Acronyms Flashcards
(121 cards)
TTPs
tactics techniques and procedures of a threat actor
FAR
False acceptance rate. Letting an unauthorized person have access to a location
FRR
False rejection rate. Rejecting authorized personnel
CER
A balance between FAR and FRR for optimal
authentication effectiveness cross error rate. Lower the better
SOP’s
standard operating procedure. Detailed step by step instructions for implementing changes
-has to do with change management
CAB
Change advisory board
APT
Advanced persistent threat
used synonymously with nation state threat actors since they have long term persistence and stealth
it is a prolonged and targeted cyber attack where the threat actor gains access to a network and remains undetected while they steal data or monitor the network
XXE (XML External Entity Attack)
attempts to read local resources like password hashes in the shadow file
XSS
cross site scripting
injects a malicious script into a trusted site to compromise the sites visitors
DOM XSS
document object model
exploits client’s web browser using client side scripts to modify the content and layout of the webpage, client’s device executes the attack
NOP Slide
attackers fill the buffer with NOP No operation instructions. The return address slides down the NOP instructions until it reaches the attackers code
TOC
Time of Check, atackers manipulate a resource’s state after it is checked but before it is used
TOU
Time of Use. Attackers alter a resource’s state after it is checked but before it is used.
TOE
time of Evaluation. Attackers manipulate data or resources during the systems decision making or evaulation process
In the context of security, time of evaluation could refer to when a security policy or access control rule is evaluated to determine whether to grant or deny access to a resource. For instance, if a security policy is evaluated before a user logs in, it may grant access based on outdated or incomplete information, leading to a security vulnerability.
CSRF
cross site request forgery. triggers actions on different websites without user consent
exploits trust user has in browser
DLL
Dynamic Link Library
collection of code and data that can be used by multiple programs simultaneously to allow for code reuse and modularization in software development
IPS
intrusion prevention system
can identify and respond to DoS attacks for small scale incident
LDAP
lightweight directory access protocol
an open vendor neutral industry standard app protocol for accessing and maintaining distributed directory info services over an internet protocol network
DNSSES
domain name system security extensions to add digitial signatures to dns data
DAC
discretionary access control
allows object owners to directly control access using tools like chown and chomos
selinux uses mac not dac
RTOS
Real time OS
SCADA
supervisory control and data acquisition systems
type of ICS designed for monitoring and controlling geographically dispersed industrail processes
common in electric power generation transmission and distribution systems
water treatment oil and gas
PLCs
programmable logic controllers
used to control specific processes such as assembly lines and facotriess
DCS
distributed control system
used in control production systems within a single location