A vulnerability that allows an attacker to include files on a server through the web browser.
A framework for creating a secure method for exchanging information based on public key cryptography.
PID
A unique number used by operating systems to identify a process.
A type of vulnerability most often found on websites that allows an attacker to include a remote file, usually through a script on the web server.
Artifacts observed on a network or in an operating system that indicate a potential intrusion.
SAML
An open standard for exchanging authentication and authorization data between parties.
API
A set of protocols and tools for building software and applications
SDN
An approach to networking that uses software-based controllers to direct traffic on the network.
SLO
A key element of a service level agreement between a service provider and a customer.
SASE
A network architecture that combines wide-area networking and security functions.
STIX
A standardized language for representing cyber threat information.
A standard programming language for managing and manipulating databases.
CASB
Security policy enforcement points are placed between cloud service consumers and providers.
CVSS
A free and open industry standard for assessing the severity of computer system security vulnerabilities.
PAM
Tools and technology used to secure, control, and monitor access to an organization’s critical information and resources.
GPO
A feature of Windows that provides centralized management and configuration of operating systems, applications, and users’ settings.
UEBA
A cybersecurity process that uses machine learning to analyze user behavior and detect anomalies.
A reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it
XML
A markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable
XSS
A security vulnerability that allows an attacker to inject malicious scripts into content from otherwise trusted websites.
OSSTMM
A peer-reviewed methodology for performing security tests and metrics.
ARP
A protocol used to map an IP address to a physical machine address (MAC address).
C2
The set of organizational and technical capabilities that allow leaders to direct and control forces and operations.
An industrial digital computer used for automation of electromechanical processes.
A network of servers that deliver web content to users based on their geographic location.