Command that searches for lines that contain strings that match a pattern
Bw
Grep
Command line tool that displays open ports on host
CD
Nmap
Security solution that coordinates, executes, and automates tasks between various security tools and systems
SOAR
Uses cyber weapons to promote a political agenda
GA
Hacktivist
It provides a central console where you can view data and manage all data sources with the click of a button. Everyone can see the same console.
GW
Single Pain of Glass
Command that prints the first 10 lines of the specified file
RK
Head
GUI tool that displays open ports on a host
LA
Zenmap
Collection and analysis of data gathered from open sources to produce actionable intelligence
OR
OSINT Open Source Intelligence
Threat actors whose activities lead to increased risk as a result of their privileged access or employment
FL
Insider threat
Collects, stores, analyzes, and dispatches log messages from devices such as routers, switches, firewalls, Linux/Unix hosts, and Windows machines
MN
Syslog
3 basic Linux permissions
AG
Read, write, and execute
Industry-standard method for assessing the severity of vulnerabilities
DE
CVSS Common Vulnerability Score System
Facility that houses an information security team responsible for monitoring and analyzing an organization’s security posture on an ongoing basis
ER
SOC Security Operations Center
Goals are primarily espionage, strategic advantage, and commercial gains. APT
BB
Nation states
Ecommerce security standard
OK
PCI-DSS
Command that reads data from the file and gives their content as output.
TS
Cat
A network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools. George likes it
AZ
Nessus
Data that indicates a system may have been infiltrated by a cyber threat
PB
IoC Indicators of Compromise
Uses scripts obtained on dark web
WV
Script Kiddie
Command-line packet capture utility for Linux
CR
Tcpdump
Command to change permissions on Linux
SU
Chmod
Open source vulnerability scanner maintained by Greenbone Networks. George hates it
TX
OpenVAS
A solution that helps organizations detect, analyze, and respond to security threats before they harm business operations
SO
SIEM Security Information and Event Management
Criminal profit, but typical activities are financial fraud (both against individuals and companies) and blackmail
NY
Organized crime
GUI packet capture tool
XS
Wireshark