Threats
Network components
Protocols
Security Misc
Cryptography
100

Threat actor that is not skilled and does it for fun



JK

Script Kiddie

100

The most basic form of firewall that is rule based.



RW

Stateless

100

A protocol that is used for file transfers using SSH for security


HS

SFTP 

100

The act of quarantining of a system from its network surroundings


KH

sandboxing

100

A simpler form of encryption where the sender and receiver both have the same key


DY

Symmetric

200

A form of self-spreading malware that exploits system and application vulnerabilities to move between systems.


RT

Worm

200

Specifically designed to filter HTTP and HTTPS traffic




NO

Web application firewall (WAF)

200

A protocol to authenticate in Active Directory


BS

Kerberos

200

An OS designed to have as close to zero latency as possible


SA

RTOS

200

Provide for message authenticity. Nonrepudiation


MG

Digital signature

300

APT threat actor


GD

Nation state

300

Network that functions as a subnetwork containing an organization's exposed, outward-facing services. It acts as the exposed point to an untrusted networks, commonly the Internet


PO

DMZ (Screened Subnet)

300

A protocol used to connect to a website secure


IW

HTTPS

300

A list of publicly known computer security flaws


ET

CVE Common Vulnerability and Exposure

300

Hiding secret data within an ordinary, non-secret, file or message in order to avoid detection


TX

Steganography

400

Injects script on end of URL to steal info 



ML

XSS (Cross Site Script)

400

Cisco proprietary AAA server and protocol 



MZ

TACACS+ Terminal Access Controller Access-Control System 

400

Open standard AAA Server


MQ

RADIUS

400

A server that provides a single point of access from an external network to the resources located in a private network such as a data center


DS

Jumpbox

400

The IEEE standard for wireless network security. Uses AES block cipher


LA

WPA2 or 3

500

Attack that compromises a third-party site that the threat actor knows is used by the target



BC

Waterhole attack

500

A device that is an appliance, server, or application that accepts requests for access to resources on other servers and then applies filters, caches data, or translates the data that is returned. Filters URLs


GF

Proxy

500

An encrypted program used for remote connections to a server using command line interface

PZ

SSH

500

Computing platforms are available through the cloud. You just supply the applications.


OY

PaaS

500

Encryption type commonly referred to as “public key cryptography”



BD

Asymmetric (RSA)