Acronyms
Ports
Servers
Windows Hotkeys
Cyber Attacks
100

HTML

HyperText Markup Language

100

80

HTTP

100

Centralized location for data management commonly associated with tables and indexes

Database Server

100

Run

Windows + R

100

The attacker simply tries to guess the login credentials of someone with access to the target system

Brute Force

200

BIOS

Basic Input/Output System

200

443

HTTPS

200

Serves content to an internet browser by loading a file from a disk and serving it across the network to a user’s browser.

Web Server

200

Cut

CTRL + X

200

Overwhelming the resources of a system to the point where it is unable to reply to legitimate service requests

Denial of Service

300

RAID

Redundant Array of Inexpensive Disks or Redundant Array of Independent Disks

300

88

Kerberos

300

Assigns IP addresses to network interfaces

DHCP Server

300

Lock your Computer

Windows + L

300

Breaches in cybersecurity that make it possible for an attacker to eavesdrop on the data sent back and forth between two people, networks, or computers.

Man-in-the-Middle Attack

400

STIGs

Security Technical Implementation Guides

400

161

SNMP

400

Responds to authentication requests and verifies users

Domain Controller

400

Cycle through open applications

Alt + Tab

400

The most damaging Bluetooth attack; gaining the access to a cellular phone’s commands and persisted information

Bluebugging

500

API

Application Programming Interface

500

20

FTP

500

Sits between a client program and an external server to filter requests, improve performance, and share connections

Proxy Server

500

Task Manager

CTRL + SHIFT + ESC

500

The attacker transmits malicious scripts using clickable content that gets sent to the target’s browser

Cross-Site Scripting (XSS)

M
e
n
u