Kerberos
what is port 88
This network tool can sit at a network boundary and allow or block network traffic via various rulesets.
Firewall
SOC
What is Security Operation Center?
"SRC" on a iptables log indicates this bit of information.
What is Source?
This type of cyber threat takes advantage of a previously unknown security flaw in software, hardware or firmware which the developers had no clue that existed and have no patch for.
What is a zero-day?
445
what is Port SMB
A set of rules that dictates who can access a specific digital resource and what actions they can perform
What is Access control list.
DNS
This acronym represents the Destination port within the IPtables log format.
What is DPT?
This type of cyber threat is a cyberattack that overwhelms a target server, website, or network with massive amounts of malicious internet traffic from many compromised devices to make it unavailable for legitimate users, causing service disruptions and outages.
What is DDoS?
port 110
what is POP3
Provides signature-based detection via log and file system monitoring via and endpoint agents installed on devices.
What is HIDS?
SIEM
what is Security Information and Event management?
A device makes this type of request whenever it is trying to receive a resource for a remote web server. Be it page, or file.
what is "GET"?
This type of threat refers to a type of sophisticated and prolonged cyberattack in which an unauthorized actor gains access to a network and remains undetected for an extended period to steal sensitive data, conduct espionage, or sabotage systems.
What is APT?
L2TP
what is port 1701
A high-security identification method that scans and maps the unique, complex pattern of blood vessels at the back of your eye using a low-energy infrared light, converting this pattern into a digital code for authentication verification.
What is a Biometric retinal scan?
Or
What is retinal scan?
EUBA
this attack exploits web application flaws to access files and directories outside the intended web root, letting attackers read sensitive data, view source code, or even take control of the server by manipulating file paths with sequences like ../../../
What is a directory traversal attack?
This type of threat involves the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
What is phishing?
SFTP
what is port 22
A biometric technology that identifies or verifies a person based on their unique walking style, analyzing body shape, movement, and patterns like step length, speed, and stride, often using machine learning from video footage.
What is gait detection?
Iaas
what is Infrastructure as a Service.
A web server may respond with this HTTP response code if the server can not process the request due to server error or misconfiguration.
what is 500?
5xx
this type of threat actor can be a person who gains unauthorized access to computer files or networks in order to further social or political ends.
What is a hacktivist?