Linux commands
Vulnerability scanners
Random Acronyms
Threat Actor Types
Misc
100

Command that searches for lines that contain strings that match a pattern


Bw

Grep

100

Command line tool that displays open ports on host


CD

Nmap

100

Security solution that coordinates, executes, and automates tasks between various security tools and systems

SOAR

100

Uses cyber weapons to promote a political agenda



GA

Hacktivist

100

It provides a central console where you can view data and manage all data sources with the click of a button. Everyone can see the same console.


GW

Single Pain of Glass

200

Command that prints the first 10 lines of the specified file 


RK

Head

200

GUI tool that displays open ports on a host


LA

Zenmap

200

Collection and analysis of data gathered from open sources to produce actionable intelligence


OR

OSINT  Open Source Intelligence 

200

Threat actors whose activities lead to increased risk as a result of their privileged access or employment



FL

Insider threat

200

Collects, stores, analyzes, and dispatches log messages from devices such as routers, switches, firewalls, Linux/Unix hosts, and Windows machines


MN

Syslog

300

3 basic Linux permissions  


AG

Read, write, and execute

300

Industry-standard method for assessing the severity of vulnerabilities


DE

CVSS Common Vulnerability Score System

300

Facility that houses an information security team responsible for monitoring and analyzing an organization’s security posture on an ongoing basis


ER

SOC  Security Operations Center

300

Goals are primarily espionage, strategic advantage, and commercial gains. APT


BB

Nation states

300

Ecommerce security standard


OK

PCI-DSS

400

Command that reads data from the file and gives their content as output. 


TS

Cat

400

A network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools. George likes it


AZ

Nessus

400

Data that indicates a system may have been infiltrated by a cyber threat


PB

IoC  Indicators of Compromise

400

Uses scripts obtained on dark web


WV

Script Kiddie

400

Command-line packet capture utility for Linux



CR

Tcpdump

500

Command to change permissions on Linux



SU

Chmod

500

Open source vulnerability scanner maintained by Greenbone Networks. George hates it


TX

OpenVAS

500

A solution that helps organizations detect, analyze, and respond to security threats before they harm business operations


SO

SIEM  Security Information and Event Management 

500

Criminal profit, but typical activities are financial fraud (both against individuals and companies) and blackmail


NY


Organized crime

500

GUI packet capture tool


XS

Wireshark