Threat Data and Intel
Attacks
Infrastructure Solutions
Vulnerability management
Misc
100

Term for malware that is available to be purchased on dark web

Commodity Malware

100

The acting of attempting to run an SQL command in an input field

SQLi (Injection)

100

Tool that combines security data from separate sources into an integrated and centralized dashboard

Single Pane of Glass

100

The act of correcting or plugging a vulnerability found during an assessment

Patching or Updating

100

Term for clues and evidence of a data breach

IoC (Indicators of Compromise)

200

A process created by Lockheed Martin that identifies what steps an adversary must complete in order to achieve their objective.

Cyber Kill Chain


200

Add a hidden malware or page overlay onto web site to execute covert code when you click an icon

Clickjacking

200

Used in place of virtualization and allows for an application to be packaged completely with all support files and ran in isolated environments

Containerization 

200

The CVSS Score Metric PR value that is detrimental to the target (/N, /L, or /H)

None (/N)

200

XDR

Extended Endpoint Detection and Response

300

A knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary's attack lifecycle

Mitre ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge)

300

Occurs when the amount of data in RAM exceeds its storage capacity and spills out into adjacent memory locations 

Buffer Overflow

300

Cloud Infrastructure tool specifically designed to assess AWS cloud resources

Prowler or PACU

300

Protocol standard commonly used to uphold internal and external compliance requirements by adhering to standard processes, results reporting, scoring, and vulnerability prioritization.

SCAP Security Content Automation Protocol

300

developing the data you currently have to make it more valuable

Data enrichment

400

Proactive process to discover threats that have not been identified by standard monitoring and alerting mechanisms

Threat hunting

400

Method of taking over a web user communication by obtaining the SID from a cookie and masquerading as the authorized user

Session hijacking

400

A component installed in a CPU to allow for dynamic and real-time reprogramming of the chip

eFuse

400

Term for when an automated scan is ran on a web server and does not alert to a vulnerability that does exist

False negative

400

Testing type to ensure that the functionality of a new app is appropriate for all users

UAT (User acceptance testing)

500

Protocol and Application Programming Interface (API) for transferring STIX format information securely

TAXII (Trusted Automated eXchange of Indicator Information)

*STIX is the message, TAXII the vehicle for delivery 

500

Client-side attack that injects a malicious script into a web browser, taking advantage of the browser-website trust

Cross-Site Script (XSS)

500

A specialized internal communications network that interconnects components in a vehicle

CAN BUS (Controller Area Network)

500

The CVSS Score metric C value that is the most detrimental to a target (/H, /L, or /N)

High (/H)

500

The idea that a country or jurisdiction has the authority and right to govern and control the data stored within its borders

Data sovereignty