SANS - ABCs Cybersecurity Terms
SANS - ABCs Cybersecurity Terms
SANS - ABCs Cybersecurity Terms
Cybersecurity Terms
Whether you’re just starting a career in cybersecurity or simply trying to
protect your personal information, understanding cybersecurity terms
is essential. This glossary, compiled by SANS Senior Instructor, author
of SEC301: Introduction to Cyber Security, and cybersecurity consultant
Keith Palmgren, provides easy to understand explanations of key
concepts that will help you navigate the complex field of cybersecurity.
From Active Defense to Zero Trust, these terms form the foundation of
your knowledge and equip you to defend against cyber threats.
Blue Team members perform defensive cybersecurity tasks. Business Email Compromise (BEC) is an attack that leverages
These include placing and configuring firewalls, implementing social engineering and phishing to impersonate co-workers
patching programs, enforcing strong authentication, ensuring or, more often, executives of a company. The goal is to cause
physical security measures are adequate and a long list of an unsuspecting employee to transfer company money
similar undertakings. or trade secrets to the attacker. This is among the fastest
growing attacks today and results in several billion U.S.
See the entry Red Team. dollars per year in losses.
See the entries Social Engineering and Phishing.
Biometric Authentication
Biometric Authentication systems use the physical
characteristics of a person to authenticate their identity.
Common examples include fingerprint readers, facial
recognition systems, and iris scanners that scan the iris of a
person’s eye. These methods use the authentication factor of
“something we are.”
See the entries Authentication and MFA and 2FA.
The ABCs of Cybersecurity Terms (CONTINUED)
To understand Cloud Computing, we first must understand this Cyber Kill Chain®
simple concept: There is no cloud; it is just someone else’s
computer. When we use the cloud, we utilize remote servers in The Cyber Kill Chain® from Lockheed Martin is a well-known
the datacenter of a cloud provider to store our data instead of and widely referenced “attack model” to help understand the
using local computer systems storage. Less often, we use the cyber attacker’s process. There are seven steps of the Cyber Kill
cloud provider’s computers to process our data as well. Chain® beginning with initial reconnaissance and ending with
data exfiltration. The key point of the Cyber Kill Chain® is that
Command and Control (C2) it is indeed a chain—meaning if we stop the attacker at any
one of the seven steps, the attack cannot continue. If we break
Command and Control or C2 channels are increasingly the chain, we thwart the attack.
common in attacks and in attack detection. If an attacker is
going to issue commands to a remote system, they must use Data Integrity
a C2 channel to do so. This is how their instructions cross
the network to the controlled system. These communication Data Integrity, one of the primary goals of cybersecurity,
channels are strong Indicators of Compromise (IoC) used by ensures that data stays in a pristine state. Meaning the data
Security Operations Center (SOC) analysts to identify attacks. is only edited by the correct people, in the right way, and with
correct information.
See the entries Lateral Movement and Security Operations
Center (SOC).
The ABCs of Cybersecurity Terms (CONTINUED)
Exploit Forensics
To Exploit something is to make full and complete use of it. In Digital Forensics and Incident Response (DFIR) is a
computing, this results in several applications of the word: specialized area of cybersecurity that involves investigating
• E
xploit software compromises a computer. Another name and recovering from an incident. This can include low-
for software of this nature is “sploit.” level analysis of data on hard drives to discover and
preserve digital evidence. DFIR also deals with containing
• W
hen we “Exploit a computer,” we compromise that computer. and eradicating cyber threats causing the incident. A
• T he method and/or flaw that allows a computer primary goal of DFIR is to return the organization to normal
compromise is an “Exploit.” operation promptly through root-cause recovery, while
maintaining the integrity of any evidence collected.
External Insider
FTP (File Transfer Protocol)
External Insider is a form of an insider attack performed by
someone physically located outside a network, but has the Created in 1971, FTP is one of the very first network protocols.
access of an insider. For example, when a computer user FTP allows two computers to exchange files. Unfortunately, in
opens a malicious email attachment, that attachment may 1971 the need for security was not yet clear, so the protocol
install malware, granting the malware author remote control has no encryption capability. It is possible to configure FTP
of that user’s computer. The attacker now controls the user’s to work with or without authentication. However, usernames,
computer as though they were sitting at the keyboard, even passwords, and the files themselves all traverse the network in
though they are physically external to the organization. plaintext. Today, we have much more secure protocols for file
transfer, including FTPS (File Transfer Protocol Secured) using
Fileless Malware TLS encryption.
Historically, malware existed in files on the hard drive. See the entry Transport Layer Security (TLS).
Therefore, anti-malware scanned those files to discover the
malware. More recently, a class of malware exists only in the Gap Analysis
computer’s Random Access Memory (RAM) and does not write Gap Analysis is a term used in business, marketing,
to the hard drive at all. This makes traditional anti-malware information technology, and cybersecurity. In all these
software useless at detection. Some anti-malware software disciplines, Gap Analysis finds the gap between where we
now looks for Fileless Malware. are now and where we would like to be. In cybersecurity, this
means figuring out how high the current level of risk is and
Firewall how much we want to lower that level. Reducing the level of
A network Firewall keeps people off our network who do not risk involves choosing countermeasures to close the gap in
belong there. A personal Firewall keeps people off our computer the most effective and cost-effective ways possible.
who do not belong there. In both cases, a set of rules defines
what type of network traffic the Firewall will allow to pass GNU (GNU Not Unix)
through, and what traffic the Firewall will deny. Firewalls are one GNU is a recursive acronym and stands for “GNU Not Unix.”
of the most ubiquitous security mechanisms in the world today. The term applies to free, open-source software licensed under
See the entry Stateful Inspection. the GNU General Public License. We can copy, use, change,
and redistribute GNU software without paying a fee. The only
Firmware restriction is that we cannot remove the original author’s
names. With open-source software, we also see the terms
Firmware is software on a computer chip. In other words, Copyleft and Attribution Licensing.
instead of software being on a computer’s hard drive as we
normally think, the software exists on the device’s chips. This
is common on devices such as a wireless access point, smart
televisions, and a long list of similar devices that typically
have no hard drive. A “Firmware update” simply means we
overwrite all or part of the software on the chip with a newer
version of software.
The ABCs of Cybersecurity Terms (CONTINUED)
Google Dorking This gives rise to a new form of Social Engineering often
called Imposter Vishing. This can take the form of a phone call
Google Dorking uses highly specific and often complex Google supposedly from our CEO directing us to transfer funds for
search strings called Google Dorks to find systems vulnerable example. They can also pretend to be loved ones who have
to various attacks, reconnaissance, data exfiltration, etc. The been detained and require urgent financial help.
Google Hacking Database is a collection of Google Dorks in
A similar form of this attack now generates realistic-looking
several categories including foothold attacks, files having “juicy
video and voice to make the attack even more believable.
info,” files holding passwords, vulnerable servers, and so on.
See entries Artificial Intelligence, Social Engineering,
www.exploit-db.com/google-hacking-database
and Vishing.
Hash (or Cryptographic Hash) • Fix the root cause to prevent recurrence
• Return to normal operation as quickly as possible
A Hash is a mathematical formula (an algorithm) run against
an input of some kind. Cryptography uses hashes to check • Learn our lessons from the incident
the integrity of data. When we “hash a file,” we run the See the entry Forensics.
hashing algorithm against a computer file and receive a
fixed-length output string called a hash. Any minor change Insider Threat
in that file changes the hash dramatically. Therefore, if two
communicating parties both generate the same hash, we know Insider Threat occurs when someone with access inside our
both parties have identical data. organization causes damage. The damage may be intentional
or accidental and may come from employees, contractors,
See the entry Algorithm.
or even those we do not know. There are three categories of
Insider Threat:
HTTPS (Hyper-Text Transfer Protocol Secure)
• Disgruntled insider occurs when someone we grant access
The Hyper-Text Transfer Protocol or HTTP transfers web pages to becomes unhappy and decides to cause harm.
between our browser and a webserver. Unfortunately, HTTP
• Accidental insider occurs when someone we grant access
does not provide any security since the webpage’s content
to has no intention of causing damage but makes a
passes plaintext across the Internet. HTTPS adds encryption
mistake that leads to harm. Examples include clicking
to the process so that when we do things like eCommerce or
malicious links in emails, opening malicious attachments,
online banking, our information is not readable to attackers.
plugging in untrusted malicious thumb-drives, etc.
See the entry Transport Layer Security (TLS).
• External insider occurs when someone we have NOT
granted access gains that access. The individual or group’s
Imposter Vishing location is physically outside our network, but they have
The capability of AI-driven voice generation has grown access of someone inside our environment.
exponentially. With just a few seconds of someone’s voice Insider Threat is one of the primary cybersecurity concerns. It
recorded, we can type words and have AI generate the voice of is also one of the most challenging problems to fix.
that person saying those words.
See the entry External Insider.
The ABCs of Cybersecurity Terms (CONTINUED)
Machine-in-the-Middle (MitM) Attacks Network Address Translation (NAT) maps multiple internal
IP addresses to a single external IP address. For example, in
This type of attack occurs when an attacker can position our home, we might have ten computing devices (personal
themselves so that all our network traffic passes through the computers, laptops, phones, tablets, smart televisions, smart
attacker. Their computer becomes a “Machine-in-the-Middle.” speakers, refrigerator, etc.). Each of those devices must have its
The attacker now has incredible power over our network traffic. own IP address on our home network. As those devices send
They can manipulate it in any way they choose. The limitation traffic to the internet, those internal IP addresses map (or
of a MitM attack is their imagination and their knowledge. If translate) to a single public IP address assigned to our home
they can think of something to do and know how to do it, they by the Internet Service Provider (ISP).
can do it to us. The best defense against this attack is to set up
an IPSec based VPN tunnel. Nmap
See the entries Rogue Access Point and Virtual Private
Network (VPN). Nmap is free, open-source software that can do any type
of port scan. Nmap will find active IP addresses and show
which network ports are “listening” for connections on those
Malware
addresses. It can then enumerate the operating system and
Malware is an umbrella term for any software with malicious version on that distant computer as well as the software
intent, including viruses, worms, trojan horses, and a list of running on the open ports.
other categories. The number of malwares released on the
Internet is staggering. Depending on which study we look Non-Repudiation
at, the number of new malwares is at least several hundred
thousand per day. Windows is the most targeted operating Non-repudiation means that a user or other entity cannot
system, while Android is the second most targeted, but there is deny or dispute the authenticity and integrity of a message
also malware that affects Apple’s Mac computers, browsers, etc. or transaction. To prove non-repudiation of a message for
example, we must be able to prove beyond question who
See the entries Worm and Application Allowlisting.
sent the message as well as prove that the message was not
tampered with (what we received is identical to what they sent).
MFA and 2FA
The three most common authentication factors are: Number-One Goal of Cybersecurity
• Something we know (a passphrase) While not a term to define, it is certainly a concept
• Something we have (a token held in our hand) to understand. In all cases, the number-one goal of
cybersecurity is the preservation of human life—always!
• Something we are (a biometric such as a fingerprint)
While we deal most directly with this issue when working
Multi-Factor Authentication (MFA) or Two-Factor Authentication with physical security and disaster response plans, we
(2FA) occurs anytime we employ two or more of these three factors. must always remember it. The protection of data and other
For example, to log into a computer, we must provide a PIN assets are always secondary concerns.
(Personal Identification Number) and provide a specific
fingerprint. Assuming proper implementation, this is far better
authentication than simple passwords, and we should use
MFA /2FA everywhere we can.
The ABCs of Cybersecurity Terms (CONTINUED)
XOR is a logical computer function that compares two binary bits: See the entries Key Derivation Function (KDF) and
Password Manager.
• If both bits are the same (both 1s or both 0s), the output is
always 0.
Zero Trust
• If the bits are different (a 1 and a 0), the output is always 1.
In traditional network security models, we authenticate an
XOR is one of the fastest things a computer can do and is used entity once, and then that entity can access everything they
by almost all cryptographic algorithms. are supposed to have access to for a set period of time. In
other words, we deploy a “verify once, then trust” approach.
Zenmap
In a Zero Trust security model, we deploy a “never trust,
Zenmap is the GUI for the command line port scanner Nmap. always verify” approach. Every entity (user, software, process,
See the entries Nmap and Graphical User Interface (GUI). etc.) that wants to access something on the network must
authenticate—every time.
Zero Trust can be difficult to implement, but when combined
with continuous monitoring by a SOC it has the potential to
greatly increase the security of a network.
See the entries Authentication and Security Operations
Center (SOC).