Related Concepts

  • Ethical Hacker: A person who acts as an attacker and evaluates the security of an application, system, or computer network to minimize risk

  • Cyberwarfare: Using technology to penetrate and attack another nation’s computer systems and networks to cause damage or disrupt services

  • Hacktivists: A Kind of threat actor that further their beliefs, using cybercrime as their method of attack. The most common is for political purposes

  • APT: Advanced Persistent Attack, multi-phase, long-term, stealthy, and advanced operation against a specific target

  • TTPs: Tactics, Techniques, and Procedures. Used to describe how threat actors operate to accomplish their objectives:

    • Tactics: What the attacker is trying to achieve and the form of the attack from the beginning to the end

    • Techniques: How the attacker achieves intermediate results during the attack

    • Procedures: The specific implementation and the approaches used to conduct the attack

  • Risk Management: A Formal process of continuously identifying and assessing risk to reduce the impact of threats and vulnerabilities

  • Pen-Testing: Involves using the same tools, techniques, and methodologies that someone with malicious intentions would use, to find and report system vulnerabilities

  • Offensive Security: Proactive security strategies that use the same tactics that malicious actors use in real-world attacks to strengthen the security of a system

  • Defensive security: Protecting an organization's network and computer systems by analyzing and securing any potential digital threats

  • Behavior-based security: A form of threat detection that captures and analyzes the communication between a user on a network. Any changes in normal patterns of behavior are regarded as anomalies and may indicate an attack

  • CSIRT: Computer Security Incident Response Team, specialized in receiving, reviewing, and responding to computer security incident reports

  • Security Playbook: Collection of repeatable queries or reports that outline a standardized process for incident detection and response

  • Vulnerability: Defect or malfunction of an application that makes it easy to attack

  • Exploit: A Program specifically created to attack a vulnerability

  • PoC: Proof of Concept, technique, or tool that demonstrates the exploitation of a vulnerability

  • CVSS: Common Vulnerability Scoring System, an open industry standard for assessing the severity of computer system security vulnerabilities

  • VPR: Vulnerability Priority Rating, a modern framework in vulnerability management that focuses on the risk that could directly affect an organization

  • IPS: Intrusion Prevention System uses a set of traffic signatures that match and block malicious traffic and attacks

  • IDS: Intrusion Detection System, detects unauthorized network and system intrusions. It will not take action and won't prevent attacks from happening, just detect, log, and report

  • DLP: Data Loss Prevention, a system designed to stop sensitive data from being stolen from or escaping a network

  • SIEM: Security Information and Event Management, when a system collects and analyzes security alerts, logs, and other real-time and historical data

  • Defense-In-Depth: Practice of putting different layers of security controls together in a system to guarantee security

  • SAMM: Software Assurance Maturity Model, a framework to help organizations evaluate and improve their software security practices. It provides a way to analyze and improve the secure development lifecycle. The most well-known is the OWASP version

  • PIM: Privileged Identity Management translates a user's role within an organization into an access role on a system

  • PAM: Privileged Access Management, management of the privileges a system's access role has

  • Vetting: A screening process where applicants' backgrounds are examined to establish the risk they pose to an organization

  • Threat modeling: The Process of reviewing, improving, and testing the security protocols

  • Bug bounty program: Allows a company to offer a reward for anyone who discovers a security vulnerability in the company’s systems

  • Non-Repudiation: Ensures that in a communication, neither the sender nor the receiver can deny the authenticity of their signature, message, or action

  • Maliciously formatted package: Collection of data improperly formatted that an application is unable to identify, causing the crashing or slowing down of the functions

  • Cryptocurrency: Digital money that can be used to buy goods and services, using strong encryption techniques to secure online transactions

  • Hardening: The Process of securing a system by reducing its vulnerabilities or security holes, for which it is more prone

  • OSS: Open Source Software is software with source code that is publicly available for anyone to use, modify, and distribute

  • Default Safe: A security design principle where a system is configured to be in the safest possible state, unless an explicit action is taken to remove those protections

  • CWE: Common Weakness Enumeration, a list of software weaknesses to create a common language to describe software security weaknesses that are the root causes of given vulnerabilities

  • PII: Personally Identifiable Information is any information that can be used to identify an individual, either on its own or when combined with other data

    • Linkable Information: Data that, when combined, allows a person to be identified.

    • Sensitive Information: Data that affects the intimate life of the holder and must be treated with extreme care

  • PCI: Payment Card Industry refers to the information related to payment cards. It should be handled in compliance with PCI DSS standards to process this data securely

  • S-SDLC: Secure Software Development Life Cycle, Approach that seeks to integrate security at every stage of software development, identifying and mitigating vulnerabilities from the beginning

Last updated