero Trust

Component of Zero Trust that handles policy decisions and authentication/authorization processes Control Plane

Dynamic identity verification that adjusts authentication requirements based on risk factors Adaptive identity

Limiting attack surface by minimizing access points and unnecessary privileges Threat scope reduction

Access decisions based on predefined security policies rather than network location Policy-driven access control

Zero Trust component that manages and maintains security policies Policy Administrator

System that evaluates access requests against security policies to make allow/deny decisions Policy Engine

Component that enforces access decisions and handles actual data flow in Zero Trust architecture Data Plane

Legacy network segments where trust is assumed based on location (concept Zero Trust eliminates) Implicit trust zones

Entities (users or devices) requesting access to resources in Zero Trust model Subject/System

Security component that implements access decisions made by Policy Engine Policy Enforcement Point

Physical barriers installed to prevent vehicle access to protected areas such as entry way doors to datacenters Bollards

Security entrance with two sets of doors (mantrap) where only one can open at a time Access control vestibule

Physical barrier surrounding facility to control access and deter intruders Fencing

Camera systems monitoring and recording activity for security purposes Video surveillance

Personnel providing physical security through monitoring, access control, and incident response Security guard

Credential card used to verify identity and control physical access to facilities Access badge

Strategic illumination to deter intruders and improve surveillance effectiveness Lighting

Devices detecting heat signatures to identify unauthorized presence Infrared sensors

Devices detecting weight or pressure changes to identify intrusion attempts Pressure sensors

Motion detectors using microwave radiation to detect movement in protected areas Microwave sensors

Devices using sound waves to detect movement or presence in monitored areas Ultrasonic sensors

Decoy system designed to attract and detect attackers while gathering intelligence Honeypot

Network of honeypots simulating a production environment to study attack patterns Honeynet

Decoy or faux file(s) designed to detect unauthorized access when accessed Honeyfile

Decoy credentials or data points employed to identify unauthorized access or credential theft. Honeytoken

Formal workflow for reviewing and authorizing security changes, involving appropriate stakeholders and documentation Approval process

Designation of individuals or teams responsible for specific security assets, processes, or decisions Ownership

Individuals or groups affected by or having interest in security decisions, including management, users, and IT staff Stakeholders

Assessment of how security changes might affect business operations, systems, and users before implementation Impact analysis

Documentation of security control testing outcomes used to validate effectiveness before production deployment Test results

Documented procedure for reversing security changes if implementation causes problems or fails Backout plan

Scheduled time period for implementing security updates with minimal impact on business operations Maintenance window

Documented step-by-step instructions for performing routine security tasks consistently Standard operating procedure

Security controls specifying which resources, applications, or actions are explicitly permitted or blocked Allow lists/deny lists

Business operations or system functions limited during security maintenance or incidents Restricted activities

Period when systems are unavailable due to security maintenance, updates, or incidents Downtime

Process of stopping and starting specific services during security updates or troubleshooting Service restart

Framework for managing digital certificates and public-private key pairs to enable secure communications and authentication Public key infrastructure (PKI)

Widely shared cryptographic key used to encrypt messages or verify digital signatures Public key

Secret cryptographic key kept by owner used to decrypt messages or create digital signatures Private key

Storing encryption keys with a reliable third party for emergency or legal access. Key escrow

Encryption of entire storage drive including operating system and all files Full-disk encryption

Encryption of specific disk partitions while leaving others unencrypted Partition encryption

Encryption of individual files while leaving the system and other files unencrypted File encryption

Encryption of logical storage volume that may span multiple physical drives Volume encryption

Encryption of database contents. Can be row or column level Database encryption

Encryption of specific database records or fields while leaving others in plaintext Record encryption

Encryption of data while it's being transmitted between systems (data in transit) Transport encryption

Encryption using public-private key pairs where different keys encrypt and decrypt Asymmetric encryption

Encryption using the same key for both encryption and decryption Symmetric encryption

Process of securely sharing cryptographic keys between parties Key exchange

Mathematical formulas used to perform encryption and decryption operations Algorithms

Size of cryptographic key in bits, with longer lengths generally providing stronger security Key length

Hardware chip that securely stores cryptographic keys and performs encryption operations Trusted Platform Module

Dedicated device for secure key storage and cryptographic operations Hardware security module

Platform for generating, distributing, storing, and retiring cryptographic keys Key management system

Protected hardware area for processing sensitive data and storing cryptographic keys Secure enclave

Technique of hiding information within other data to avoid detection Steganography

Replacing sensitive data with non-sensitive placeholder tokens Tokenization

Obscuring parts of sensitive data while maintaining format and usability Data masking

Creating fixed-length values from variable-length input that cannot be reversed Hashing

Adding random data to input before hashing to prevent rainbow table attacks Salting

Cryptographic way to verify authenticity and integrity of messages or documents Digital signatures

Technique to strengthen passwords by making them more resistant to brute force attacks Key stretching

Distributed ledger technology using cryptography to secure transaction records Blockchain

Transparent record of all transactions visible to all participants Open public ledger

Trusted entities that issue and verify digital certificates Certificate authorities

Lists of digital certificates that are no longer valid or trusted Certificate revocation lists

Protocol for real-time verification of digital certificate validity Online Certificate Status Protocol

Digital certificates signed by the same entity they identify Self-signed certificates

Digital certificates issued and signed by trusted certificate authorities Third-party certificates

Base security component that must be trusted implicitly Root of trust

Process of creating request for digital certificate from certificate authority CSR generation

Digital certificates that secure multiple subdomains of a domain Wildcard certificates

Government-sponsored hackers with sophisticated capabilities and extensive resources targeting strategic assets. Nation-state Actor

Person with minimal technical skills utilizing ready-made tools or simple attack techniques. Unskilled Attacker

An attacker driven by political or social causes targeting organizations to convey a message. Hacktivist

Current or former employee/contractor who misuses legitimate access to harm the organization. Insider Threat

Criminal groups conducting cyber attacks for financial gain with significant resources and coordination. Organized Crime

Unapproved technology solutions that bypass the IT department which pose security threats. Shadow IT

Threat originating from within the organization with legitimate access privileges. Internal Actor

Threat originating from outside the organization without legitimate access. External Actor

Level of financial and technical resources available to threat actors for attacks. Resources/Funding

Technical expertise and capability of threat actors to conduct complex attacks. Level of Sophistication

Unauthorized transfer of data from a computer or network to another location. Data Exfiltration

Gathering of confidential information for competitive advantage or national security. Espionage

Attacks aimed at preventing normal system or network operations. Service Disruption

Threatening to expose sensitive information for financial or other gains. Blackmail

Motivation to profit through cyber attacks or data theft. Financial Gain

Ideological motivations driving cyber attacks against specific targets. Political Beliefs

Attacks conducted based on moral principles or perceived righteousness. Ethical Motivation

Attacks motivated by desire for retaliation against perceived wrongs. Revenge

Actions aimed at causing disorder and undermining system stability. Disruption/Chaos

Cyber attacks as part of military operations or nation-state conflicts. War

Malicious messages targeting users through corporate or personal email systems. Email Attacks

Attacks delivered through text messages targeting mobile devices. SMS Attacks

Malicious content or social engineering delivered through messaging platforms. Instant Messaging Attacks

Malware or exploits embedded within or disguised as image files. Image-based Attacks

Malicious code delivered through documents or executable files. File-based Attacks

Social engineering attacks conducted through phone calls or voice messaging. Voice Call Attacks

Malware spread through USB drives or other portable storage devices. Removable Device Attacks

Security weaknesses in software running on user devices. Client-based Vulnerabilities

Security weaknesses exploitable without installing malicious software. Agentless Vulnerabilities

Systems no longer receiving security updates, creating vulnerability risks. Unsupported Systems

Wi-Fi networks with weak or no security controls. Unsecure Wireless Networks

Physical networks lacking proper security controls. Unsecure Wired Networks

Security weaknesses in Bluetooth device communications. Bluetooth Vulnerabilities

Unnecessary open network ports creating potential attack entry points. Open Service Ports

Unchanged factory-set usernames and passwords creating security risks. Default Credentials

Compromising organizations through their business partners or vendors. Supply Chain Attacks

Security risks introduced through managed service provider relationships. MSP Vulnerabilities

Security exposures from third-party service providers and software. Vendor Risk

Security vulnerabilities introduced through supply chain partners. Supplier Risk

Fraudulent attempts to obtain sensitive information by posing as trustworthy entities. Phishing

Voice phishing attacks conducted through phone calls. Vishing

SMS phishing attacks targeting users through text messages. Smishing

Spreading false information to deceive or manipulate targets. Misinformation

Deliberately created and spread false information for malicious purposes. Disinformation

Pretending to be someone else to gain unauthorized access or trust. Impersonation

Sophisticated email fraud targeting businesses and organizations. Business Email Compromise

Creating false scenarios to obtain sensitive information or access. Pretexting

Compromising websites frequently visited by targeted users. Watering Hole Attack

Fraudulent use of company names and logos to deceive victims. Brand Impersonation

Registering domains similar to legitimate ones to catch typing errors. Typosquatting

Attack that inserts malicious code into a running program's memory space. Memory Injection

Vulnerability where program writes data beyond allocated buffer limits, potentially allowing code execution. Buffer Overflow

Security flaw where system behavior depends on relative timing of events. Race Condition

Part of race condition where initial security check occurs before resource access. Time-of-check

Part of race condition when resource is actually accessed after security check. Time-of-use

Compromised software updates that deliver malware or backdoors. Malicious Update

Weaknesses in OS components. OS-based Vulnerabilities

Attack inserting malicious SQL code to manipulate database operations. SQL Injection

Vulnerability allowing injection of malicious scripts into web pages viewed by others. Cross-site Scripting

Security flaws in device firmware that can compromise hardware operation. Firmware Vulnerabilities

Systems no longer supported with security updates, creating ongoing vulnerabilities which need to be addressed. End-of-life Systems

Security risks from outdated systems that cannot be easily updated or replaced. Legacy System Risks

Attack allowing malicious code to break out of virtual machine isolation. VM Escape

Vulnerability from improperly sharing resources between virtual environments. Resource Reuse

Security weaknesses unique to cloud computing environments. Cloud-specific Vulnerabilities

Vulnerabilities introduced through third-party service providers. Service Provider Risks

Security risks from compromised hardware supply chains. Hardware Provider Risks

Vulnerabilities introduced through third-party software vendors. Software Provider Risks

Weaknesses in encryption implementation or algorithms. Cryptographic Vulnerabilities

Security weaknesses caused by improper system or application settings. Misconfiguration

Installing apps from unofficial sources on mobile devices, bypassing security controls. Side Loading

Removing manufacturer restrictions from mobile devices, potentially compromising security. Jailbreaking

Previously unknown security flaw actively exploited before patches are available. Zero-day Vulnerability

Malware that encrypts a victim's files and demands payment (usually cryptocurrency) for the decryption key. Ransomware

Malware that disguises itself as legitimate software while performing malicious actions in the background. Trojan

Self-replicating malware that spreads across networks without requiring user interaction or host programs. Worm

Malware that secretly monitors user activity and collects sensitive information like passwords or browsing habits. Spyware

Unnecessary software pre-installed on devices that consumes system resources and may degrade performance. Bloatware

Malicious code that attaches itself to clean files and spreads when infected files are opened. Virus

Software or hardware that records keystrokes to capture passwords and other sensitive typed information. Keylogger

Malicious code programmed to execute when specific conditions are met like a date or system event. Logic bomb

Malware that provides privileged access to a system while actively hiding its presence from detection. Rootkit

Direct attempts to access or damage systems through hands-on contact with hardware. Physical attacks

Attack that systematically attempts all possible combinations to crack passwords or encryption. Brute force

Creating unauthorized copies of RFID cards/tags by capturing and duplicating their signals. RFID cloning

Attacks that exploit or manipulate physical conditions like temperature or power to damage systems. Environmental

Overwhelming a target system with traffic from multiple sources to make it unavailable to legitimate users. DDoS

DDoS attack that uses intermediary servers to multiply the volume of attack traffic. Amplified DDoS

DDoS attack that spoofs the victim's address causing servers to flood them with response traffic. Reflected DDoS

Exploits targeting DNS servers/services to redirect traffic or disrupt name resolution. DNS attacks

Attacks targeting wireless networks through techniques like evil twin APs or deauthentication. Wireless

Attack where adversary intercepts traffic between two parties to steal or modify data. On-path

Capturing and retransmitting authentication credentials to gain unauthorized access. Credential replay

Programming that causes unintended and harmful effects when executed on a system. Malicious code

Attack that inserts malicious code into applications through unsanitized input. Injection

Exploiting programs by writing more data to a buffer than it can hold to run malicious code. Buffer overflow

Capturing and retransmitting valid network traffic to repeat a transaction or gain access. Replay

Exploiting vulnerabilities to gain higher-level permissions than originally granted. Privilege escalation

Creating fake digital artifacts like certificates or tokens to bypass security controls. Forgery

Retrieving files and directories located beyond the web root folder using altered paths. Directory traversal

Forcing systems to use weaker versions of protocols or encryption than intended. Downgrade

Finding two different inputs that produce the same hash value in cryptographic functions. Collision

Exploiting the probability principles of hash collisions based on the birthday paradox. Birthday Attack

Testing a few common passwords against many accounts to avoid lockouts. Password spraying

Systematically trying every possible password combination until finding the correct one. Password brute force

Security alert triggered when multiple failed login attempts occur on an account. Account lockout

Multiple simultaneous logins detected from different locations for the same account. Concurrent session usage

Security alert indicating filtered or prohibited content was detected and stopped. Blocked content

Alert triggered when login attempts occur from geographically impossible locations in time. Impossible travel

Division of a network into isolated segments to contain breaches and control access between different parts. Segmentation

Systems and policies that regulate who can access specific resources and what actions they can perform. Access control

Rules that specify which users or systems have access to specific resources and what permissions they have. Access control list (ACL)

Specific rights granted to users or processes defining what actions they can perform on resources. Permissions

Security policy that only permits specifically approved applications to run while blocking all others. Application allow list

Security technique that separates processes or systems from each other to prevent cross-contamination. Isolation

Process of applying updates to software and systems to fix security vulnerabilities and bugs. Patching

Converting data into encoded format that can only be read with proper decryption key. Encryption

Continuous observation of system activities and network traffic to detect security incidents. Monitoring

Security principle of giving users only the minimum access rights needed to perform their jobs. Least privilege

Ensuring systems maintain secure settings through policies and automated controls. Configuration enforcement

Secure removal of systems or data from service including proper data sanitization. Decommissioning

Methods used to reduce system vulnerability by removing unnecessary features and securing necessary ones. Hardening techniques

Implementing strong encryption protocols and proper key management to protect data. Encryption hardening

Deploying security software like antivirus and anti-malware on end-user devices. Endpoint protection installation

Software firewall installed on individual computers to control incoming and outgoing network traffic. Host-based firewall

Security software that monitors a single host for suspicious activity and blocks potential threats. Host-based IPS

Closing unnecessary network ports and disabling unneeded protocols to reduce attack surface. Disabling ports/protocols

Replacing default manufacturer passwords with strong unique passwords before deployment. Default password changes

Uninstalling unused applications and services to minimize potential vulnerabilities. Removal of unnecessary software

A computing model offering shared resources and services over the internet with specific security considerations. Cloud

A document outlining the security responsibilities that are shared by cloud providers and their customers. Responsibility Matrix

Environments combining on-premises and cloud resources with integrated security controls. Hybrid Infrastructure

External service providers. Third-party Vendors

Automated infrastructure management through code, requiring secure development practices. Infrastructure as Code

Cloud computing model where providers manage infrastructure, changing security responsibilities. Serverless

Application architecture using small, independent services with individual security requirements. Microservices

Complete separation of systems or networks through physical means for security. Physical Isolation

Networks or systems physically isolated from unsecured networks, including the internet. Air-gapped

Division of networks into separate security zones using virtual barriers. Logical Segmentation

Network design facilitating automated security oversight and administration. Software-defined Networking

Infrastructure hosted within an organization's facilities with direct security control. On-premises

Infrastructure managed from a single point with consolidated security controls. Centralized Architecture

Distributed infrastructure requiring coordinated security across multiple locations. Decentralized Architecture

Technology isolating applications with their dependencies for secure deployment. Containerization

Establishment of virtual computing resources with targeted security measures. Virtualization

Design of connected device networks with embedded security controls. IoT Architecture

Industrial control systems requiring specialized security approaches and protocols. ICS/SCADA Systems

Operating systems for time-critical applications with specific security requirements. RTOS

Computing systems integrated into devices requiring security hardening. Embedded Systems

System design ensuring continuous operation with security redundancy. High Availability

The degree to which systems and data are accessible when needed. Availability

System ability to maintain security and operations during adverse conditions. Resilience

The financial impact of adopting and sustaining security measures Cost Considerations

System performance under security controls and monitoring. Responsiveness

Ability to grow while maintaining security effectiveness. Scalability

Efficiency of implementing systems with security controls. Ease of Deployment

Shifting security risks to third parties through contracts or insurance. Risk Transference

Ability to restore systems and data after security incidents. Ease of Recovery

Access to security updates and the capability to implement them. Patch Availability

Constraints preventing security updates on certain systems. Inability to Patch

Energy needs for maintaining secure system operation. Power Requirements

Processing capacity needed for security operations and controls. Compute Resources

Strategic positioning of security devices and network components for optimal protection. Device Placement

Distinct network segments with different security levels and access controls. Security Zones

All possible points where an unauthorized user can attempt to enter or extract data from an environment. Attack Surface

Methods and protocols used to establish secure network connections between devices. Connectivity

Security device behavior where traffic is allowed to pass when the device fails. Fail-open

Security device behavior where traffic is blocked when the device fails. Fail-closed

Security devices that actively modify or block network traffic based on security policies. Active Devices

Security devices that monitor network traffic without modifying it. Passive Devices

Security appliances that process traffic directly in the network path. Inline Devices

Security devices that observe traffic without directly interfering with network flow. Tap/Monitor Devices

A hardened system used to manage other devices in different security zones. Jump Server

An intermediary server that processes requests between clients and other servers. Proxy Server

Systems that detect (IDS) and prevent (IPS) network attacks and suspicious behavior. IPS/IDS

Device that distributes network traffic across multiple servers while maintaining security. Load Balancer

Devices that monitor and collect security-related data from the network. Security Sensors

Controls that restrict network access based on physical port or device identification. Port Security

A standard for port-based network access control and authentication. 802.1X

An authentication framework frequently used in wireless networks and point-to-point connections. EAP

Firewall specifically designed to protect web applications from attacks. WAF

Security appliance combining multiple security features in a single device. UTM

Advanced firewalls that include traditional firewall capabilities plus integrated advanced security features. NGFW

Encrypted network connection that provides secure access over public networks. VPN

Secure methods for connecting to network resources from external locations. Remote Access

Secure communication protocol that provides privacy and data integrity. TLS Tunneling

Suite of protocols for securing IP communications through authentication and encryption. IPSec

Software-defined networking technology that simplifies WAN management and security. SD-WAN

Cloud architecture combining network security functions with WAN capabilities. SASE

Information subject to specific legal or compliance requirements for handling and protection. Regulated Data

Proprietary business information that requires strict confidentiality controls. Trade Secret

Creative works and innovations requiring legal protection and secure handling. Intellectual Property

Sensitive data related to legal proceedings or attorney-client communications. Legal Information

Monetary data requiring protection from unauthorized access and modification. Financial Information

Information in a format that can be directly understood by people. Human-readable Data

Information that requires processing or decoding to be understood. Non-human-readable Data

Information requiring protection from unauthorized disclosure. Sensitive Data

Information restricted to authorized individuals with a need to know. Confidential Data

Information that can be freely shared without security restrictions. Public Data

Information with strict access controls limited to specific individuals. Restricted Data

Personal information requiring protection from unauthorized access. Private Data

Essential information requiring the highest level of protection. Critical Data

Information stored on media not currently being accessed or transmitted. Data at Rest

Information being transmitted across networks or between systems. Data in Transit

Information actively being accessed, processed, or modified. Data in Use

Legal requirements governing data storage and processing in specific geographic locations. Data Sovereignty

Physical location of data storage and processing systems. Geolocation

Limitations on where data can be stored or processed based on legal requirements. Geographic Restrictions

Converting data into coded form to prevent unauthorized access. Encryption

Creating fixed-length values to verify data integrity. Hashing

Obscuring sensitive data elements while maintaining format and usability. Data Masking

Replacing sensitive data with non-sensitive placeholders. Tokenization

Making data difficult to understand without proper authorization. Obfuscation

Separating data into distinct security zones based on sensitivity. Data Segmentation

Controls limiting data access to authorized users and processes. Permission Restrictions

System design ensuring continuous operation with minimal downtime through redundancy and failover. High Availability

Distribution of workloads across multiple systems to ensure optimal performance and availability. Load Balancing

Grouping of servers working together as a single system for increased availability and reliability. Clustering

Fully equipped backup facility ready for immediate operation during emergencies. Hot Site

Backup facility with basic infrastructure but requiring equipment and setup before use. Cold Site

Partially equipped backup facility requiring some setup before becoming operational. Warm Site

Distribution of resources across different locations to minimize regional disaster impact. Geographic Dispersion

Use of different hardware/software platforms to prevent single points of failure. Platform Diversity

Use of multiple cloud providers to increase reliability and prevent vendor lock-in. Multi-cloud Systems

Plans and procedures ensuring critical functions continue during disruptions. Continuity of Operations

Process of determining future resource needs for people, technology, and infrastructure. Capacity Planning

Discussion-based sessions where teams talk through emergency response scenarios. Tabletop Exercises

Verification that systems properly switch to backup resources during failures. Failover Testing

Controlled testing of disaster scenarios without actual system disruption. Simulation Testing

Simultaneous operation of primary and backup systems to verify functionality. Parallel Processing

Data copies stored at the same location as primary systems. Onsite Backups

Data copies stored at separate locations for disaster recovery. Offsite Backups

How often data backups are performed based on business requirements. Backup Frequency

Protection of backup data through encryption to prevent unauthorized access. Backup Encryption

Point-in-time copies of data or system states for recovery purposes. Snapshots

Documented processes for restoring systems and data after failures. Recovery Procedures

Real-time copying of data to backup systems for disaster recovery. Replication

Recording of system changes to enable precise point-in-time recovery. Journaling

Backup power systems for extended electricity outages. Generators

Battery systems providing temporary power during short outages and transitions. UPS

A single point of failure (SPOF) is any system component whose failure halts the entire system, creating a critical vulnerability that must be addressed with redundancy and failover mechanisms. Single Point of Failure

Creating and managing user accounts and access rights within an organization. This includes account creation, assigning permissions based on roles, managing password policies, and ensuring proper access from hire to departure. User Provisioning

Automating IT resource deployment and management, including virtual machines, databases, and network components. This involves allocating resources, configuring security, and ensuring compliance. Resource provisioning guarantees consistent and secure deployment aligned to organizational standards. Resource Provisioning

Guardrails serve as automated safeguards enforcing security policies, compliance, and best practices during resource deployment and configuration changes, preventing actions that could cause vulnerabilities or compliance issues. Guard Rails

Security groups define collections of allowed network traffic for cloud or network resources, functioning as virtual firewalls. They control access at the protocol and port level, enabling organizations to create rules that specify permitted or denied traffic types. Security Groups

The implied cost and consequences of choosing quick but suboptimal technical solutions over better long-term approaches. Technical Debt

The phase of incident response where policies, procedures, and resources are established before an incident. This encompasses creating response plans, training staff, implementing security controls, and ensuring tools are ready. IR: Preparation

Identifying potential security incidents through monitoring systems, alerts, and reports using various tools to spot anomalies or suspicious activities indicating breaches. IR: Detection

Examine detected incidents to assess scope, impact, and nature by gathering evidence, reviewing system logs, and determining compromise extent to guide responses. IR: Analysis

Immediate actions to prevent an incident from spreading, including isolating affected systems, blocking malicious activity, and implementing security measures. IR: Containment

Removing threats from the environment by eliminating the root causes. This includes eradicating malware, closing security gaps, and addressing exploited vulnerabilities. IR: Eradication

Restoring systems and data to normal, fully functional state (availability restoration, data recovery, testing, and ensuring security and proper functionality). IR: Recovery

The post-incident review phase involves analyzing the response process, documenting findings, and implementing improvements to prevent similar incidents. This includes updating procedures, enhancing controls, and adjusting training. IR: Lessons Learned

Educating staff on security awareness, incident response roles, and procedures. This includes technical and procedural training for effective responses. IR: Training

A structured session where team members discuss simulated security scenarios to validate plans and procedures without affecting systems. Tabletop Exercise

A practical exercise simulating real security incidents for teams to practice responses, including technical, communication, and decision-making processes. Simulation

A systematic investigation of incidents to uncover underlying causes, preventing recurrence by addressing fundamental issues. Root Cause Analysis

Proactively search networks and systems to detect advanced threats evading security solutions, using various tools and techniques for potential compromise identification. Threat Hunting

Collecting, preserving, analyzing, and presenting digital evidence legally, involving technical and procedural aspects of investigating systems. Digital Forensics

Preserve all forms of relevant evidence when litigation is anticipated to prevent destruction or alteration. Legal Hold

Track and document evidence from collection to disposition, ensuring its integrity and legal admissibility. Chain of Custody

Creating a precise digital replica of electronic evidence in a forensically stable way. This method preserves the integrity of the original evidence, facilitating thorough analysis. Acquisition

Recording observations, methods, and outcomes from security incidents or forensic investigations. This encompasses technical specifics, event timelines, and suggestions for future enhancements. Reporting

Securing and protecting digital evidence from alteration, damage, or loss through physical and digital measures that maintain integrity. Preservation

Identifying, gathering, and collecting electronically stored information for legal proceedings. This encompasses emails, documents, databases, and other digital assets pertinent to legal issues. E-discovery

Firewall logs record network traffic, detailing source and destination IP addresses, used ports, employed protocols, and whether traffic was allowed or denied. They are essential for monitoring security and investigating incidents. Firewall Log

Software applications generate logs documenting user activities, system events, and application behavior. These logs capture vital information like user login attempts, application errors, data access requests, and usage patterns. They are crucial for troubleshooting and monitoring security incidents. Application Log

Records from computers, servers, and mobile devices log local activities like software installations and system changes. They are essential for understanding device activities in a network and identifying potential security threats. Endpoint Log

Specialized records focus on security events in an operating system, capturing critical information like user authentication attempts, privilege escalations, security policy changes, and system file modifications. They are essential for security monitoring and compliance. OS-specific Security Logs

Specialized security records document potential threats and attacks. They log detected patterns, blocked activities, severity of threats, and automated responses by the system. IPS/IDS Log

Records of activities in network infrastructure, documenting router/switch operations, DHCP assignments, DNS queries, and network performance metrics. They are vital for ensuring network health and investigating security incidents. Network Traffic Log

Contextual information regarding additional data sets that includes details like file creation times, modification dates, file sizes, authorship, and access permissions. Metadata

Systematic scans of devices and applications reveal security weaknesses, generating reports on vulnerabilities, missing patches, misconfigurations, and potential risks for attackers. Vulnerability Scans

Generated documents provide regular updates on system security, compliance, and performance metrics. They compile data from various tools for insights into an organization's security posture. Automated Reports

Visual interfaces show real-time security metrics in an easy-to-digest format, including key indicators, active alerts, and system status for quick decision-making and response to events. Dashboards

Network traffic recordings at the packet level offer detailed insights into communications, including content, protocol information, and timing. Packet Captures

Creating or removing user accounts and access rights in an information system. Provisioning/de-provisioning user accounts

Allocating access rights to users or groups defines their resource access and permitted actions. Permission assignments

The act of confirming an individual's identity by examining documentation, biometric information, or alternative verification techniques. Identity proofing

A system that allows users to access multiple applications or services using a single set of credentials across different organizations or domains. Federation

An authentication method allowing users to log in once and access various applications without needing to re-enter credentials. Single sign-on (SSO)

A protocol used for accessing and maintaining directory services over an IP network, commonly used for centralized authentication and authorization. Lightweight Directory Access Protocol (LDAP)

A protocol that allows applications to securely access data from other applications without sharing password credentials. Open authorization (OAuth)

An XML-based standard for exchanging authentication and authorization data between parties, particularly for web browser single sign-on. Security Assertions Markup Language (SAML)

The capacity of various systems, devices, or applications to share and utilize information with easy. Interoperability

The process of providing evidence that a system or component is genuine and unaltered, often used in trusted computing. Attestation

A security model where access rights are determined by system administrators based on security clearance levels and data classification. Mandatory access controls

An access control model where the owner of a resource determines who can access it and what privileges they have. Discretionary access controls

A method where access rights are assigned based on users' roles within an organization. Role-based access control

Access control determined by a set of rules or policies that evaluate conditions before granting access. Rule-based access control

Access control that uses various attributes (user properties, resource properties, environmental conditions) to determine access rights. Attribute-based access control

Access controls that limit system or resource access to specific time periods. Time-of-day restrictions

A security principle requiring users to have only the minimum access rights necessary to perform their job functions. Least privilege

A security system that mandates two or more verification methods from distinct categories for access approval. Multifactor authentication

Authentication using unique physical or behavioral characteristics like fingerprints, facial recognition, or voice patterns. Biometrics

Physical or digital devices that generate temporary codes for authentication purposes. Authentication tokens

Physical devices for authentication that employ cryptographic protocols. Security keys

Guidelines for creating and managing strong passwords, including length requirements, complexity rules, and regular rotation. Password best practices

Applications that securely store, generate, and manage multiple complex passwords for users. Password managers

Authentication methods that verify identity without requiring traditional passwords, often using biometrics or security keys. Passwordless authentication

Access rights granted only when needed and automatically revoked after use. Just-in-time permissions

Secure storage systems for managing and protecting privileged account credentials. Password vaulting

Temporary access credentials that automatically expire after a short period or single use. Ephemeral credentials

Security policies configured in a firewall that determine which network traffic is allowed or blocked based on specified criteria. Firewall Rules

Lists of permissions that control which users or systems can access specific network resources or services. Access Lists

Communication endpoints and standardized methods that applications use to exchange data across networks. Ports/Protocols

Network segments (also called DMZs) that act as a buffer zone between trusted internal networks and untrusted external networks. Screened Subnets

Security systems that monitor network traffic for suspicious activity (IDS) and can automatically take action to prevent threats (IPS). IDS/IPS

Network behavior patterns or security events indicating emerging threats. Trends

Specific patterns of network traffic or system behavior that match known security threats or malicious activities. Signatures

A security tool that controls access to web content by blocking malicious or unauthorized websites and content. Web Filter

Security solutions that require software installation on individual endpoints to monitor and control their activities. Agent-based

A server that acts as an intermediary between internal users and the internet, providing security filtering and caching. Centralized Proxy

Analyzing web addresses to block malicious sites. URL Scanning

The classification of web content into categories (like gambling, social media, or adult content) for filtering purposes. Content Categorization

Policies that define what types of content, websites, or network traffic should be prevented from accessing the network. Block Rules

A scoring system that rates the trustworthiness of websites, IP addresses, or email senders based on their historical behavior. Reputation

Features that protect the OS from unauthorized access and threats. Operating System Security

A Windows feature that enables centralized management and configuration of operating systems, applications, and user settings. Group Policy

Security-Enhanced Linux can enforce strict mandatory access control for Linux systems. SELinux

Standardized methods of network communication that incorporate encryption and other security measures. Secure Protocols

A security measure that blocks access to malicious domains by filtering DNS queries. DNS Filtering

Technologies and practices designed to protect email systems from unauthorized access, spam, and malware. Email Security

An email authentication protocol that helps prevent email spoofing by specifying how to handle messages that fail authentication. DMARC

A security standard that adds a digital signature to emails to verify they were sent by an authorized sender. DKIM

An email authentication method that specifies which mail servers are authorized to send email for a domain. SPF

A security appliance or service that filters incoming and outgoing email traffic for threats. Email Gateway

A security process that monitors and validates the integrity of operating system and application files. File Integrity Monitoring

Data Loss Prevention - technology that detects and prevents unauthorized transmission of sensitive information. DLP

A security approach that enforces policy on devices before allowing them to access a network. Network Access Control

Security tools that monitor endpoints for threats (EDR) and provide extended detection and response across multiple security layers (XDR). EDR/XDR

The process of tracking and analyzing user actions to detect abnormal behavior that might indicate security threats. User Behavior Analytics

The continuous observation and analysis of computer systems' performance, health, and security status to detect issues or threats. Systems Monitoring

The tracking of application behavior, performance, and security events to ensure proper functionality and detect suspicious activities. Applications Monitoring

The surveillance of network devices, servers, and other IT infrastructure components to maintain security and operational efficiency. Infrastructure Monitoring

The process of collecting and centralizing log data from multiple sources for unified analysis and threat detection. Log Aggregation

The isolation of suspicious or compromised systems, files, or network segments to prevent threat spread. Quarantine

The adjustment of alert rules and thresholds to reduce false positives and improve detection accuracy. Alert Tuning

A standardized approach for maintaining system security through automated vulnerability management and security compliance. SCAP

Standardized security configuration guidelines used to assess and improve system security posture. Benchmarks

Software components installed on monitored systems to collect and report security data. Agents

Security monitoring that collects data without requiring software installation on target systems. Agentless Monitoring

A system that collects, analyzes, and correlates security event data from multiple sources to detect and respond to threats. SIEM

Software to detect and remove malicious code. Antivirus

Technology that monitors and prevents unauthorized transmission or access to sensitive data. DLP

Automated alerts sent by network devices to management systems when specific events or conditions occur. SNMP Traps

A network protocol that collects IP traffic information to monitor network flow and detect anomalies. NetFlow

Tools that identify and assess security weaknesses in systems, networks, and applications. Vulnerability Scanners

A systematic process of identifying security weaknesses in systems and networks using automated tools. Vulnerability Scan

Security testing of application source code without executing the program to find potential vulnerabilities. Static Analysis

Security testing of running applications to identify vulnerabilities in their operational state. Dynamic Analysis

Tracking and analyzing software dependencies and libraries for known security vulnerabilities. Package Monitoring

A stream of threat intelligence about current security threats and indicators of compromise. Threat Feed

The collection and analysis of security-related information from publicly available sources. OSINT

Commercial or private threat intelligence services that provide curated security information. Proprietary/Third-party Feeds

Groups that enable the sharing of threat intelligence across different organizations and sectors. Information-sharing Organization

Surveillance of dark web activities to identify potential threats or leaked organizational data. Dark Web Monitoring

Authorized simulated attacks on systems to identify and validate security vulnerabilities. Penetration Testing

A formal process for security researchers to report vulnerabilities to organizations. Responsible Disclosure Program

A program offering rewards to security researchers for finding and reporting security vulnerabilities. Bug Bounty Program

A formal examination of systems and processes to verify security controls and compliance. System/Process Audit

An alert or finding that incorrectly indicates a security issue exists. False Positive

A failure to detect an actual security issue or vulnerability. False Negative

The process of ranking vulnerabilities based on their potential impact and likelihood of exploitation. Prioritization

A standardized scoring system for rating the severity of security vulnerabilities. CVSS

A system for identifying and cataloging known cybersecurity vulnerabilities. CVE

The categorization of vulnerabilities based on their type, severity, and potential impact. Vulnerability Classification

The percentage of an asset that would be lost if a specific threat successfully exploits a vulnerability. Exposure Factor

Local factors that affect the severity or likelihood of vulnerability exploitation. Environmental Variables

The potential effect of a vulnerability on specific business sectors or organization types. Industry/Organizational Impact

The level of risk an organization is willing to accept in pursuit of its objectives. Risk Tolerance

The standardized procedures for evaluating, purchasing, and implementing new assets while ensuring security requirements are met. Acquisition

The process of allocating and documenting responsibility for organizational assets to specific individuals or departments. Asset Assignment

The tracking and management of asset value, depreciation, and total cost of ownership throughout its lifecycle. Asset Accounting

The designation of individuals or groups responsible for maintaining and securing specific assets. Asset Ownership

The categorization of assets based on their sensitivity, value, and criticality to the organization. Asset Classification

The continuous tracking of asset location, status, and usage to maintain security and compliance. Asset Monitoring

A comprehensive list of all organizational assets, including hardware, software, and data resources. Asset Inventory

The systematic identification and cataloging of assets on a network or within an organization. Asset Enumeration

The process of removing assets from service while ensuring security and compliance requirements are met. Disposal

The systematic removal of an asset from active service, including proper data handling and documentation. Decommissioning

The process of removing sensitive data from storage media so it cannot be recovered. Sanitization

The physical destruction of assets to prevent data recovery or unauthorized reuse. Destruction

Documentation verifying that asset disposal was performed according to security and compliance requirements. Asset Certification

Policies and procedures governing how long different types of data must be kept before disposal. Data Retention

Portable computing devices like smartphones and tablets requiring specific security controls and management. Mobile Devices

Individual computer systems used by employees, requiring endpoint protection and security policies. Workstations

Network devices that connect and manage traffic between devices on a local network segment. Switches

Network devices that direct traffic between different networks and implement security policies. Routers

Virtual computing resources hosted by third-party providers requiring specific security considerations. Cloud Infrastructure

Dedicated computers that provide services to other devices while requiring robust security measures. Servers

Industrial Control Systems that manage physical processes, requiring specialized security approaches. ICS/SCADA

Purpose-built computing systems with integrated hardware and software requiring security hardening. Embedded Systems

Real-Time Operating Systems used in time-critical applications with specific security requirements. RTOS

Internet-connected devices requiring security controls to prevent unauthorized access and exploitation. IoT Devices

Physical inspections to determine optimal wireless access point placement and coverage. Site Surveys

Visual representations of wireless signal strength used for optimal network coverage planning. Heat Maps

Mobile Device Management systems enforce security policies on mobile devices. MDM

Policy allowing employees to use personal devices for work with application of security controls by policy or agent. BYOD

Corporate-owned devices that allow personal use within security boundaries. COPE

Policy where employees select from approved device options meeting security requirements. CYOD

Protection measures for mobile devices connecting via cellular networks. Cellular Security

Protocols and measures protecting wireless network communications. Wi-Fi Security

Controls protecting short-range wireless communications between devices. Bluetooth Security

The latest Wi-Fi security protocol providing enhanced encryption and protection. WPA3

Authentication, Authorization, and Accounting services for network access control. AAA/RADIUS

Standards for securing wireless communications through encryption. Cryptographic Protocols

Methods for verifying the identity of devices and users in wireless networks. Authentication Protocols

Security checks that verify data input meets expected formats and criteria. Input Validation

Web browser data storage with security controls to prevent unauthorized access. Secure Cookies

Automated testing of application source code for security vulnerabilities. Static Code Analysis

Digital signing of applications to verify their authenticity and integrity. Code Signing

Isolation of applications or processes to contain potential security threats. Sandboxing

Continuous observation of device and network activity for security issues. Security Monitoring

Formal document defining appropriate use of organizational IT resources and consequences of violations Acceptable use policy

Core documents establishing organization's approach to protecting information assets Information security policies

Policies defining how organization maintains essential functions during disruptions Business continuity

Policies specifying procedures to restore IT operations after major incidents Disaster recovery

Policies outlining how organization detects, responds to, and recovers from security incidents Incident response

Policies governing security requirements throughout application development process Software development lifecycle

Rules governing how changes to systems and infrastructure are proposed, approved, and implemented Change management policy

Technical requirements for password creation, complexity, and management Password standards

Specifications for implementing and maintaining access controls across systems Access control standards

Requirements for securing facilities, equipment, and physical assets Physical security standards

Technical specifications for implementing cryptographic controls Encryption standards

Step-by-step processes for implementing and documenting system changes Change management procedures

Detailed steps for granting new users appropriate system access and security training Onboarding procedures

Steps for removing access and securing assets when users leave organization Offboarding procedures

Documented procedures for responding to specific security incidents or scenarios Playbooks

Security requirements imposed by government regulations like HIPAA or GDPR Regulatory considerations

Security obligations arising from laws, contracts, and liability concerns Legal considerations

Security requirements specific to business sector or industry standards Industry considerations

Security requirements from local or regional authorities Local/regional considerations

Security requirements imposed by national governments or standards National considerations

International security requirements affecting multinational operations Global considerations

Process of reviewing and updating security policies to maintain effectiveness Monitoring and revision

Governance bodies providing high-level security oversight and strategy Boards

Groups responsible for specific aspects of security governance Committees

Official bodies that create and potentially enforce security regulations Government entities

Security decision-making concentrated in single authority Centralized governance

Security decision-making distributed across multiple units or locations Decentralized governance

Individuals or entities with ultimate responsibility for data assets Data owners

Entities determining purposes and means of processing personal data Data controllers

Entities processing data on behalf of controllers Data processors

Personnel responsible for implementing security controls and maintaining data Data custodians

Individuals ensuring data quality and policy compliance in their areas Data stewards

Process of discovering and documenting potential security threats and vulnerabilities to an organization Risk identification

Risk evaluation performed as needed in response to specific events or concerns Ad hoc assessment

Regular, scheduled risk evaluations performed at defined intervals Recurring assessment

Single risk evaluation performed for a specific purpose or project One-time assessment

Ongoing, real-time monitoring and evaluation of risks Continuous assessment

Risk evaluation based on subjective ratings (e.g., high/medium/low) and expert judgment Qualitative analysis

Risk evaluation using numerical values and statistical methods to calculate potential losses Quantitative analysis

Expected monetary loss from a single occurrence of a risk event Single loss expectancy

Expected yearly monetary loss from risk events (SLE × ARO) Annualized loss expectancy

Expected frequency of a risk event occurring within one year Annualized rate of occurrence

Statistical likelihood of a risk event occurring Probability

Estimated chance of a risk occurring based on historical data and current conditions Likelihood

Percentage of asset value likely to be lost if a risk event occurs Exposure factor

Magnitude of harm that could result from a risk event Impact

Documented inventory of identified risks, their characteristics, and response plans Risk register

Metrics used to monitor risk levels and trigger responses Key risk indicators

Individuals or groups responsible for managing specific risks Risk owners

Maximum level of risk an organization is willing to accept before taking action Risk threshold

Amount of risk an organization can handle while still achieving objectives Risk tolerance

Willingness to accept higher risks for potential greater returns Expansionary risk appetite

Preference for lower risks even if it means reduced potential returns Conservative risk appetite

Balanced approach to risk-taking based on careful cost-benefit analysis Neutral risk appetite

Moving (or transferring) risk to another party through insurance or contracts Risk transfer

Conscious decision to take no action or no further action against a known risk. Accepting the controls in place, if any. Risk acceptance

Formal approval to operate outside normal risk parameters temporarily Risk exemption

Documented deviation from standard risk management procedures Risk exception

Eliminating risk by avoiding activities that could cause it Risk avoidance

Implementing controls to reduce probability or impact of risks Risk mitigation

Regular communication of risk status to stakeholders Risk reporting

Assessment of how disruptions affect critical business functions Business impact analysis

Maximum acceptable time to restore business function after disruption RTO: Recovery time objective

Maximum acceptable data loss measured in time before disruption RPO: Recovery point objective

Average time required to fix a failed system MTTR: Mean time to repair

Average time between system failures under normal operation MTBF: Mean time between failures

Authorized simulated attacks to evaluate vendor's security controls and identify vulnerabilities Penetration testing

Contract provision allowing customer to examine vendor's security controls and practices Right-to-audit clause

Documentation proving vendor conducts regular security self-assessments Evidence of internal audits

Security evaluations of vendor performed by qualified third-party organizations Independent assessments

Evaluation of security risks in vendor's entire supply and delivery network Supply chain analysis

Comprehensive investigation of vendor's security practices before establishing business relationship Due diligence

Situation where vendor's other business relationships could compromise security obligations Conflict of interest

Contract defining specific performance metrics and security requirements vendor must meet Service-level agreement

Binding document outlining security responsibilities between organizations Memorandum of agreement

Non-binding document describing security expectations between organizations Memorandum of understanding

Primary contract establishing overall terms for security and business relationship Master service agreement

Document specifying security requirements for specific tasks or projects Work order

Detailed document defining security deliverables, timelines, and requirements for specific project Statement of work

Legal contract requiring parties to protect confidential information shared between them Non-disclosure agreement

Contract defining security obligations in ongoing business relationship Business partners agreement

Comprehensive evaluation of vendor's security capabilities, risks, and compliance Vendor assessment

Assessment of security risks throughout vendor's supplier and delivery network Supply chain analysis

Documentation and communication of compliance status to organization's leadership and stakeholders Internal compliance reporting

Required reporting of compliance status to regulators, auditors, or other outside authorities External compliance reporting

Monetary penalties imposed for failing to meet compliance requirements Fines

Official penalties or restrictions imposed for compliance violations Sanctions

Harm to organization's public image and trustworthiness due to compliance failures Reputational damage

Revocation of authority to conduct business due to severe compliance violations Loss of license

Penalties or contract terminations resulting from compliance failures Contractual impacts

Reasonable steps taken to ensure and maintain compliance with requirements Due diligence

Demonstrating prudent actions to meet compliance obligations Due care

Formal declaration that compliance requirements are being met Attestation

Documented recognition of compliance responsibilities Acknowledgement

The organization's internal methods for monitoring compliance status Internal monitoring

Third-party oversight of compliance activities by a trusted and knowledgable service auditor External monitoring

Using technology to automatically track, report, and enforce compliance Compliance automation

Privacy requirements specific to city or regional jurisdiction Local privacy laws

Privacy requirements enforced at country level National privacy laws

International privacy requirements affecting cross-border operations Global privacy laws

Individual whose personal data is being collected or processed Data subject

Entity that determines purposes and means of processing personal data Data controller

Entity that processes personal data on behalf of the controller Data processor

Rights and responsibilities regarding collected personal information Data ownership

Comprehensive catalog of what personal data is collected and stored Data inventory

Rules governing how long personal data can be kept Data retention

Individual's right to have personal data erased upon request Right to be forgotten

Formal verification of security controls by organization's own personnel or departments Internal attestation

Documentation certifying adherence to specific security requirements or standards Compliance attestation

Internal group responsible for overseeing security audits and attestation processes Audit committee

Organization's internal evaluation of its security controls and compliance status Self-assessments

Verification of security controls by outside organizations or authorities External attestation

Official review of security controls by government or regulatory bodies Regulatory examination

Systematic evaluation of security controls against defined criteria Assessment

Security evaluation conducted by neutral external organization Independent third-party audit

Testing physical security controls through attempted facility access Physical penetration testing

Actively attempting to exploit security vulnerabilities to assess defenses Offensive penetration testing

Testing organization's ability to detect and respond to attacks Defensive penetration testing

Combined testing of physical, technical, and procedural security controls Integrated penetration testing

Penetration testing with full knowledge of target environment Known environment testing

Testing with limited information about target environment (grey box) Partially known testing

Testing without prior knowledge of target environment (black box) Unknown environment testing

Gathering target information without direct interaction (e.g., public records) Passive reconnaissance

Direct probing of target systems to gather security information Active reconnaissance

Results and recommendations from security assessments or audits Audit findings

Defined boundaries and limitations of security testing activities Testing scope

Structured approach and procedures used in security testing Testing methodology

Agreed-upon guidelines and restrictions for penetration testing Rules of engagement

Documentation of security testing processes and results Evidence collection

Confirming that identified security issues have been properly fixed Remediation verification



robot