Rosie the Cat
Acronyms
Random
2 Random 2 Furious
Random 3: The Randoming
100

This type of malware disguises itself as legitimate software to gain unauthorized access to a system

What is a trojan

100

PII 

What is personally identifiable information

100

A team that acts as the attacking force.

What is Red team?

100

This type of attack involves intercepting andaltering communications between two parties

What is an on-path attack (MITM)

100

Acts as the network defense team

What is the blue team?

200

This security approach ensures that even if one layer of defense fails, additional controls are in place to mitigate the risk

Defense-in-depth

200

APT

What is advanced persistent threat

200

This principle ensures that users only have the minimum access required to perform their job

What is the principle of least privilege
200

Policies, procedures, and work practices that help or prevent a threat or make a threat more likely.

What are operational controls?

200

The third phase of incident response.

What is containment?

300

Places malware where it is safe to interact with and investigate attack methods and malware operation

What are sandbox environments

300

ACL

What is access control list

300

Client-side attack that injects a malicious script into a web browser, taking advantage of the browser-website trust

What is cross-site scripting (XSS) attack

300

Controls implemented with technology and include items such as firewalls,access lists, permissions on files or folders, and devices that identify and prevent threats.

What are technical controls?

300

This type of attack uses usernames and passwords harvested from data breaches and attempts to enter these in other sites

What is credential stuffing

400

This method of threat detection identifies unusual patterns in system behavior rather than relying on known attack signatures

What is anomaly-based detection

400

ARO

What is the annual rate of occurrence

400

A log analysis technique that detects anomalies based on predefined patterns

What is signature-based detection

400

This type of security control detects and blocks malicious traffic before it enters the internal network

What is intrusion prevention system (IPS)

400

Type of encryption algorithm in which the encryption key is the same as the decryption key

What is symmetric encryption

500

The principle that assumes a network is always at risk and requires continuous verification

What is zero-trust

500

BCP

What is business continuity plan

500

Taking a large document or file and with use of an algorithm, reducing the file to a character string that can be used to verify the integrity of the file.

What is Hashing?

500

This attack exploits the trust relationship between two systems, allowing attackers to send unauthorized requests or commands

What is cross-site request forgery (XSRF)

500

This type of attack occurs when data overwrites adjacent memory, potentially allowing an attacker to execute arbitrary code

What is a buffer overflow attack