This model, abbreviated OSI, refers to ways different computer systems exchange data across a network.
What is the Open Systems Interconnection Model?
This model, abbreviated ATT&CK, was founded by MITRE in 2013 and provides a framework for deconstructing & classifying stages of cyber attacks.
What is the Adversarial Tactics, Techniques, & Common Knowledge project?
This protocol suite is the most commonly used to create VPNs.
What is IPSec (Internet Protocol Security)?
This list, abbreviated CVE, is a list of records for publicly known cybersecurity vulnerabilities.
What is the Common Vulnerabilities and Exposures list?
This layer passes traffic using only MAC addresses.
What is layer 2?
The ATT&CK model is commonly compared to this model, developed by Lockheed Martin in 2011.
What is the Cyber Kill Chain? (Comparison: https://www.varonis.com/blog/mitre-attck-framework-complete-guide/#mackc)
This protocol (ISAKMP) is used to establish Security Associations (SAs) in phase of of IPSec VPNs.
What is the Internet Security Association and Key Management Protocol?
This database, managed by NIST, is fed by the MITRE CVE list and provides more detailed information for vulnerabilities.
What is the National Vulnerability Database?
SSL evolved to provide security for this layer of the OSI model.
What is the transport layer (layer 4)?
The ATT&CK model is mostly concerned with defining these, aka TTPs, instead of a specific order of attack.
What are Tactics, Techniques, and Procedures?
This protocol (IKE) is used to pass PSKs between systems during phase one in an IPSec VPN setup.
What is the Internet Key Exchange protocol?
This scoring system, referenced by CVE and NVD, classifies vulnerabilities into low, medium, high, and critical ratings.
What is the CVSS (Common Vulnerability Scoring System)?
This layer, jokingly referred to as "layer 8," refers to IT issues created by users or management.
What is the "user" or "political" layer?
This format, abbreviated STIX, is a language and serialization format used to exchange cyber threat intelligence.
What is the Structured Threat Information Expression? (https://oasis-open.github.io/cti-documentation/)
This protocol (ESP) provides confidentiality, integrity, and data-origin authentication within phase two.
What is the Encapsulating Security Protocol?
Vulnerabilities with a CVSS score of 4.0-6.9 are flagged with this severity level in both CVSS 2.0 and 3.0.
What is "Medium"?
The OSI model is often compared to this similar 4-layer model.
What is the TCP/IP model or Internet Protocol suite?
These three matrices of ATT&CK are similar in format, but provide customizations for each distinct category of devices.
What are the Enterprise, Mobile, and ICS matrices?
This task force formed the IP Security Working Group in 1992, which standardized IPSec as RFC1825.
What is the Internet Engineering Task Force?
This entity commonly reserves CVE numbers in blocks of 500 for future bugs discovered in its operating system.
Who is Red Hat?