Threat Data and Intel
Misc
Attacks
Sec solutions for infrastructure
Vulnerability management
100

Term for viruses, worms, adware/spyware, ransomware, and DDOS tools that are available to be purchased on dark web

Commodity Malware

100

What utility is this output coming from

Get-ChildItem -Path C:\ 


Powershell

100

Spoof some element of a web page by adding a hidden element or page overlay to get victim to click it

Clickjacking

100

Application or service that helps you securely control access to resources. You can centrally manage permissions that control which resources users can access. You use it to control who is authenticated (signed in) and authorized (has permissions) to use resources.

IAM Identity and Access Management

100

Testing type to ensure that the functionality of a new web app is appropriate for all users

User acceptance testing  UAT

200

A model created by Lockheed Martin for identification and prevention of cyber intrusions activity. The model identifies what the adversaries must complete in order to achieve their objective.

Kill Chain


reconnaissance, weaponization, delivery, exploitation, installation, command and control (C2), and actions on objectives

200

Term for clues and evidence of a data breach

IoC Indicators of Compromise 

200

Method of taking over a web user session by obtaining the session ID from a cookie and masquerading as the authorized user

Session hijacking

200

Dispenses with the idea of a hypervisor and instead enforces resource separation at the operating system level

Containerization 

200

Scanning type that probes the device's configuration using some sort of network connection with the targetIt consumes more network bandwidth and runs the risk of crashing the target

Active

300

A knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary's attack lifecycle and the platforms they are known to target. TTP( Tactics, Techniques and Procedures) 

(ATT&CK)  Adversarial Tactics, Techniques, and Common Knowledge

300

The idea that a country or jurisdiction has the authority and right to govern and control the data generated within its borders

Data sovereignty 

300

XSS attack type in which hacker injects malicious code into a data store on the server used by the trusted page

Persistant (stored) XSS

300

Tool you would use to prevent the exposure of PII in emails and file transfer

DLP (Data Loss Prevention)

300

A validated vulnerability tool that adheres to standard checklist for scanning processes, results reporting, scoring, and vulnerability prioritization. This protocol standard is commonly used to uphold internal and external compliance requirements.

SCAP Security Content Automation Protocol

400

Proactive process to discover threats that have not been identified by standard monitoring and alerting mechanisms

Threat hunting

400

Metric that measures how long it takes a cybersecurity team to identify a security incident

MTTD (Mean Time to Detect)

400

Occurs when the amount of data in the buffer exceeds its storage capacity. That extra data overflows into adjacent memory locations and corrupts or overwrites the data in those locations

Buffer overflow

400

A specialized internal communications network that interconnects components in a vehicle

CAN Controller Area Network

400

 Generates a score from 0 to 10 based on the severity of the vulnerability. A score of 0 means the vulnerability is less significant than the highest vulnerability with a score of 10

CVSS Common Vulnerability Scoring System 

500

Protocol and Application Programming Interface (API) for transferring STIX format CTI (cyber threat intelligence) over networks securely

(TAXII) Trusted Automated eXchange of Indicator Information 

500

Outputs a summary of RAM usage, including total, used, free, shared, and available memory and swap space on Linux

Free

500

XSS attack type in which hacker injects malicious code from the client browser in the context of a trusted page

Reflected XSS

500

Encrypted container for sensitive data inside of CPU or memory

Secure Enclave

500

Term for when a real vulnerability is overlooked by scanner

False negative