Threat actor that is not skilled and does it for fun
JK
Script Kiddie
The most basic form of firewall that is rule based.
RW
Stateless
A protocol that is used for file transfers using SSH for security
HS
SFTP
How CVE is scored
KH
CVSS Common Vulnerability Scoring System
A simpler form of encryption where the sender and receiver both have the same key. AES is this
DY
Symmetric
It occurs when the volume of data exceeds the storage capacity of the memory buffer.
RT
Buffer overflow
Specifically designed to filter HTTP and HTTPS traffic
NO
Web application firewall (WAF)
A protocol to authenticate in Active Directory
BS
Kerberos
An OS designed to have as close to zero latency as possible
SA
RTOS
Provide for message authenticity. Nonrepudiation
MG
Digital signature
APT threat actor
GD
Nation state
Network that functions as a subnetwork containing an organization's exposed, outward-facing services. It acts as the exposed point to an untrusted networks, commonly the Internet
PO
DMZ (Screened Subnet)
A protocol used to connect to a website secure
IW
HTTPS
A list of publicly known computer security flaws
ET
CVE Common Vulnerability and Exposure
Hiding secret data within an ordinary, non-secret, file or message in order to avoid detection
TX
Steganography
Injects script on end of URL to steal info
ML
XSS (Cross Site Script)
Cisco proprietary AAA server and protocol
MZ
TACACS+ Terminal Access Controller Access-Control System
Open standard AAA Server
MQ
RADIUS
A server that provides a single point of access from an external network to the resources located in a private network such as a data center
DS
Jumpbox
Current hash algorithm
LA
SHA Secure Hash Algorithm
Attack that compromises a third-party site that the threat actor knows is used by the target
BC
Waterhole attack
A device that is an appliance, server, or application that accepts requests for access to resources on other servers and then applies filters, caches data, or translates the data that is returned. Filters URLs
GF
Proxy
An encrypted program used for remote connections to a server using command line interface
PZ
SSH
Computing platforms are available through the cloud. You just supply the applications.
OY
PaaS
Encryption type commonly referred to as “public key cryptography” RSA is this
BD
Asymmetric (RSA)