All relevance Flashcards
(112 cards)
ENISA
European Union Agency for Cybersecurity – provides guidance on cybersecurity including definitions and threat models.
DREAD
A threat evaluation model that scores threats based on Damage, Reproducibility, Exploitability, Affected users, and Discoverability.
CVSS
Common Vulnerability Scoring System – a standardized framework for rating the severity of software vulnerabilities.
CIA
Confidentiality, Integrity, Availability – the core triad of information security objectives.
STRIDE
A Microsoft-developed threat modelling framework: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege.
VAX/VMS
Virtual Address eXtension / Virtual Memory System – an old operating system by DEC, targeted by the Father Christmas worm.
DECNet
Digital Equipment Corporation Network – a proprietary network protocol suite used with DEC systems.
IoT
Internet of Things – networked devices embedded with sensors and software for data exchange.
MS SDL
Microsoft Security Development Lifecycle – a software development process focused on building secure software.
ISO
International Organization for Standardization – issues global standards, including those for information security.
NIST
National Institute of Standards and Technology – US-based agency that develops cybersecurity and privacy frameworks.
BSI
British Standards Institution – UK-based organization providing standards including for IT and cybersecurity.
USB
Universal Serial Bus – a standard interface for connecting peripherals to a computer; often restricted in security policies.
IP
Internet Protocol – a foundational protocol in the internet suite, often used in IP-restricted access policies.
ACL
Access Control List – Specifies permissions attached to files for users and groups.
UID
User Identifier – Unique number assigned to each user on the system.
GID
Group Identifier – Unique number assigned to each group on the system.
RUID
Real User ID – The ID of the user who launched the process.
EUID
Effective User ID – The ID used for permission checks, enabling temporary privilege escalation.
SUID
Saved User ID – Stores previous EUID, allowing privilege regaining.
RGID
Real Group ID – Group ownership of the process at creation.
EGID
Effective Group ID – Used during access checks to allow group-based privileges.
SGID
Saved Group ID – Stores previous EGID for similar purpose as SUID.
TOC/TOU
Time Of Check / Time Of Use – Type of vulnerability where a condition changes between check and usage.