Threats
Network components
Protocols
Security Misc
Cryptography
100

Threat actor that is not skilled and does it for fun

Script Kiddie

100

The most basic form of firewall that is rule based.

Stateless

100

A protocol that is used for file transfers using SSH for security

SFTP 

100

The act of quarantining of a system from its network surroundings

sandboxing

100

A simpler form of encryption where the sender and receiver both have the same key

Symmetric

200

A form of self-spreading malware that exploits system and application vulnerabilities to move between systems.

Worm

200

Specifically designed to filter HTTP and HTTPS traffic

Web application firewall (WAF)

200

A protocol used for securely browsing objects in an AD domain 

LDAPS

200

An OS designed to have as close to zero latency as possible

RTOS

200

Provide for message authenticity. Nonrepudiation

Digital signature

300

APT threat actor

Nation state

300

Network that functions as a subnetwork containing an organization's exposed, outward-facing services. It acts as the exposed point to an untrusted networks, commonly the Internet

DMZ

300

A protocol used to connect to a website secure

HTTPS

300

A list of publicly known computer security flaws

CVE Common Vulnerability and Exposure

300

Hiding secret data within an ordinary, non-secret, file or message in order to avoid detection

Steganography

400

Injects script on end of URL to steal info 

XSS (Cross Site Script)

400

Cisco proprietary AAA server and protocol 

TACACS+ Terminal Access Controller Access-Control System 

400

Open standard AAA Server

RADIUS

400

A server that provides a single point of access from an external network to the resources located in a private network such as a data center

Jumpbox

400

The IEEE standard for wireless network security. Uses AES block cipher

WPA2 or 3

500

Attack that compromises a third-party site that the threat actor knows is used by the target

Waterhole attack

500

A device that is an appliance, server, or application that accepts requests for access to resources on other servers and then applies filters, caches data, or translates the data that is returned.

Proxy

500

An encrypted program used for remote connections to a server using command line interface

SSH

500

Computing platforms are available through the cloud. You just supply the applications.

PaaS

500

Encryption type commonly referred to as “public key cryptography”

Asymmetric (RSA)