Threats
Network components
Protocols
Security Misc
Cryptography
100

Threat actor that is not skilled and does it for fun



JK

Script Kiddie

100

The most basic form of firewall that is rule based.



RW

Stateless

100

A protocol that is used for file transfers using SSH for security


HS

SFTP 

100

How CVE is scored


KH

CVSS Common Vulnerability Scoring System

100

A simpler form of encryption where the sender and receiver both have the same key. AES is this


DY

Symmetric

200

It occurs when the volume of data exceeds the storage capacity of the memory buffer.


RT

Buffer overflow

200

Specifically designed to filter HTTP and HTTPS traffic




NO

Web application firewall (WAF)

200

A protocol to authenticate in Active Directory


BS

Kerberos

200

An OS designed to have as close to zero latency as possible


SA

RTOS

200

Provide for message authenticity. Nonrepudiation


MG

Digital signature

300

APT threat actor


GD

Nation state

300

Network that functions as a subnetwork containing an organization's exposed, outward-facing services. It acts as the exposed point to an untrusted networks, commonly the Internet


PO

DMZ (Screened Subnet)

300

A protocol used to connect to a website secure


IW

HTTPS

300

A list of publicly known computer security flaws


ET

CVE Common Vulnerability and Exposure

300

Hiding secret data within an ordinary, non-secret, file or message in order to avoid detection


TX

Steganography

400

Injects script on end of URL to steal info 



ML

XSS (Cross Site Script)

400

Cisco proprietary AAA server and protocol 



MZ

TACACS+ Terminal Access Controller Access-Control System 

400

Open standard AAA Server


MQ

RADIUS

400

A server that provides a single point of access from an external network to the resources located in a private network such as a data center


DS

Jumpbox

400

Current hash algorithm 


LA

SHA Secure Hash Algorithm 

500

Attack that compromises a third-party site that the threat actor knows is used by the target



BC

Waterhole attack

500

A device that is an appliance, server, or application that accepts requests for access to resources on other servers and then applies filters, caches data, or translates the data that is returned. Filters URLs


GF

Proxy

500

An encrypted program used for remote connections to a server using command line interface

PZ

SSH

500

Computing platforms are available through the cloud. You just supply the applications.


OY

PaaS

500

Encryption type commonly referred to as “public key cryptography” RSA is this



BD

Asymmetric (RSA)

M
e
n
u