Threat actor that is not skilled and does it for fun
Script Kiddie
The most basic form of firewall that is rule based.
Stateless
A protocol that is used for file transfers using SSH for security
SFTP
The act of quarantining of a system from its network surroundings
sandboxing
A simpler form of encryption where the sender and receiver both have the same key
Symmetric
A form of self-spreading malware that exploits system and application vulnerabilities to move between systems.
Worm
Specifically designed to filter HTTP and HTTPS traffic
Web application firewall (WAF)
A protocol used for securely browsing objects in an AD domain
LDAPS
An OS designed to have as close to zero latency as possible
RTOS
Provide for message authenticity. Nonrepudiation
Digital signature
APT threat actor
Nation state
Network that functions as a subnetwork containing an organization's exposed, outward-facing services. It acts as the exposed point to an untrusted networks, commonly the Internet
DMZ
A protocol used to connect to a website secure
HTTPS
A list of publicly known computer security flaws
CVE Common Vulnerability and Exposure
Hiding secret data within an ordinary, non-secret, file or message in order to avoid detection
Steganography
Injects script on end of URL to steal info
XSS (Cross Site Script)
Cisco proprietary AAA server and protocol
TACACS+ Terminal Access Controller Access-Control System
Open standard AAA Server
RADIUS
A server that provides a single point of access from an external network to the resources located in a private network such as a data center
Jumpbox
The IEEE standard for wireless network security. Uses AES block cipher
WPA2 or 3
Attack that compromises a third-party site that the threat actor knows is used by the target
Waterhole attack
A device that is an appliance, server, or application that accepts requests for access to resources on other servers and then applies filters, caches data, or translates the data that is returned.
Proxy
An encrypted program used for remote connections to a server using command line interface
SSH
Computing platforms are available through the cloud. You just supply the applications.
PaaS
Encryption type commonly referred to as “public key cryptography”
Asymmetric (RSA)