Threat actor that is not skilled and does it for fun
JK
Script Kiddie
The most basic form of firewall that is rule based.
RW
Stateless
A protocol that is used for file transfers using SSH for security
HS
SFTP
The act of quarantining of a system from its network surroundings
KH
sandboxing
A simpler form of encryption where the sender and receiver both have the same key
DY
Symmetric
A form of self-spreading malware that exploits system and application vulnerabilities to move between systems.
RT
Worm
Specifically designed to filter HTTP and HTTPS traffic
NO
Web application firewall (WAF)
A protocol to authenticate in Active Directory
BS
Kerberos
An OS designed to have as close to zero latency as possible
SA
RTOS
Provide for message authenticity. Nonrepudiation
MG
Digital signature
APT threat actor
GD
Nation state
Network that functions as a subnetwork containing an organization's exposed, outward-facing services. It acts as the exposed point to an untrusted networks, commonly the Internet
PO
DMZ (Screened Subnet)
A protocol used to connect to a website secure
IW
HTTPS
A list of publicly known computer security flaws
ET
CVE Common Vulnerability and Exposure
Hiding secret data within an ordinary, non-secret, file or message in order to avoid detection
TX
Steganography
Injects script on end of URL to steal info
ML
XSS (Cross Site Script)
Cisco proprietary AAA server and protocol
MZ
TACACS+ Terminal Access Controller Access-Control System
Open standard AAA Server
MQ
RADIUS
A server that provides a single point of access from an external network to the resources located in a private network such as a data center
DS
Jumpbox
The IEEE standard for wireless network security. Uses AES block cipher
LA
WPA2 or 3
Attack that compromises a third-party site that the threat actor knows is used by the target
BC
Waterhole attack
A device that is an appliance, server, or application that accepts requests for access to resources on other servers and then applies filters, caches data, or translates the data that is returned. Filters URLs
GF
Proxy
An encrypted program used for remote connections to a server using command line interface
PZ
SSH
Computing platforms are available through the cloud. You just supply the applications.
OY
PaaS
Encryption type commonly referred to as “public key cryptography”
BD
Asymmetric (RSA)