17
18
19
20
Acronyms
100

Browser mode in which all session data and cache is discarded and tracking protection features are enabled by default.

Private/incognito browsing mode

100

Software that illegally copies or imitates a commercial product or brand.

bootleg app

100

Remote access tool and protocol. ___ is the basis of macOS screen-sharing.

VNC Virtual Network Computing

100

Information sheet accompanying hazardous products or substances that explains the proper procedures for handling and disposal.

material safety data sheet (MSDS)

100

KB

knowledge base

200

Where a threat actor exploits an unlocked and unattended desktop or mobile device to gain unauthorized access.

lunchtime attack

200

Android app package format used when sideloading software from a source other than a trusted store.

.APK

200

3-2-1 backup rule

Best practice maxim stating that at any given time there should be at least three copies of data stored on two media types, with one copy held off site.

200

Process through which changes to the configuration of information systems are implemented as part of the organization's overall configuration management efforts.

Change management

200

 AUP

acceptable use policy

300

Malicious software program hidden within an innocuous-seeming piece of software. Usually, the Trojan is used to try to compromise the security of the target computer.

Trojans

300

Mobile device feature designed for testing apps during development that may weaken corporate security protections if misused.

developer mode

300

Procedures and guidelines covering appropriate priorities, actions, and responsibilities in the event of security incidents, divided into preparation, detection/analysis, containment, eradication/recovery, and post-incident stages.

incident response plan (IRP)

300

Documentation showing how network nodes are connected by cabling or how they are logically identified and connected, such as in IP networks.

network topology diagram

300

MSRA

Microsoft Remote Assistance

400

Installer package whose authenticity and integrity cannot be verified.

untrusted source

400


Removes the protective seal and any OS specific restrictions to give users greater control over the device.

Jailbreak

400

Extension for the PowerShell script format.

.PS1

400

Documentation of best practice and work instructions to use to perform a common administrative task.

standard operating procedure (SOP)

400

RMM

Remote monitoring and management  

500

Browser feature or extension that prevents sites from creating new browser windows.

Pop-up blockers

500

Gaining superuser level access over an Android-based mobile device.

Root access

500

Scripting language used to add interactivity to web pages and HTML-format email.

JavaScript

500

Database software designed to implement a structured support process by identifying each case with a unique job ticket ID and with descriptive fields to record how the issue was resolved.

ticketing system

500

RAT

remote access Trojan  

M
e
n
u