Cyber Security-Terminology
Cyber Security-Terminology
2Factor Authentication
2. Acceptable Interruption
3. Acceptable Use Policy
4. Access Control
5. Access Control List
6. Access Path
7. Access rights
8. Access Token
9. Accountability
10. Advanced Encryption Standard AES
11. Advanced Persistent Threats (APT)
12. Advantages of Cyber Security
13. Adversary
14. Adware
15. Alert
16. Alert situation
17. Alert Triage
18. Alerting System
19. Alternate Facilities
20. Alternate Process
21. Analog
22. Anamoly Based Detection
23. Anti virus
24. Antimalware
25. Antivirus software
26. Apache access log
27. Apache error log
28. Application Centric Attack
29. Application Layer
30. Application level Dos
31. Architecture
32. ARP
33. ARP Poisoning
34. Asset
35. Asymmetric Encryption
36. Asymmetric Encryption Algorithm
37. Asymmetric key (Public key)
38. Attack
39. Attack Mechanism
40. Attack Vector
41. Attenuation
42. Audit Trail
43. Authentication
44. Authenticity
45. Authenticode
46. Automated log analysis
47. Availability
48. Backdoor
49. Bandwidth
50. Based 64 encoding
51. Bastion
52. Behavioural Indicators of Compromise
53. Biometrics
54. Black Box Testing
55. Black hat hacker
56. Black hole sniffing
57. Block Cipher
58. Botnet
59. Boundary
60. Bridge
61. Bring Your Own Device BYOD
62. Broadcast
63. Brute Force
64. Brute Force Attack
65. Buffer Overflow
66. Buffer Overflow Attack
67. Business Continuity Plan BCP
68. Business impact Analysis/Assessment
69. Central Engine
70. Central Logging
71. Cerificate Revocation List – CRL
72. Certificate Authority CA
73. Chain of Custody
74. Checkpoint
75. Checksum
76. Chief Information Security Officer
77. Chief Information Security Officer CISO
78. Chief Security Officer CSO
79. Cipher
80. Cipher Text
81. Clear Text / Plain Text
82. Cloud based SIEM
83. Cloud Computing
84. Collector/Connector
85. Collision
86. Common Attack Pattern Enumeration and Classification CAPEC
87. Compartmentalization
88. Compliance
89. Compliance Document
90. Computer Emergency Response Team CERT
91. Computer Forensic Lab
92. Computer Forensics
93. Confidentiality
94. Configuration Management
95. Consumerization
96. Containment
97. Content Filtering
98. Control
99. Countermeasures
100. Counter Intelligence
101. Countermeasures to Prevent Malware
102. Critical Infrastructure
103. Criticality
104. Criticality Analysis
105. Cross Site Scripting Attack – XSS
106. Crosss Site Request Forgery Attack – CSRF
107. Crypto API
108. Cryptography
109. CryptoSystem
110. Cyber Insurance
111. Cyber Security
112. Cyber Security Architecture
113. Cyber Terrorist
114. Cyber Threat
115. Cyber Threat Intelligence CTI
116. CyberCop
117. Cyberespionage
118. Data Classification
119. Data Custodian
120. Data Encryption Standard DES
121. Data Leakage
122. Data Owner
123. Data retention
124. Database
125. DDos Attack
126. DDoS attack
127. Decentralization
128. Decryption
129. Decryption Key
130. Defense in depth
131. Deffie Hellman
132. Demilitarized Zone DMZ
133. Denial Of Service Attack
134. DHCP Spoofing Attack
135. DHCP Starvation
136. Different Hacking Tools
137. Digital Certificate
138. Digital Forensic
139. Digital Signature
140. Directory Traversal
141. Disadvantages of PEN Testing
142. Disaster
143. Disaster Recovery Plan
144. Discretionary access Control DAC
145. DNS Cache Poisioning
146. DNS Exfiltration
147. DNS Foot Printing
148. DNS Monitoring
149. DNS poisoning
150. Domain Name System
151. Due Care
152. Due Diligence
153. Dynamic ports
154. Eavesdropping
155. E-Commerce
156. Egress
157. Egress Filtering
158. Elements of Cyber Security
159. Elliptical Curve Cryptography ECC
160. Encapsulation Security Playload
161. Encryption
162. Encryption Algorithm
163. Encryption Key
164. Encryption Tools - Commonly used
165. Eradication
166. Error
167. Ether peak Tool
168. Ethernet
169. Ethical Hacking
170. Event
171. Event Viewer
172. Evidence
173. Exfiltration
174. Exploit
175. Failure Audit
176. File Transfer Protocol FTP
177. Fileless Malware
178. Firewall
179. Firewall Logging
180. Forensic Examination
181. Forward Secrecy
182. Freeware
183. Gateway
184. Governance
185. Governance Risk Management and Compliance GRC
186. Gray Hat Hacker
187. Guideline
188. Hack Value
189. Hacker
190. Hacking
191. Hacking Tools
192. Hacktivist
193. Hash Function
194. Hash total
195. Hashing
196. Hex Encoding
197. HIDS
198. High Level incidents
199. Hijacking
200. Hoax Mail
201. Honeypot
202. Honeypot Types
203. Horizontal Defense in Depth
204. Host based Dos Attack
205. How to Secure Web Server
206. HTML encoding
207. Hub
208. Humal Intelligence
209. Human Firewall
210. Hybrid Attack
211. Hybrid SOC Model
212. Hypertext Transfer Protocol HTTP
213. Hypertext Transfer Protocol Secure HTTPS
214. IEEE
215. IEEE 802.11
216. Imaging
217. Impact
218. Impatc Analysis
219. Impersonation
220. Importance of Ethical Hacking
221. Importance of PEN Testing
222. Incident
223. Incident Disclosure
224. Incident impact Assessment
225. Incident Prioritization
226. Incident Responder
227. Incident response
228. Incident response criteria
229. Incident response plan
230. Incident response Policy
231. Incident response Procedures
232. Incident response team
233. Incident response vision
234. Indicators of Compromise
235. Information Security
236. Information Security Program
237. Information Systems
238. Infrastructure as a Service IaaS
239. Ingestion
240. Ingress
241. Ingress Filtering
242. Inherent Risk
243. Inhouse SIEM
244. Initial Vector
245. Injection
246. Intangible asset
247. Integrity
248. Intellectual Property
249. Internal Intelligence
250. International Standard Organization
251. Internet Assigned Numbers Authority IANA
252. Internet Control Message Protocol ICMP
253. Internet Information Services
254. Internet Protocol
255. Internet Protocol Packet Spoofing
256. Internet Service Provider
257. Internetwork Packet Exchange /Sequenced Packet Exchange IPX/SPX
258. Interrogation
259. Intruder
260. Intrusion Detection
261. Intrusion Detection System - IDS
262. Intrusion Prevention
263. Intrusion Prevention System – IPS
264. Intrusion Prevention System (IPS)
265. Investigation
266. IP Address
267. IP Authentication Header
268. IP Security
269. IP Tables
270. IT Governance
271. Kernel Mode
272. Key length
273. Key Performance Indicators KPI
274. Key Risk Indicator KRI
275. Keylogger
276. Keyword
277. Latency
278. Layer 2 switch
279. Layer 3 and 4 Switch
280. Layer 4-7 Switches
281. Legacy System
282. Likelihood
283. Linux Log
284. Local Area Network
285. Local logging
286. Log
287. Log analysis
288. Log collection
289. Log correlation
290. Log generator
291. Log normalization
292. Log storage
293. Log transmission
294. Logging
295. Logging Server
296. Logical Access Controls
297. Logical Address
298. Low level incidents
299. MAC Adress
300. MAC Header
301. MAC Spoofing/Duplication
302. Macro level Correlation
303. Mail relay server
304. Mainframe
305. Malware
306. Malware Attack
307. Managed SIEM
308. Mandatory Access Control -MAC
309. Man-in-the Middle Attack
310. Man-in-the-Middle attack
311. Manual Log analysis
312. Masking
313. Maturity Model
314. MBSA
315. Media Access Control Address
316. Message Authentication Code
317. Message digest
318. Message digest algorithm
319. Metroplitan area network MAN
320. Micro level correlation
321. Middle level incidents
322. Miniature fragment attack
323. Mirrored Site
324. MITM
325. Mobile device
326. Mobile site
327. Monitoring Policy
328. Multifactor Authentication
329. Nano Security
330. National Institute of Standards and Technology NIST
331. Netflow collector
332. Network Address Translation
333. Network based Denial of Service attack
334. Network basic Input Output System NetBIOS
335. Network Centric attack
336. Network Indicators
337. Network Interface Card NIC
338. Network News Transfer Protocol NNTP
339. Network Operation Center
340. Network Scanning
341. Network Segmentation
342. Network Sniffing
343. Network Traffic Analysis
344. Nmap
345. Non Physical Threats and its Types
346. Nonintrusive Monitoring
347. Nonrepudiation
348. Normalization
349. Obfuscation
350. Open System Interconnect Model OSI
351. Open Web Application Security Project OWASP
352. Operating System OS
353. Operational threat Intelligence
354. OSI-Model Layers
355. OSINT
356. Outcome measure
357. Outsourced SOC Model
358. Outsourcing
359. Packet
360. Packet Filtering
361. Packet Sniffing
362. Packet Sniffing Tools
363. Packet Switching
364. Parameter Tampering
365. Passive response
366. Password
367. Password attack
368. Password Cracker
369. Patch
370. Patch Management
371. Payload
372. Penetration Testing
373. Penetration Testing Advantages and Importance
374. Penetration Testing Disadvantages
375. Personal Identification Number PIN
376. Phishing
377. Physical Threat
378. Plain Old Telephone Service POTS
379. Platform as a Service PaaS
380. Policy
381. Port Number
382. Port Scanning
383. Primary ways to Handle the Risk
384. Prime number
385. Principle of least privilege/access
386. Privacy
387. Probe
388. Procedure
389. Production Honeypots
390. Protocol
391. Proxy Server
392. Public Key Encryption
393. Public Key Infrastructure PKI
394. Public Switched Telephone Network PSTN
395. Ransomeware
396. Rate limiting
397. RDP
398. Reciprocal Agreement
399. Reconnaissance
400. Recover
401. Recovery Action
402. Recovery Point Objective RPO
403. Recovery Time Objective RTO
404. Redundant Site
405. Registered Ports
406. Registration Authority
407. Regulation
408. Regulatory requirement
409. Remediation
410. Remote Access Service RAS
411. Removable media
412. Repeaters
413. Replay
414. Research Honeypots
415. Residual Risk
416. Resilience
417. Return On Investment ROI
418. Return Oriented Attacks
419. RFC-3704-Filtering
420. Risk
421. Risk acceptance
422. Risk assessment
423. Risk avoidance
424. Risk Management
425. Risk Mitigation
426. Risk reduction
427. Risk Tolerance
428. Risk Transfer
429. Risk Treatment
430. Risk with Public Wifi
431. Root Cause Analysis
432. Rootkit
433. Router
434. RSA
435. RSA
436. Safeguard
437. Salting
438. Script Kiddies
439. Secure Electronic Transfer SET
440. Secure Multipurpose Internet Mail Extensions S/MIME
441. Secure Shell SSH
442. Secure Socket Layer SSL
443. Security Analysis
444. Security as a Service SecaaS
445. Security Auditing
446. Security Information and Event Management SIEM
447. Security Management
448. Security Metrics
449. Security Operation Center
450. Security Operations
451. Security Perimeter
452. Security Reference Monitor
453. Security Scanning
454. Security Testing
455. Security Threat
456. Segregation/Separation of Duties
457. Sensitivity
458. Sequence of TCP Connection
459. Service Delivery Objective
460. Service Level Agreement
461. Session Fixation attack
462. Session Hijacking
463. Sesssion Hijacking Types
464. Severity Level
465. Signature based detection
466. Simple Mail Transfer Protocol SMTP
467. Single Factor Authentication SFA
468. Smart Card
469. Sniffer
470. Sniffing
471. SOC Analyst
472. SOC Manager
473. Social Engineering
474. Software as a Service SaaS
475. Source routing Specification
476. SPAM
477. Spam
478. Spear Phishing
479. Spoofing
480. Spyware
481. Spyware
482. SQL Injection
483. SQL injection
484. SSH
485. SSL
486. State Sponsored Hackers
487. Stateful Inspection
488. Statutory requirement
489. Steps to perform Ethical Hacking
490. Strategic Threat Intelligence
491. Stream Sipher
492. Subject Matter Exper/Hunter
493. Success Audit
494. Suicide Hackers
495. Supervisory Control and Data Acquisition SCADA
496. Switch Port Stealing
497. Switches
498. Symmetric Encryption
499. Symmetric Encryption
500. Symmetric Encryption Algorithm
501. Syslog
502. System Development Life Cycle SDLC
503. System hardening
504. Tactical Threat Intelligence
505. Tactics
506. Tangible asset
507. Target
508. TCP/IP
509. TCP-3Way-HandShake
510. Technique
511. Telnet
512. Threat
513. Threat agent
514. Threat Analysis
515. Threat Event
516. Threat identification
517. Threat Intelligence Platform
518. Threat report
519. Threat Vector
520. Timelines
521. TLS
522. Token
523. Tools used for packet sniffing
524. Topology
525. Total Cost Ownership TCO
526. Tracert
527. Transmission Control Protocol TCP
528. Transport Layer Security TLS
529. Triple DES 3DES
530. Trojan
531. Trojan Detection Steps
532. Trojan horse
533. Tunnel
534. Tunnel Mode
535. Two factor Authentication
536. Types of Honeypots
537. Types Of Malware
538. Types of Non Physical Threats
539. Types of Session hijacking
540. Types of Sniffing attacks
541. Types of WEP Cracking Tools
542. Uncertainty
543. Unicode encoding
544. Uniform Resource Locator URL
545. URL encoding
546. User Datagram Protocol UDP
547. User interface Impersonation
548. User Mode
549. User Provisioning
550. UTF-8
551. Value
552. Vertical defense in depth
553. Virtual Local Area Network VLAN
554. Virtual Private Network Concentrator
555. Virtual Private Network VPN
556. Virtualization
557. Virus
558. Virus Signature File
559. Voice Over Internet Protocol VOIP
560. Volatile Data
561. VPN
562. Vulnerabilites – Common - OWASP
563. Vulnerabilities - Commonly found
564. Vulnerability
565. Vulnerability Analysis
566. Vulnerability Scanning
567. Warm Site
568. Warning
569. Web Application Firewall
570. Web Content Filtering
571. Web Hosting
572. Web Server
573. Well Know Ports
574. WEP Cracking
575. WEP Cracking Tools
576. White Box Testing
577. White hat hacker
578. Wide Area Network WAN
579. Wifi Protected Access 2 WAP2
580. Wifi Protected Access WAP
581. Windows logs
582. Wired Equivalent Privacy WEP
583. Wireless Local Area Network WLAN
584. Worm
585. Write Blocker
586. Write Protect
587. Zero day Attack
588. Zero Day Equivalent
Differences
Prevention
Importance
Why
How
Lab Pracitces –from CEH Training Videos,SOC-infosec Training videos , EC-Council-CSA Lab Practice