• 3-2-1 backup rule — 3 copies of data, on 2 different media types, with 1 copy off-site
  • 3DES — Triple Data Encryption Standard: legacy symmetric cipher applying DES three times; deprecated in favor of AES
  • 802.1X — IEEE standard for port-based network access control; uses EAP for authentication

A

  • AES — Advanced Encryption Standard: symmetric block cipher (128/192/256-bit keys); the current standard for data encryption
  • AES-256 — Advanced Encryption Standard 256-bit: AES with a 256-bit key; considered quantum-resistant for symmetric encryption
  • Access badges — RFID or smart card-based identification for building entry
  • Access control lists (ACLs) — Defining explicit allow/deny rules for network traffic and resource access
  • Access control vestibules (mantraps) — Dual-door chambers allowing only one door open at a time; prevents tailgating
  • Account indicators — Multiple failed logins, privilege escalation attempts, account lockouts, new admin accounts
  • Accounting — Logging and tracking user activities for audit and forensic purposes
  • Active-active vs. active-passive — active-active uses all nodes; active-passive has standby nodes for failover
  • Ad hoc vs. recurring vs. continuous — assessments may be triggered by events, scheduled, or ongoing
  • Adaptive identity — Authentication and authorization that adjust based on real-time risk assessment
  • Administrative controls — Policies, procedures, training, background checks
  • Advisary emulation — Simulating known threat actor behavior to test detection capabilities
  • After-action review — lessons learned documented after each test or actual incident
  • AH — Authentication Header: IPSec protocol providing integrity and authentication but not confidentiality
  • Air gap — complete physical isolation with no network connectivity; highest security, used for critical systems
  • AIS — Automated Indicator Sharing: DHS system for real-time exchange of cyber threat indicators
  • ALE — Annualized Loss Expectancy: expected yearly monetary loss from a risk; ALE = SLE x ARO
  • Always-on VPN — automatically connects when the device is powered on; ensures consistent policy enforcement
  • Amplification attack — Using protocols like DNS, NTP, or memcached to amplify a small request into a massive response
  • Reflection — Using third-party servers (DNS, NTP, memcached) to amplify and reflect traffic at the victim
  • Anonymization — irreversibly removes identifying information
  • Anonymization vs. pseudonymization — anonymization is irreversible; pseudonymization replaces identifiers but can be reversed with a key
  • Anti-forensics — Techniques attackers use to hinder forensic analysis (encryption, log wiping, timestomping)
  • Anti-phishing controls — URL rewriting, sandbox analysis of attachments, impersonation detection
  • Anti-malware — Signature-based and heuristic detection of known and unknown malware
  • API attacks — Exploiting insecure APIs through broken authentication, excessive data exposure, or lack of rate limiting
  • ARO — Annualized Rate of Occurrence: estimated frequency of a threat occurring per year
  • ARP — Address Resolution Protocol: maps IP addresses to MAC addresses on a local network; vulnerable to spoofing
  • API integration — Connecting security tools through REST APIs for orchestrated workflows
  • API security — cloud services are API-driven; securing APIs is critical to cloud security
  • Application allowlisting — Only permitting approved software to execute — stronger than blocklisting
  • allowlisting — Only approved applications can execute on the endpoint
  • Application-layer attacks — Targeting specific services with legitimate-looking requests to exhaust application resources
  • poisoning — Sending fake ARP messages to associate the attacker
  • ASLR — Address Space Layout Randomization: OS security feature that randomizes memory addresses to thwart buffer overflow exploits
  • ASP — Active Server Pages: Microsoft server-side scripting framework for dynamic web content
  • Attack surface management — Continuously identifying and reducing exposure across all attack vectors
  • Attestation — formal declaration by an auditor that controls are operating effectively
  • Attribute mapping — Translating identity attributes (role, department) between different organizational schemas
  • Attribute-Based Access Control (ABAC) — Access decisions based on attributes such as department, location, or time of day
  • Audit scope — defines what systems, processes, and controls are being examined
  • AUP — Acceptable Use Policy: defines permitted and prohibited uses of organizational IT resources
  • Authentication — typically uses certificates, MFA, RADIUS, or LDAP for VPN user authentication
  • Authorization vs. Authentication — Authentication proves identity; authorization defines permissions
  • Automated response — Predefined playbooks can kill processes, quarantine files, or block IPs without human intervention
  • Automation — Executing repetitive tasks without human intervention — enriching alerts, blocking IPs, disabling accounts
  • Availability — Ensuring systems and data are accessible to authorized users when needed

B

  • Rollback plan — Predefined steps to reverse a change if it causes problems
  • Baiting — Offering something enticing (USB drive, free download) to lure victims
  • Bandwidth monitoring — Detecting unusual spikes that may indicate DDoS attacks or data exfiltration
  • Baseline establishment — Defining normal network behavior to identify deviations and anomalies
  • BGP — Border Gateway Protocol: routing protocol that exchanges path information between autonomous systems on the internet
  • BIOS — Basic Input/Output System: legacy firmware interface for hardware initialization; largely replaced by UEFI
  • Baseline-driven hunting — Identifying deviations from known-good baselines in network traffic, process execution, or user behavior
  • Behavioral analysis — Detects threats based on anomalous behavior rather than known signatures
  • Behavioral indicators — Unusual login times, impossible travel, lateral movement patterns suggesting compromise
  • Bell-LaPadula Model — \
  • Benchmarks vs. frameworks — benchmarks are specific configuration guides; frameworks are broader programs
  • Benefits — Speed, consistency, scalability, reduced human error, better documentation
  • BIA as the foundation — the Business Impact Analysis identifies critical functions and sets recovery priorities
  • Biba Model — \
  • Biometric authentication — FAR vs. FRR; CER (Crossover Error Rate) measures biometric system accuracy
  • Birthday attack — Exploits the mathematics of hash collisions; finding two inputs that produce the same hash output
  • Blind SQL injection — Application does not return data directly; attacker infers information through true/false responses or time delays
  • Bluetooth attacks — Bluejacking (unsolicited messages), Bluesnarfing (data theft), Bluebugging (full device control)
  • Board and executive involvement — governance starts at the top; senior leadership sets the tone and approves risk appetite
  • Bollards — Short vertical posts preventing vehicle ramming attacks
  • Boot integrity — Secure Boot, Measured Boot, and TPM ensure the system hasn’t been tampered with
  • BPA — Business Partnership Agreement: formal agreement defining responsibilities and expectations between business partners
  • BPDU — Bridge Protocol Data Unit: frames used by Spanning Tree Protocol to prevent network loops
  • BSSID — Basic Service Set Identifier: MAC address of a wireless access point identifying a specific BSS
  • Botnet — Network of compromised devices controlled by an attacker to generate DDoS traffic
  • Brand impersonation — Creating fake websites, emails, or social media profiles mimicking trusted brands
  • Break-glass accounts — Emergency access accounts with heightened monitoring for use when normal access paths fail
  • Brute force — Trying all possible keys or password combinations until the correct one is found
  • Buffer overflow — Sending more data than a buffer can hold, overwriting adjacent memory to execute arbitrary code
  • Bug bounty programs — Crowdsourced testing where external researchers report vulnerabilities for rewards
  • Business continuity vs. disaster recovery — BCP keeps the business running during disruption; DR restores IT systems after disruption
  • Business Email Compromise (BEC) — Social engineering attacks where attackers impersonate executives to request wire transfers or sensitive data

C

  • Cable locks — Physically secure laptops and equipment to prevent theft
  • Caching — proxies store frequently accessed content to reduce bandwidth and improve response times
  • Capacity planning — ensuring sufficient resources to handle peak loads and growth
  • CAPTCHA — Completely Automated Public Turing Test to Tell Computers and Humans Apart: challenge-response test to distinguish humans from bots
  • CAR — Corrective Action Report: document detailing root cause analysis and remediation steps after an incident
  • CASB — Cloud Access Security Broker: policy enforcement point between users and cloud services for visibility and data protection
  • Case management — Tracking incidents from detection through resolution with full documentation
  • Centralized logging — Aggregating logs from all sources into a single repository for unified analysis
  • Centralized vs. decentralized governance — centralized offers consistency; decentralized gives business units flexibility
  • CBC — Cipher Block Chaining: block cipher mode where each plaintext block is XORed with the previous ciphertext block
  • CBT — Computer-based Training: security awareness training delivered via software or e-learning platforms
  • CCMP — Counter-Mode/CBC-MAC Protocol: AES-based encryption protocol used in WPA2 for wireless security
  • CERT — Computer Emergency Response Team: group responsible for coordinating response to cybersecurity incidents
  • Certificate formats — PEM (.pem, .crt), DER (.der), PKCS#12 (.pfx, .p12), PKCS#7 (.p7b)
  • Certificate lifecycle — request (CSR), issuance, usage, renewal, revocation
  • Certificate pinning — application hardcodes the expected certificate or public key to prevent MITM with rogue certs
  • Certificate-based authentication — Uses digital certificates from a PKI for mutual authentication
  • CFB — Cipher Feedback: block cipher mode that converts a block cipher into a self-synchronizing stream cipher
  • Chain of custody — Documented record of who handled the evidence, when, and what was done — breaks invalidate evidence
  • Chain of trust — each certificate is signed by the CA above it; browsers trust the root CA
  • Change Advisory Board (CAB) — Group of stakeholders who review and approve/deny change requests
  • CHAP — Challenge-Handshake Authentication Protocol: authentication protocol using a three-way handshake to verify identity
  • ciphertext attack — Attacker can encrypt or decrypt chosen data to extract information about the key
  • CIO — Chief Information Officer: executive responsible for IT strategy and information systems
  • CIRT — Computer Incident Response Team: team that handles investigation and remediation of security incidents
  • CIS Benchmarks — Industry-standard security configuration guidelines from the Center for Internet Security
  • CIS Controls — prioritized list of cybersecurity best practices (formerly SANS Top 20)
  • Classification criteria — regulatory requirements, business value, sensitivity, impact if disclosed
  • Cloud deployment models — public, private, hybrid, community, multi-cloud
  • CMS — Content Management System: software for creating and managing digital content (e.g., WordPress)
  • CN — Common Name: field in an X.509 certificate identifying the host name or entity
  • Collision attack — Specifically crafting two different inputs that produce an identical hash — compromises integrity verification
  • Command injection (OS injection) — Inserting operating system commands through application inputs to execute on the host system
  • private sector classifications — Confidential/Restricted, Private/Internal, Public
  • Common delivery methods — Phishing emails, exploited vulnerabilities (especially RDP), drive-by downloads, supply chain compromise
  • Common IaC tools — Terraform, AWS CloudFormation, Azure ARM/Bicep, Ansible, Puppet, Chef
  • Common SIEM platforms — Splunk, Microsoft Sentinel, IBM QRadar, Elastic Security
  • Communication plan — Who to notify (management, legal, law enforcement, customers, regulators)
  • Compensating controls — Alternative measures when the primary control cannot be implemented
  • COOP — Continuity of Operations Planning: plan to maintain essential functions during and after a disaster
  • Compliance automation — tools that continuously assess configurations against baselines and flag deviations
  • Compliance monitoring — ongoing checks to ensure controls remain effective and policies are followed
  • Compliance reporting — documentation submitted to regulators or auditors demonstrating adherence
  • Conditional access — Dynamic authorization based on risk signals (device compliance, location, behavior)
  • Confidence levels — Rating how reliable and accurate a piece of intelligence is
  • Confidentiality — Protecting data from unauthorized access or disclosure
  • Configuration drift — when running infrastructure diverges from its defined state; IaC detects and corrects this
  • Configuration management — Maintaining a consistent, secure baseline of system configurations and detecting drift
  • Consequences of non-compliance — fines, sanctions, loss of certifications, lawsuits, reputational harm
  • Containment — Short-term (isolate the system) and long-term (apply temporary fixes while building permanent solutions)
  • Content filtering — proxies can inspect and block traffic based on URLs, categories, or content types
  • CD) security — Embedding security checks into automated build and deployment pipelines
  • CP — Contingency Planning: preparing alternative procedures to maintain operations when primary systems fail
  • CRC — Cyclic Redundancy Check: error-detecting code used to verify data integrity during transmission or storage
  • Continuous monitoring — Agents on endpoints record process execution, file changes, registry modifications, and network connections
  • Contractual compliance — obligations defined in business agreements and SLAs
  • Control diversity — Combining different types of controls (technical + administrative + physical) at each security layer
  • Correlation rules — Logic that identifies patterns across multiple events that indicate an attack
  • Credential rotation — Automatically changing privileged passwords on a schedule or after each use
  • Credential stuffing — Using stolen username/password pairs from breached databases to log into other services
  • Credentialed vs. non-credentialed scans — Credentialed scans log into systems for deeper analysis; non-credentialed scans show the external attacker
  • Critical business functions — processes that, if disrupted, would cause significant harm to the organization
  • Cross-certification — two CAs trust each other
  • CSA — Cloud Security Alliance: organization that defines best practices for secure cloud computing
  • CSIRT — Computer Security Incident Response Team: specialized team for handling and coordinating security incident response
  • CSO — Chief Security Officer: executive responsible for physical and/or information security strategy
  • CSP — Cloud Service Provider: company offering cloud-based infrastructure, platforms, or software (e.g., AWS, Azure)
  • CSU — Channel Service Unit: device that connects a digital line to networking equipment at the demarcation point
  • Cryptocurrency payment — Bitcoin or Monero used to make ransom payments difficult to trace
  • CSA Cloud Controls Matrix (CCM) — cloud-specific security control framework
  • CSR (Certificate Signing Request) — generated by the applicant; contains the public key and identity information
  • CSRF Example — A hidden image tag that triggers a bank transfer while the victim is logged into their banking site
  • CSRF Mechanism — Attacker crafts a request using hidden forms or image tags that perform actions using the victim
  • CTM — Counter-Mode: block cipher mode that turns a block cipher into a stream cipher using a counter
  • CTO — Chief Technology Officer: executive responsible for technology development and innovation strategy
  • Culture of security — training should foster a culture where reporting suspicious activity is encouraged, not punished
  • CVE (Common Vulnerabilities and Exposures) — Unique identifiers for publicly known vulnerabilities
  • CVSS (Common Vulnerability Scoring System) — Standardized 0-10 scoring system for vulnerability severity
  • CYOD — Choose Your Own Device: policy allowing employees to select from pre-approved personal devices for work use

D

  • DAD Triad — Disclosure, Alteration, Destruction — the attacker
  • Dashboards and reporting
  • DBA — Database Administrator: professional responsible for database design, security, backup, and performance — Visual representation of security posture, trends, and compliance metrics
  • Data breach notification — regulations often require notifying affected individuals and authorities within a set timeframe
  • Data loss prevention (DLP) — tools that detect and prevent unauthorized data exfiltration
  • Data masking — obscures portions of data (e.g., showing only last 4 digits of a credit card)
  • Data ownership and processing agreements — clearly define who owns data and how it is handled, stored, and deleted
  • Data retention policies — define how long data must be kept and when it must be destroyed
  • Data sources — EDR telemetry, SIEM logs, network flow data, DNS logs, authentication logs
  • Data sovereignty — data stored in the cloud is subject to the laws of its physical location
  • Data states — data at rest, data in transit, data in use; each requires appropriate protection
  • Deauthentication attack — Sending forged 802.11 deauth frames to disconnect clients from a wireless network
  • DEP — Data Execution Prevention: OS feature that marks memory regions as non-executable to prevent code injection
  • DES — Data Encryption Standard: legacy 56-bit symmetric block cipher; considered insecure and replaced by AES
  • Deception platforms — Enterprise solutions that automate deployment and management of decoys across the network
  • Declassification — reducing the classification level when sensitivity decreases over time
  • Decommissioning — Properly retiring end-of-life systems that can no longer be patched
  • Default credentials — Factory-set usernames and passwords that are publicly documented and easily exploited
  • Defense in depth — layered security controls so that if one fails, others still protect the environment
  • Defenses — HTTPS everywhere, HSTS, certificate pinning, mutual TLS, encrypted protocols; anti-CSRF tokens, SameSite cookies
  • Dependencies — upstream and downstream systems that a critical function relies on
  • Deprecated algorithms — MD5, SHA-1, DES, RC4 — algorithms that are cryptographically weak and should not be used
  • DHE — Diffie-Hellman Ephemeral: key exchange using temporary keys per session; provides perfect forward secrecy
  • Detection and analysis — Identifying incidents through alerts, logs, user reports, and threat intelligence
  • Dictionary attack — Using a wordlist of common passwords and variations to guess credentials
  • Digital signatures — hash the message, then encrypt the hash with the sender
  • Directory services — LDAP, Active Directory — centralized authentication and identity stores
  • Directory traversal — Using \
  • Disable unnecessary services and ports — Reduce potential entry points by turning off what is not needed
  • Disk imaging — Creating a bit-for-bit copy of storage media for analysis without altering the original
  • Diversity — using different vendors, technologies, or paths to avoid common-mode failures
  • DKIM (DomainKeys Identified Mail) — Adds a digital signature to outgoing emails to verify the message was not altered in transit
  • DLL injection — Forcing a process to load a malicious dynamic-link library into its address space
  • DMARC (Domain-based Message Authentication, Reporting & Conformance) — Policy that tells receiving servers what to do when SPF/DKIM fail (none, quarantine, reject)
  • DMZ (Demilitarized Zone) — screened subnet between the internet and internal network for public-facing services
  • DNAT — Destination Network Address Translation: modifies the destination IP of packets as they pass through a router or firewall
  • DNS amplification — Using open DNS resolvers to amplify DDoS attacks — small queries generate large responses
  • DNS hijacking — Compromising a domain
  • DNS over TLS (DoT) — Encrypts DNS queries to prevent eavesdropping and manipulation
  • DNS cache poisoning — Injecting false DNS records into a resolver
  • DNS sinkholes — Redirect malicious domain requests to a controlled server to disrupt botnets and detect infected hosts
  • DNS spoofing — Forging DNS responses to redirect queries to malicious IP addresses
  • DNS tunneling — Encoding data within DNS queries and responses to exfiltrate data or establish C2 channels
  • DNSSEC (DNS Security Extensions) — Adds digital signatures to DNS records to verify authenticity and integrity
  • Documentation — recovery procedures, contact lists, system dependencies, vendor information
  • DOM-based XSS — Script executes by modifying the DOM in the victim
  • Domain hijacking — Taking control of a domain name through social engineering or exploiting weak registrar account security
  • Double extortion — Attackers exfiltrate data before encrypting — threaten to publish if ransom is not paid
  • Downgrade attack — Forcing a system to use a weaker, vulnerable cryptographic protocol or cipher
  • DPO — Data Protection Officer: role required under GDPR to oversee data protection strategy and compliance
  • DSA — Digital Signature Algorithm: FIPS standard for digital signatures using asymmetric cryptography
  • DSL — Digital Subscriber Line: broadband technology providing internet access over telephone lines
  • Due diligence vs. due care — Due diligence is researching and understanding risks; due care is acting responsibly to mitigate them

E

  • E-discovery — Legal process of identifying and collecting electronically stored information (ESI) for litigation
  • ECB — Electronic Code Book: simplest block cipher mode; encrypts blocks independently — insecure for most uses
  • ECC — Elliptic-curve Cryptography: asymmetric cryptography using elliptic curves; smaller keys with equivalent strength to RSA
  • ECDHE — Elliptic-curve Diffie-Hellman Ephemeral: key exchange combining ECC and ephemeral keys for perfect forward secrecy
  • ECDSA — Elliptic-curve Digital Signature Algorithm: digital signature algorithm using elliptic-curve cryptography
  • East-west traffic control — segmentation is essential for monitoring and controlling internal lateral movement
  • East-west vs. north-south traffic — east-west is internal lateral; north-south crosses the network boundary
  • Email encryption — Protects email content in transit and at rest; can be gateway-based or end-to-end
  • Email indicators — Phishing sender addresses, malicious attachment hashes, suspicious URLs in email bodies
  • Encryption — Protecting data at rest and in transit to ensure confidentiality even if intercepted
  • EFS — Encrypted File System: Windows feature for file-level encryption on NTFS volumes
  • EIP — Extended Instruction Pointer: CPU register pointing to the next instruction; a common target in buffer overflow attacks
  • Encryption modes — ECB (insecure, patterns visible), CBC, CTR, GCM (authenticated encryption)
  • Encryption-based ransomware — Encrypts files using strong cryptographic algorithms; data is unrecoverable without the key
  • Environmental controls — Fire suppression, HVAC, and humidity controls protecting physical infrastructure
  • EOL — End of Life: vendor no longer sells or actively develops a product; may still receive security patches
  • EOS — End of Service: vendor no longer provides patches or support; a significant security risk
  • Environmental factors — internal (staffing, technology) and external (regulatory, geopolitical)
  • Ephemeral keys — temporary keys used for a single session; provide perfect forward secrecy
  • Eradication — Removing the threat — deleting malware, closing vulnerabilities, resetting compromised credentials
  • ERP — Enterprise Resource Planning: integrated software for managing core business processes (finance, HR, supply chain)
  • ESN — Electronic Serial Number: unique identifier assigned to mobile devices for network authentication
  • ESP — Encapsulating Security Payload: IPSec protocol providing confidentiality, integrity, and authentication for packets
  • ESSID — Extended Service Set Identifier: name identifying a wireless network spanning multiple access points
  • Evidence collection — logs, configurations, policies, interviews, and observations gathered during audits
  • Evil twin — Rogue access point that mimics a legitimate network
  • Exception process — formal mechanism for requesting and approving deviations from policy
  • Exploitation — Attempting to gain unauthorized access using discovered vulnerabilities
  • External audit — performed by an independent third party; required for certifications and regulatory compliance

F

  • FACL — File System Access Control List: permissions list defining which users or groups can access specific files or directories
  • Failback — returning to the primary system after it is restored
  • Failover — automatic switching to a standby system when the primary fails
  • Fake telemetry — Generating false network data to confuse attackers performing reconnaissance
  • False positives — Legitimate activity that matches IoC patterns — tuning is essential to reduce alert fatigue
  • negatives — Validating scan results to avoid wasting resources or missing real vulnerabilities
  • Faraday cage — Blocks electromagnetic signals; prevents eavesdropping and signal leakage
  • Fencing — Perimeter barriers; height determines deterrence level for physical security
  • FERPA — US law protecting student education records
  • File integrity monitoring — comparing current file hashes to known-good baselines to detect tampering
  • File system permissions — Restricting access to sensitive files and directories
  • File-based indicators — Malicious file hashes, suspicious file names, unexpected file locations
  • Fileless malware — Operates entirely in memory using legitimate tools (PowerShell, WMI) — leaves no files on disk
  • Fileless malware detection — Identifies threats that operate in memory without writing to disk
  • Findings and remediation — audit results include findings (issues) and recommendations with timelines for remediation
  • Firmware updates — BIOS/UEFI and device firmware must be kept current
  • FPGA — Field Programmable Gate Array: reconfigurable integrated circuit; used in hardware security modules and custom crypto
  • FRR — False Rejection Rate: biometric metric measuring how often legitimate users are incorrectly denied access
  • FTP — File Transfer Protocol: protocol for transferring files over TCP; transmits credentials in cleartext
  • FTPS — FTP Secure: FTP with TLS/SSL encryption for secure file transfers
  • Fourth-party risk — risk from your vendor
  • Full disk encryption (FDE) — Encrypts the entire drive to protect data at rest (e.g., BitLocker, FileVault)

G

  • Gamification — using competitions, rewards, and interactive elements to increase engagement
  • GCM — Galois/Counter Mode: authenticated encryption mode combining CTR encryption with Galois MAC for integrity
  • GDPR — EU regulation protecting personal data; applies to any org processing EU residents
  • Geographic considerations — different jurisdictions have different requirements; data sovereignty matters
  • GLBA — US law requiring financial institutions to protect customer information
  • Governance committees — cross-functional groups that review security posture, approve policy changes, and allocate budgets
  • GPG — GNU Privacy Guard: open-source implementation of PGP for encrypting and signing data
  • GPS — Global Positioning System: satellite-based navigation; used in geofencing and mobile device tracking
  • GPU — Graphics Processing Unit: processor optimized for parallel computation; used in password cracking and AI
  • GRE — Generic Routing Encapsulation: tunneling protocol for encapsulating a wide variety of network layer protocols
  • military classifications — Top Secret, Secret, Confidential, Unclassified
  • Guardrails — Safety controls in automation to prevent unintended actions (approval gates, rollback capabilities)
  • Guest networking — NAC can direct unknown or personal devices to an isolated guest network

H

  • Handling procedures — storage, transmission, retention, and destruction rules per classification level
  • Hardening the hypervisor
  • HDD — Hard Disk Drive: magnetic storage device; requires degaussing or physical destruction for secure disposal — patching, disabling unnecessary services, restricting management access, enabling secure boot
  • Hardware Security Module (HSM) — tamper-resistant hardware device that manages keys and performs cryptographic operations
  • Hardware vulnerabilities — Side-channel attacks, firmware flaws (Spectre, Meltdown), end-of-life hardware
  • Hash verification — Using MD5/SHA-256 hashes to prove the forensic copy is identical to the original
  • Health checks — load balancers monitor backend server health and remove unhealthy nodes from rotation
  • HIDS — Host-based Intrusion Detection System: monitors a single host for suspicious activity and policy violations
  • HIPS — Host-based Intrusion Prevention System: monitors and blocks malicious activity on a single host in real time
  • High availability (HA) — measured in \
  • HIPAA — US law protecting health information (PHI); applies to covered entities and business associates
  • HMAC (Hash-based Message Authentication Code) — combines a hash with a secret key to provide integrity AND authentication
  • Honeyfiles — Fake files placed on systems to trigger alerts when accessed by attackers
  • Honeynets — Networks of honeypots simulating an entire environment to study attacker behavior
  • Honeypots — Decoy systems designed to attract and trap attackers for detection and analysis
  • Honeytokens — Fake data (credentials, database records, API keys) that alert when used
  • Host-based firewall — Controls inbound and outbound traffic at the individual device level
  • HIPS) — Monitors system activity and file integrity on the endpoint
  • Host-based indicators — Unexpected processes, registry changes, scheduled tasks, unauthorized accounts, modified system files
  • Host-based vs. network-based — host firewalls protect individual systems; network firewalls protect entire segments
  • HSMaaS — Hardware Security Module as a Service: cloud-based HSM offering cryptographic key management as a managed service
  • HVAC — Heating, Ventilation, and Air Conditioning: environmental controls critical for data center temperature and humidity management
  • HOTP (HMAC-based One-Time Password) — Counter-based OTP that remains valid until used
  • HTML injection — Inserting HTML markup into web pages to alter content or redirect users
  • HTTPS spoofing — Presenting a fraudulent certificate to intercept encrypted web traffic
  • Human factors — Lack of training, social engineering susceptibility, insider threats
  • Human vectors — Social engineering exploiting human psychology as an attack vector
  • Hunt maturity model — Levels from HM0 (initial, relies on automated alerts) to HM4 (leading, creates new detection content)
  • Hybrid attack — Combining dictionary words with brute-force modifications to crack common password patterns
  • Hybrid encryption — uses asymmetric to exchange a symmetric session key, then symmetric for bulk data (TLS uses this)
  • Hypothesis-driven hunting — Starting with an educated guess about attacker behavior and searching for evidence to confirm or deny it

I

  • IaaS — Infrastructure as a Service: cloud model providing virtualized computing resources (VMs, storage, networking)
  • ICS — Industrial Control Systems: hardware and software managing physical processes (SCADA, PLCs, DCS) in critical infrastructure
  • Identity and access management — federated identity, SSO, and strong IAM policies for cloud resources
  • Identity governance — Periodic access reviews and certification to ensure least privilege is maintained
  • Identity lifecycle management — Joiner-mover-leaver processes that track an identity from onboarding to offboarding
  • Identity Provider (IdP) — The organization that authenticates users and vouches for their identity
  • IDF — Intermediate Distribution Frame: cable rack connecting backbone cabling to horizontal cabling within a floor or area
  • IEEE — Institute of Electrical and Electronics Engineers: standards body for networking and electrical engineering (e.g., 802.1X, 802.11)
  • IKE — Internet Key Exchange: protocol that sets up security associations for IPSec VPN tunnels
  • IM — Instant Messaging: real-time text communication; potential vector for social engineering and data leakage
  • IMAP4 — Internet Message Access Protocol v4: email retrieval protocol that stores messages on the server; supports folder sync
  • Immutable infrastructure — servers are never modified after deployment; updates create new instances that replace old ones
  • Impact — Session cookie theft, account hijacking, defacement, keylogging, phishing via injected forms; unauthorized actions as authenticated user
  • Impact categories — financial loss, reputational damage, regulatory penalties, safety, operational disruption
  • Implicit deny — If no rule explicitly grants access, access is denied by default
  • Implicit trust zones — Zero Trust aims to eliminate these; every zone is treated as untrusted by default
  • Indicators of Attack (IoA) — Proactive behavioral signals suggesting an attack is in progress (more real-time than IoCs)
  • Industry standards — voluntary or contractually required frameworks (PCI DSS, ISO 27001, NIST CSF)
  • Influence campaigns — Large-scale disinformation operations to manipulate public opinion
  • Information Sharing and Analysis Centers (ISACs) — Industry-specific organizations for sharing threat intelligence
  • Infrastructure as Code (IaC) — Managing and provisioning infrastructure through code (Terraform, Ansible, Puppet)
  • Inherent risk — risk present before any controls
  • Inline vs. passive deployment — IPS must be inline to block; IDS can be passive via port mirroring
  • Input validation — Allowlisting acceptable characters and rejecting or sanitizing everything else
  • Insecure protocols — Using unencrypted protocols (Telnet, FTP, HTTP, SNMPv1/v2) that expose data in transit
  • Insider threat awareness — recognizing behavioral indicators of potential insider threats
  • Integer overflow — Exceeding the maximum value of an integer variable, causing unexpected behavior
  • Integration APIs — SOAR platforms connect to dozens of security tools to take coordinated action
  • Integrity — Ensuring data is accurate, complete, and unaltered by unauthorized parties
  • Intelligence-driven hunting — Using threat intelligence reports, IoCs, or known TTPs as starting points
  • Internal audit — conducted by the organization
  • Internal vs. external compliance — internal policies may exceed regulatory minimums
  • IP spoofing — Forging the source IP address of packets to impersonate another system or hide the attacker
  • IPSec — Internet Protocol Security: suite of protocols providing encryption, integrity, and authentication at the network layer
  • IRC — Internet Relay Chat: text-based communication protocol; historically used for botnet command and control
  • IRP — Incident Response Plan: documented procedures for detecting, analyzing, containing, and recovering from incidents
  • ISA — Interconnection Security Agreement: agreement specifying security requirements for connecting two organizations’ networks
  • ISFW — Internal Segmentation Firewall: firewall deployed inside the network to enforce zero-trust segmentation between zones
  • 27002 — international standard for information security management systems (ISMS); 27001 is certifiable
  • ISO — International Organization for Standardization: standards body publishing frameworks like ISO 27001 for information security management
  • ISP — Internet Service Provider: company providing internet connectivity to customers
  • ISSO — Information Systems Security Officer: person responsible for maintaining the security posture of an information system
  • ITCP — IT Contingency Plan: plan for restoring IT systems and services after a disruption
  • IV — Initialization Vector: random value combined with a key to ensure identical plaintexts encrypt differently

J

  • Jamming — Flooding the wireless spectrum with noise to prevent legitimate wireless communication (DoS)
  • journald — Linux systemd journal for structured logging
  • jump server — hardened system used to access management networks securely
  • Just-in-time (JIT) access — Granting privileged access only when needed and automatically revoking it after a set period

K

  • KEK — Key Encryption Key: key used to encrypt other keys for secure key distribution and storage
  • Kerberoasting — Extracting and cracking service account ticket hashes from Active Directory
  • Kerberos — Ticket-based authentication protocol used in Active Directory environments; uses port 88
  • Key escrow — third party holds a copy of the key for recovery; controversial due to trust implications
  • Key length — longer keys = stronger encryption; AES-256 is the current gold standard
  • secret sharing — divide a key among multiple custodians; requires a threshold to reconstruct (Shamir
  • Key stretching — Techniques (PBKDF2, bcrypt, scrypt) that make brute force against passwords computationally expensive
  • Keylogger — Records keystrokes to capture passwords, credit card numbers, and other sensitive input
  • Keylogging — Capturing passwords as users type them using hardware or software keyloggers
  • Known plaintext attack — Attacker has both plaintext and corresponding ciphertext and uses them to derive the key
  • KRACK (Key Reinstallation Attack) — Exploiting a flaw in WPA2

L

  • L2TP — Layer 2 Tunneling Protocol: VPN tunneling protocol often paired with IPSec for encryption (L2TP/IPSec)
  • Labeling and marking — applying headers, footers, watermarks, or metadata tags to classified data
  • Lateral movement — Ransomware and attackers spread across the network before detonating to maximize impact
  • LDAP injection — Manipulating LDAP queries to bypass authentication or enumerate directory information
  • LEAP — Lightweight Extensible Authentication Protocol: Cisco proprietary EAP method; considered insecure due to weak MS-CHAPv2 usage
  • Least functionality principle — Systems should only have the minimum capabilities needed for their role
  • Least privilege — Users and processes should only have the minimum permissions necessary to perform their function
  • Least privilege enforcement — Ensuring even administrators only have access to what their role requires
  • Legal hold — Directive to preserve all relevant data when litigation is anticipated
  • Post-incident review — Documenting what happened, what worked, what failed, and how to improve
  • Lighting — Well-lit areas deter criminal activity and are critical for CCTV effectiveness
  • Live forensics vs. dead forensics — Live = analyzing a running system (captures volatile data); dead = analyzing powered-off media
  • Live migration security — encrypting VM data during migration between hosts to prevent interception
  • Locker ransomware — Locks the user out of the system entirely without necessarily encrypting files
  • Locks — Mechanical, electronic, and biometric locks as physical access control mechanisms
  • Log aggregation — Collecting logs from firewalls, servers, endpoints, applications, and cloud services into one platform
  • Log forwarding agents — Software installed on endpoints to collect and send logs to central systems
  • Log integrity — Protecting logs from tampering using write-once storage, hashing, or digital signatures
  • Log retention policies — Defining how long logs are stored based on regulatory and organizational requirements
  • Log sources — OS event logs, firewall logs, IDS/IPS alerts, authentication logs, application logs, DNS query logs, proxy logs
  • Logic bomb — Malicious code that triggers when specific conditions are met (date, user action, system event)
  • Logical segmentation — VLANs, subnets, and software-defined boundaries on shared infrastructure

M

  • MaaS — Monitoring as a Service: cloud-based service providing infrastructure and application monitoring
  • MAC flooding — Overwhelming a switch
  • Maintenance windows
  • MAM — Mobile Application Management: managing and securing specific apps on mobile devices without controlling the entire device
  • MAN — Metropolitan Area Network: network spanning a city or campus, larger than a LAN but smaller than a WAN — Scheduled periods for implementing changes with minimal user impact
  • Man-in-the-Browser (MitB) — Malware in the browser modifies transactions in real time (e.g., changing bank account numbers)
  • Maximum Tolerable Downtime (MTD) — the longest period a function can be unavailable before causing irreversible damage
  • MBR — Master Boot Record: first sector of a storage device containing boot code; target of bootkits and rootkits
  • MD5 — Message Digest 5: 128-bit hash algorithm; cryptographically broken and unsuitable for security use
  • MDF — Main Distribution Frame: primary cable rack connecting external lines to internal network cabling
  • Mean Time Between Failures (MTBF) — average time a system operates before failing
  • Mean Time to Repair (MTTR) — average time to fix a failed component
  • Memory vulnerabilities — Buffer overflows, use-after-free, memory leaks that can be exploited for code execution
  • MFD — Multifunction Device: device combining printing, scanning, faxing, and copying; a potential data leakage vector
  • MFP — Multifunction Printer: network printer with scanning and faxing capabilities; must be secured against unauthorized access
  • Metamorphic malware — Completely rewrites its own code while maintaining functionality to evade detection
  • Metrics — phishing click rates, training completion rates, incident report volumes, time to report
  • Metrics and reporting — Tracking MTTR, MTTD, analyst workload, and automation effectiveness
  • MFA fatigue attacks — Attackers bombard users with push notifications hoping they approve one
  • Micro-segmentation — granular segmentation within a network, often at the workload level
  • MMS — Multimedia Message Service: mobile messaging protocol for sending images, audio, and video; potential smishing vector
  • MOA — Memorandum of Agreement: formal document outlining mutual terms between parties; more binding than an MOU
  • MOU — Memorandum of Understanding: non-binding agreement between parties outlining intended cooperation and responsibilities
  • Misconfigurations — Default settings, open ports, unnecessary services, overly permissive rules — the most common vulnerability type
  • MITRE ATT&CK framework — Knowledge base of adversary tactics, techniques, and procedures (TTPs) used to structure hunts
  • Mobile Device Management (MDM) — Centralized control of mobile endpoints — remote wipe, enforce policies, manage apps
  • Monitoring and reporting — KPIs and KRIs measure governance effectiveness and communicate risk to leadership
  • MPLS — Multiprotocol Label Switching: high-performance routing technique using labels instead of IP lookups for packet forwarding
  • MS-CHAP — Microsoft Challenge-Handshake Authentication Protocol: Microsoft authentication protocol; v2 is used in VPNs but has known vulnerabilities
  • MSA — Measurement Systems Analysis: methodology for evaluating the accuracy and precision of measurement systems
  • MSP — Managed Service Provider: company providing outsourced IT management and support services
  • MSSP — Managed Security Service Provider: company providing outsourced security monitoring, SIEM management, and incident response
  • MTTF — Mean Time to Failure: average time a non-repairable component operates before failing
  • MTU — Maximum Transmission Unit: largest packet size that can be transmitted without fragmentation on a network segment
  • Multitenancy risks — data isolation between tenants; side-channel attacks; resource contention

N

  • NAS — Network-attached Storage: dedicated file storage device connected to a network; requires access controls and encryption
  • Nation-state actors — Advanced Persistent Threat (APT) groups sponsored by governments with significant resources and long-term objectives
  • NDA — Non-disclosure Agreement: legal contract preventing disclosure of confidential information
  • Need to know — Access to information is restricted to those who require it for their role
  • IPFIX — Protocols that collect metadata about network traffic flows without capturing full packets
  • Network segmentation — Dividing the network into isolated zones to limit lateral movement and blast radius
  • Network taps — Hardware devices that copy network traffic for monitoring without affecting the traffic flow
  • Network zones — segments with different trust levels (DMZ, internal, guest, management)
  • IPS — Inline or passive devices that inspect network traffic for known attack signatures and anomalies
  • Network-based indicators — Known malicious IPs, suspicious domains, unusual outbound connections, C2 traffic patterns
  • NFV — Network Function Virtualization: replacing dedicated network hardware (firewalls, IDS) with virtualized software instances
  • NFC attacks
  • NGFW — Next-generation Firewall: firewall combining traditional packet filtering with deep packet inspection, IPS, and application awareness
  • NG-SWG — Next-generation Secure Web Gateway: advanced web gateway combining URL filtering, DLP, CASB, and threat protection
  • NIC — Network Interface Card: hardware component connecting a device to a network
  • NIDS — Network-based Intrusion Detection System: monitors network traffic for suspicious patterns and policy violations
  • NIPS — Network-based Intrusion Prevention System: monitors and blocks malicious network traffic in real time
  • NIST Cybersecurity Framework (CSF) — Identify, Protect, Detect, Respond, Recover; voluntary, widely adopted in the US
  • NIST IR lifecycle — Preparation → Detection & Analysis → Containment, Eradication & Recovery → Post-Incident Activity
  • NIST SP 800-53 — comprehensive catalog of security and privacy controls for federal systems
  • NOC — Network Operations Center: centralized facility for monitoring and managing network infrastructure
  • Non-persistence — systems rebuilt from known-good images; live boot media, revert to snapshot
  • Non-repudiation — Ensures actions cannot be denied after the fact; achieved through digital signatures and audit trails
  • Normalization — Converting logs from different formats into a common schema for analysis
  • Notable examples — WannaCry, NotPetya, LockBit, BlackCat/ALPHV — major ransomware campaigns
  • NTP synchronization — All systems must use the same time source — accurate timestamps are critical for event correlation
  • NTFS — New Technology File System: Windows file system supporting permissions, encryption (EFS), and auditing
  • NTLM — New Technology LAN Manager: legacy Windows authentication protocol; vulnerable to pass-the-hash attacks
  • NTP — Network Time Protocol: protocol for clock synchronization; critical for log correlation and Kerberos authentication

O

  • OAuth 2.0 — Authorization framework for delegated access; issues access tokens (not authentication)
  • OCSP — Online Certificate Status Protocol: real-time protocol for checking the revocation status of an X.509 certificate
  • Offboarding
  • OID — Object Identifier: unique numeric identifier for objects in certificate and SNMP schemas — revoking access, retrieving data, and ensuring secure data destruction when a vendor relationship ends
  • Open design principle — Security mechanisms should not depend on secrecy of implementation
  • Open service ports — Unnecessary services listening on the network increase the attack surface
  • OpenID Connect — Modern federation protocol built on OAuth 2.0; uses JSON Web Tokens (JWT)
  • OpenID Connect (OIDC) — Authentication layer built on top of OAuth 2.0, commonly used for consumer-facing SSO
  • Operational intelligence — Details about specific campaigns or threat actor groups to inform security teams
  • Orchestration — Connecting and coordinating multiple security tools (SIEM, firewalls, EDR, ticketing) through APIs
  • OSI — Open Systems Interconnection: seven-layer reference model for network communication
  • OSINT — Open-source Intelligence: intelligence gathered from publicly available sources (social media, DNS, public records)
  • OSPF — Open Shortest Path First: link-state routing protocol for interior gateway routing within an autonomous system
  • OTA — Over-The-Air: wireless delivery of firmware or software updates to mobile and IoT devices
  • OTG — On-The-Go: USB specification allowing mobile devices to act as a host for peripherals
  • OVAL — Open Vulnerability and Assessment Language: XML-based language for expressing system configuration and vulnerability checks
  • OWASP — Open Web Application Security Project: community producing the OWASP Top 10 list of critical web application security risks
  • Order of restoration — critical systems first, based on BIA priorities and RTO requirements
  • Order of volatility — Collect the most volatile evidence first — CPU registers → RAM → swap → disk → logs → network → archival media

P

  • P12 — PKCS #12: file format for storing a certificate chain and private key in a single encrypted file
  • P2P — Peer-to-Peer: decentralized network model where nodes communicate directly without a central server
  • PaaS — Platform as a Service: cloud model providing a managed platform for developing and deploying applications
  • PAC — Proxy Auto Configuration: script that directs a browser to the correct proxy server for a given URL
  • Packet capture (PCAP) — Full capture of network packets for deep analysis using tools like Wireshark or tcpdump
  • PAP — Password Authentication Protocol: authentication protocol transmitting credentials in cleartext; highly insecure
  • Prepared statements — The primary defense against SQL injection — separates code from data so input is never executed as SQL
  • Pass-the-hash — Using a captured NTLM hash to authenticate without knowing the actual plaintext password
  • Password hashing — uses salting and key stretching to protect stored passwords
  • Password spraying — Trying a small number of common passwords against many accounts to avoid lockout thresholds
  • PAT — Port Address Translation: NAT variant mapping multiple private IPs to a single public IP using port numbers
  • PBKDF2 — Password-based Key Derivation Function 2: key stretching algorithm that applies a pseudorandom function iteratively to slow brute-force attacks
  • PBX — Private Branch Exchange: private telephone switching system within an organization; target for toll fraud and eavesdropping
  • Password vaulting — Storing privileged credentials in an encrypted vault; users check out passwords for time-limited sessions
  • Passwordless authentication — FIDO2/WebAuthn, passkeys — eliminates password-related vulnerabilities entirely
  • Patch management — Keeping OS and applications up to date to close known vulnerabilities
  • Patching — Applying vendor-supplied fixes to close known vulnerabilities — the most fundamental mitigation
  • PCI DSS — payment card industry standard; required for any organization handling cardholder data
  • PDU — Power Distribution Unit: device distributing electrical power to rack-mounted equipment in a data center
  • PEAP — Protected Extensible Authentication Protocol: EAP method that wraps EAP inside a TLS tunnel for secure wireless authentication
  • PED — Portable Electronic Device: mobile computing devices (laptops, tablets, phones) requiring endpoint security controls
  • Perfect forward secrecy (PFS) — compromising long-term keys does not compromise past session keys
  • Permission inheritance — Child objects inherit permissions from parent containers in access control systems
  • PGP — Pretty Good Privacy: encryption program providing cryptographic privacy and authentication for data and email
  • Phases — Planning/scoping → Reconnaissance → Scanning → Exploitation → Post-exploitation → Reporting
  • PHI (Protected Health Information) — health-related PII governed by HIPAA
  • Phishing — Fraudulent emails impersonating legitimate entities to steal credentials or deliver malware
  • Phishing simulations — controlled phishing emails sent to employees to test awareness and measure click rates
  • Physical controls — Locks, fences, mantraps, and security guards as physical access control mechanisms
  • Physical segmentation — separate physical network infrastructure for different zones
  • PII (Personally Identifiable Information) — data that can identify an individual (name, SSN, email, biometrics)
  • Pivoting — Using a compromised system as a launchpad to attack internal networks
  • PKCS — Public Key Cryptography Standards: set of standards for public-key cryptography published by RSA Laboratories
  • Runbooks — Predefined workflows that codify incident response procedures into automated steps
  • Policies, standards, baselines, guidelines, procedures — the governance hierarchy from most authoritative to most flexible
  • Policy actions — alert, block, encrypt, quarantine, log, notify manager
  • Policy administrator — Establishes and removes communication paths based on policy engine decisions in Zero Trust
  • Policy as code — defining security policies in code that automatically validates IaC templates before deployment
  • Policy enforcement point (PEP) — Gateway that enforces access decisions at the data plane level in Zero Trust
  • Policy engine — Evaluates access requests against policies, risk signals, and threat intelligence in Zero Trust
  • Policy lifecycle — create, approve, distribute, enforce, review, revise, retire
  • PoC — Proof of Concept: demonstration that a vulnerability or exploit is feasible
  • Polymorphic malware — Changes its code signature with each infection to evade signature-based detection
  • POP — Post Office Protocol: email retrieval protocol that downloads messages to a client and deletes them from the server
  • Port mirroring (SPAN) — Switch feature that copies traffic from one port to a monitoring port
  • Port scanning — Enumerating open ports and services on target systems during the reconnaissance phase
  • POTS — Plain Old Telephone Service: traditional analog telephone service; war dialing targets POTS-connected modems
  • Potentially Unwanted Programs (PUPs) — Adware, toolbars, and bundled software that degrades security without being strictly malicious
  • PPP — Point-to-Point Protocol: data link layer protocol for direct connections between two network nodes
  • PPTP — Point-to-Point Tunneling Protocol: legacy VPN protocol; considered insecure due to weak encryption
  • Preparation — Building the IR team, creating playbooks, deploying tools, conducting tabletop exercises
  • Pretexting — Creating a fabricated scenario to gain trust and extract information from a target
  • Preventive, Detective, Corrective — Security controls categorized by when they act relative to an incident
  • Principle of least privilege — Grant only the minimum access necessary for a role or task
  • Privacy by design — embedding privacy controls into systems from the beginning, not as an afterthought
  • Privacy Impact Assessment (PIA) — evaluates how a project or system will affect individual privacy
  • Privilege escalation — Exploiting flaws to gain higher-level access (vertical) or access other users
  • Privileged accounts — Service accounts, admin accounts, and root accounts require additional controls
  • Protocol analysis — Inspecting traffic to detect protocol misuse or tunneling (e.g., DNS tunneling for data exfiltration)
  • PSK — Pre-Shared Key: shared secret used in symmetric encryption and Wi-Fi authentication (WPA-PSK)
  • PTZ — Pan-Tilt-Zoom: camera capability for remote directional and zoom control in video surveillance systems
  • Protocol attacks — Exploiting protocol weaknesses to consume server resources (SYN flood, Ping of Death, Smurf attack)
  • Provisioning and deprovisioning — Creating, modifying, and removing user accounts throughout the identity lifecycle
  • Pseudonymization — replaces identifiers with pseudonyms; reversible with a key
  • Push notifications — Authentication apps send approve/deny prompts to registered devices

Q

  • QA — Quality Assurance: processes ensuring software and systems meet defined quality and security standards
  • Qualitative risk assessment — uses subjective ratings (high, medium, low) based on expert judgment; faster but less precise
  • Qualitative vs. quantitative analysis — qualitative uses categories (high/medium/low); quantitative uses dollar values (SLE, ALE, ARO)
  • Quantitative risk assessment — uses numerical values and formulas; more precise but requires reliable data
  • Quantum computing threat — Shor’s algorithm threatens RSA and ECC; driving transition to post-quantum cryptography
  • QoS — Quality of Service: network mechanism prioritizing traffic to ensure performance for critical applications

R

  • RA — Registration Authority: entity that verifies certificate requests before the CA issues certificates
  • TOCTOU — Exploiting the timing gap between checking a condition and using the result
  • Race conditions — Timing-dependent flaws where concurrent processes can interfere with each other
  • RADIUS — UDP-based AAA protocol that encrypts only the password; commonly used for Wi-Fi and VPN authentication
  • RAD — Rapid Application Development: software development methodology emphasizing quick prototyping and iterative delivery
  • RAID — Redundant Array of Inexpensive Disks: disk redundancy technique; RAID 1 mirrors, RAID 5 stripes with parity, RAID 10 combines both
  • Rainbow table attack
  • RAM — Random Access Memory: volatile memory; forensic imaging must capture RAM before power-off to preserve evidence
  • RAS — Remote Access Server: server providing authentication and connectivity for remote users — Using precomputed hash-to-password lookup tables to crack hashed passwords quickly
  • Ransomware-as-a-Service (RaaS) — Criminal developers provide ransomware tools to affiliates in exchange for a cut of profits
  • RAT (Remote Access Trojan) — Gives attackers full remote control of a compromised system
  • RC4 — Rivest Cipher version 4: stream cipher formerly used in WEP and TLS; deprecated due to known vulnerabilities
  • RCS — Rich Communication Services: enhanced messaging protocol succeeding SMS with multimedia and group chat features
  • Real-time alerting — Immediate notification when correlation rules or thresholds are triggered
  • Reconnaissance — Passive (OSINT, DNS lookups) and active (port scanning, service enumeration) information gathering
  • Recovery — Restoring systems to normal operations, monitoring for re-infection
  • Recovery Point Objective (RPO) — the maximum acceptable data loss measured in time (e.g., 4 hours of transactions)
  • Recovery Time Objective (RTO) — the target time to restore a function after disruption; must be less than MTD
  • Red team vs. pen test — Red teams simulate real adversaries over extended periods; pen tests are time-boxed technical assessments
  • Reflected XSS — Malicious script in a URL parameter is reflected back in the server
  • Registry and GPO hardening — Windows Group Policy Objects enforce security settings across domains
  • RFC — Request for Comments: IETF documents defining internet standards, protocols, and best practices
  • Regulatory audit — mandated by a governing body (e.g., PCI QSA audit for PCI DSS compliance)
  • Regulatory compliance — meeting requirements imposed by law (GDPR, HIPAA, SOX, GLBA, FERPA)
  • Relay attacks — Forwarding authentication exchanges between a victim and a legitimate service (common with NFC/RFID)
  • Remediation network — quarantine VLAN where non-compliant devices are placed to receive updates
  • Remediation vs. mitigation — Remediation fixes the vulnerability; mitigation reduces the risk without fully eliminating it
  • Remove default accounts and passwords — Default credentials are publicly known and easily exploited
  • Replay attack — Capturing and retransmitting valid network traffic to gain unauthorized access or duplicate transactions
  • Replication — real-time or near-real-time copying of data to a secondary location
  • Residual risk — risk remaining after controls are applied
  • Resource contention — VMs competing for shared CPU, memory, storage, and network resources
  • Resource exhaustion — Consuming all available memory, CPU, disk, or connections to cause denial of service
  • Retention and archival — Storing log data for compliance requirements and forensic investigations
  • Revocation — CRL or OCSP; reasons include key compromise, CA compromise, or affiliation change
  • RFID cloning — Copying RFID badge data to create unauthorized duplicate access cards
  • RIPEMD — RACE Integrity Primitives Evaluation Message Digest: family of cryptographic hash functions; RIPEMD-160 produces a 160-bit hash
  • ROI — Return on Investment: financial metric used to justify security spending by comparing cost vs. risk reduction
  • Right to audit — contractual clause allowing the organization to audit the vendor
  • IRM) — controls that persist with the data (who can view, edit, print, forward)
  • Risk = Threat x Vulnerability x Impact — all three factors must be present for risk to exist
  • Risk appetite vs. risk tolerance — appetite is the overall willingness to take risk; tolerance is the acceptable deviation from appetite
  • Risk identification — asset inventory, threat modeling, vulnerability scanning
  • heat map — visual tool plotting likelihood vs. impact
  • Risk register — a living document tracking identified risks, owners, responses, and status
  • Risk-based prioritization — Considering exploit availability, asset criticality, and exposure when deciding remediation order
  • Risks — Automation of bad processes amplifies mistakes; credential management for automated tools; single point of failure
  • Rogue access point — Unauthorized AP connected to the corporate network, creating a backdoor past perimeter security
  • Rogue DHCP server — Unauthorized DHCP server providing malicious gateway or DNS settings to clients
  • Role-Based Access Control (RBAC) — Assigning permissions based on job roles rather than individual users
  • Role-based training — different roles receive different training (developers learn secure coding; executives learn BEC threats)
  • Roles and responsibilities — CISO, data owner, data custodian, data steward, data processor, data controller
  • Root cause analysis — EDR tools trace the full attack chain from initial access to impact
  • Rootkit — Hides deep in the OS (kernel-level or boot-level) to maintain persistent, stealthy access
  • RSA — Rivest, Shamir, and Adleman: widely used asymmetric encryption algorithm based on the difficulty of factoring large primes
  • RTBH — Remotely Triggered Black Hole: DDoS mitigation technique that drops malicious traffic at the network edge via BGP
  • RTOS — Real-time Operating System: OS designed for time-critical embedded systems (industrial, medical, automotive)
  • RTP — Real-time Transport Protocol: protocol for delivering audio and video over IP networks; used in VoIP
  • Rules of engagement (ROE) — Legal document defining scope, timing, allowed techniques, and emergency contacts

S

  • MIME — Certificate-based encryption and digital signing of email content
  • SaaS — Software as a Service: cloud model delivering applications over the internet on a subscription basis
  • SAE — Simultaneous Authentication of Equals: password-based key exchange in WPA3 that resists offline dictionary attacks (Dragonfly)
  • Salting — Adding random data to passwords before hashing to defeat rainbow table attacks
  • SAML — Most common enterprise federation protocol; uses XML assertions exchanged via browser redirects
  • SAML (Security Assertion Markup Language) — XML-based standard for exchanging authentication and authorization data between an IdP and SP
  • Sandboxing — using VMs as isolated environments for testing suspicious code or malware analysis
  • SCADA — Supervisory Control and Data Acquisition: system for monitoring and controlling industrial processes; high-value target for attackers
  • Scalability
  • SCAP — Security Content Automation Protocol: NIST suite of standards for automated vulnerability management and compliance checking
  • SCCM — Microsoft System Center Configuration Manager: enterprise tool for software deployment, patch management, and endpoint configuration
  • SCEP — Simple Certificate Enrollment Protocol: protocol for automated certificate enrollment with a certificate authority — vertical (scale up: more resources) vs. horizontal (scale out: more instances)
  • Scan scheduling — Regular scans (weekly, monthly) plus ad-hoc scans after major changes
  • Scheduling algorithms — round-robin, least connections, weighted, IP hash, health-based
  • privacy screens — Physical filters that prevent shoulder surfing by limiting viewing angles
  • Screened subnet (DMZ) — uses firewalls to create a buffer zone for public-facing services
  • SDK — Software Development Kit: set of tools, libraries, and documentation for building applications on a specific platform
  • SDLC — Software Development Life Cycle: structured phases (planning, design, coding, testing, deployment) for developing software securely
  • SDLM — Software Development Life-cycle Methodology: framework guiding the SDLC process (Agile, Waterfall, DevSecOps)
  • SDV — Software-defined Visibility: programmable network visibility providing dynamic traffic monitoring and analysis
  • Scripting languages — Bash, PowerShell, Python are the most common in security operations
  • Secrets management — storing credentials, keys, and tokens securely in cloud environments
  • Secure Access Service Edge (SASE) — cloud-delivered convergence of network and security services
  • SED — Self-Encrypting Drive: storage drive with built-in hardware encryption that protects data at rest automatically
  • SEH — Structured Exception Handling: Windows mechanism for handling exceptions; can be exploited in buffer overflow attacks
  • Secure areas — Server rooms, data centers, and wiring closets requiring restricted physical access
  • Secure baseline images — Golden images with pre-hardened configurations for consistent deployment
  • Secure email gateway — Filters inbound and outbound email for spam, phishing, malware, and DLP violations
  • Security awareness training — Educating users to recognize and respond to social engineering and phishing attacks
  • SFTP — SSH File Transfer Protocol: file transfer protocol using SSH for encrypted, authenticated file transfers
  • Security baselines and hardening — Configuring systems according to CIS Benchmarks or STIGs before deployment
  • Security guards — Human element providing judgment-based physical access control
  • Security layers — From outer to inner: perimeter, network, host, application, data — the layers of defense-in-depth
  • Security through obscurity — Relying on secrecy of design rather than robust controls; considered insufficient on its own
  • Self-service capabilities — Password resets and profile updates reduce helpdesk burden while maintaining security
  • Separation of duties — Dividing critical tasks among multiple people to prevent fraud and detect errors
  • Server-Side Request Forgery (SSRF) — Tricking the server into making requests to internal resources on behalf of the attacker
  • Service account management — Tracking and securing non-human accounts used by applications and scripts
  • Service Level Agreements (SLAs) — contractual terms defining uptime, response times, and security obligations
  • Service Provider (SP) — The organization that accepts identity assertions from the IdP
  • Session hijacking — Stealing or predicting a valid session token to impersonate an authenticated user
  • SIM — Subscriber Identity Module: smart card storing mobile subscriber identity; target of SIM swapping attacks
  • SIP — Session Initiation Protocol: signaling protocol for initiating and managing VoIP and video calls
  • Session recording — Recording all actions taken during privileged sessions for audit and forensic purposes
  • Session replay — Capturing and retransmitting a valid authentication exchange to gain unauthorized access
  • Shared responsibility model — security \
  • Shoulder surfing — Physically observing someone entering their password or viewing sensitive information
  • Side-channel attacks — Exploiting physical characteristics (timing, power, EM emissions) rather than algorithmic weaknesses
  • Single point of failure (SPOF) — any component whose failure would bring down an entire system
  • SLE — Single Loss Expectancy: monetary loss expected from a single occurrence of a risk event; SLE = AV x EF
  • SMB — Server Message Block: Windows file sharing protocol; vulnerable to exploits like EternalBlue
  • SMS — Short Message Service: text messaging service; insecure for MFA due to SIM swapping and interception risks
  • SMTP — Simple Mail Transfer Protocol: protocol for sending email; can be secured with STARTTLS
  • SMTPS — Simple Mail Transfer Protocol Secure: SMTP over TLS for encrypted email transmission
  • Single point of failure risk — If SSO is compromised, all linked applications are at risk
  • Single-factor authentication (SFA) — Uses one authentication factor; least secure authentication method
  • Slowloris — Keeps many HTTP connections open by sending partial headers, exhausting the server
  • Smishing — SMS-based phishing via text messages
  • Smurf attack — Sending ICMP echo requests with spoofed source (victim
  • Snapshot management — snapshots capture VM state; old snapshots may contain outdated or vulnerable configurations
  • SNMP (Simple Network Management Protocol) — Used to monitor and manage network devices; SNMPv3 adds encryption and authentication
  • SOAP — Simple Object Access Protocol: XML-based messaging protocol for web services; vulnerable to XML injection attacks
  • SoC — System on Chip: integrated circuit combining CPU, memory, and peripherals on a single chip
  • SOC reports — SOC 1 (financial controls), SOC 2 (security/availability/confidentiality), SOC 3 (public summary)
  • Software-Defined Networking (SDN) — programmatic control of network infrastructure; separates control plane from data plane
  • Software-defined perimeter (SDP) — Creates one-to-one encrypted connections between users and resources; hides infrastructure
  • Something you are — Biometrics — fingerprint, facial recognition, iris scan, voice recognition
  • Something you do — Behavioral biometrics such as typing patterns or gait analysis (less common on exam)
  • Something you have — Smart cards, hardware tokens (YubiKey), mobile authenticator apps, OTP devices
  • Something you know — Passwords, PINs, security questions
  • Somewhere you are — Geolocation or IP-based restrictions (sometimes considered a factor)
  • SOX (Sarbanes-Oxley) — US law requiring financial reporting integrity and internal controls
  • SPF (Sender Policy Framework) — DNS TXT record that specifies which mail servers are authorized to send email for a domain
  • SPIM — Spam over Instant Messaging: unsolicited messages sent via IM platforms; vector for phishing and malware
  • Spyware
  • SRTP — Secure Real-time Transport Protocol: encrypted version of RTP for securing VoIP and video communications
  • SSD — Solid State Drive: flash-based storage; requires crypto-erase for secure disposal since degaussing is ineffective
  • SSID — Service Set Identifier: name of a wireless network broadcast by an access point — Secretly monitors user activity, capturing keystrokes, screenshots, or browsing habits
  • SQL injection (SQLi) — Inserting SQL commands into input fields to manipulate database queries — can read, modify, or delete data
  • TLS interception (SSL proxy) — Using a trusted certificate to decrypt, inspect, and re-encrypt TLS traffic
  • TLS offloading — load balancer handles encryption/decryption, reducing server workload
  • TLS stripping — Downgrading an HTTPS connection to HTTP so the attacker can read traffic in plaintext
  • STIG (Security Technical Implementation Guide) — DoD-specific hardening standards for government systems
  • STP — Shielded Twisted Pair: network cabling with shielding to reduce electromagnetic interference
  • STIX (Structured Threat Information eXpression) — Standardized language for describing cyber threat information
  • TAXII — Standards for formatting (STIX) and sharing (TAXII) IoC data between organizations
  • Stored (Persistent) XSS — Malicious script permanently stored on the server — affects all users who view the infected content
  • Stored procedures — Pre-compiled database queries that can limit injection surface when used correctly
  • Strategic intelligence — High-level trends and risks for executive decision-making
  • Succession planning — ensuring leadership continuity if key personnel are unavailable
  • Supply chain risk — compromised hardware, software, or services introduced through the supply chain (e.g., SolarWinds)
  • SWG — Secure Web Gateway: proxy that filters web traffic, enforces URL policies, and blocks malicious content
  • SYN flood — Sending many TCP SYN packets without completing the handshake, filling the target
  • Syslog — Standard protocol (UDP 514, TCP 514, or TLS 6514) for transmitting log data to a centralized server

T

  • Tabletop exercises — Discussion-based simulations that walk through IR scenarios without touching systems
  • TCP/IP — Transmission Control Protocol/Internet Protocol: foundational protocol suite for internet communication
  • TACACS+ — TCP-based AAA protocol that encrypts the entire payload; separates AAA functions independently
  • Tactical intelligence — TTPs (tactics, techniques, procedures) used by adversaries — informs detection rules
  • Piggybacking — Following an authorized person through a secured door without independent authentication
  • TAXII (Trusted Automated eXchange of Intelligence Information) — Protocol for exchanging STIX data
  • Technical controls — Firewalls, encryption, access control systems, IDS — technology-based security mechanisms
  • TGT — Ticket Granting Ticket: Kerberos token obtained during initial authentication; used to request service tickets
  • TKIP — Temporal Key Integrity Protocol: encryption protocol used in WPA; deprecated in favor of CCMP/AES in WPA2
  • Technical intelligence — Specific IoCs — IP addresses, file hashes, domain names — fed into security tools
  • Telemetry correlation (XDR) — Combines data from endpoints, network, cloud, and email to detect multi-vector attacks
  • Testing the DRP — same test types as BCP (tabletop, simulation, parallel, full interruption)
  • Testing types — Black box (no prior knowledge), white box (full knowledge), gray box (partial knowledge)
  • supply chain risks — Vulnerabilities in vendor software, libraries, or dependencies (e.g., Log4Shell)
  • Threat actor profiling — Understanding adversary motivation, capability, and intent
  • Threat assessment — evaluating threat sources and their capabilities
  • Threat containment — Ability to isolate a compromised endpoint from the network in real time
  • Threat feeds — Automated IoC data streams from commercial and open-source providers for security monitoring
  • Threat intelligence enrichment — Automatically querying threat feeds to add context to alerts before analysts review them
  • Threat intelligence integration — EDR/XDR platforms cross-reference activity with known threat indicators
  • Timeline analysis — Reconstructing the sequence of events using file timestamps, logs, and artifacts
  • Token-based authentication — SSO systems issue tokens (JWT, SAML assertions) that prove identity to relying parties
  • Tokenization — replaces sensitive data with non-sensitive tokens; original data stored in a secure vault
  • TOTP (Time-based One-Time Password) — Algorithm that generates codes valid for a short time window (e.g., Google Authenticator)
  • Training frequency — onboarding training plus regular refreshers (annual at minimum, quarterly preferred)
  • Transitive trust — If A trusts B and B trusts C, A may transitionally trust C — this can introduce risk
  • Triple extortion — Adds DDoS attacks or contacting victims
  • Trojan — Malware disguised as legitimate software; provides backdoor access or delivers additional payloads
  • TSIG — Transaction Signature: DNS authentication mechanism using shared secrets to verify DNS updates and zone transfers
  • Trust relationships — Formal agreements between identity providers and service providers defining how identity data is shared
  • Trusted Platform Module (TPM) — chip on the motherboard that stores keys and supports measured boot
  • Tuning — adjusting sensitivity and rules to reduce false positives without increasing false negatives
  • Typosquatting — Registering domains similar to legitimate ones to capture mistyped URLs
  • URL hijacking — Registering look-alike domains (e.g., googel.com) to capture users who mistype URLs

U

  • UAT — User Acceptance Testing: final testing phase where end users verify the system meets business requirements
  • UDP — User Datagram Protocol: connectionless transport protocol; faster but unreliable compared to TCP
  • UEFI — Unified Extensible Firmware Interface: modern firmware interface replacing BIOS; supports Secure Boot to prevent rootkits
  • Unified Threat Management (UTM) — all-in-one appliance combining firewall, IDS/IPS, antivirus, content filtering, VPN
  • Unpatched software — Known vulnerabilities with available fixes that have not been applied — one of the most exploited vulnerability types
  • Use cases — specific automation scenarios: user provisioning, alert triage, patch deployment, threat containment
  • User and Entity Behavior Analytics (UEBA) — uses ML to baseline normal user/entity behavior and detect anomalies indicating insider threats or compromise
  • URI — Uniform Resource Identifier: string identifying a resource by location (URL) or name (URN)
  • URL — Universal Resource Locator: web address specifying the protocol and location of an internet resource
  • USB OTG — USB On-The-Go: USB spec allowing mobile devices to act as host; potential vector for juice jacking
  • UTP — Unshielded Twisted Pair: common network cabling without shielding; susceptible to electromagnetic interference

V

  • VBA — Visual Basic for Applications: macro language in Microsoft Office; commonly exploited in malicious document attacks
  • VDE — Virtual Desktop Environment: centralized desktop delivery infrastructure for secure remote access
  • VDI — Virtual Desktop Infrastructure: hosting desktop environments on a centralized server; reduces endpoint data exposure
  • Vendor assessment — questionnaires, on-site audits, penetration test results, and SOC reports used to evaluate vendor security
  • Vendor diversity — Using products from multiple vendors so a vulnerability in one doesn
  • Vendor lock-in — dependency risk when switching providers is costly or technically difficult
  • Version control — Tracking changes to configurations, code, and documentation for accountability and rollback
  • Video surveillance (CCTV) — Continuous monitoring and recording of facility areas for physical security
  • Virtual Network Security — Virtual switches, virtual firewalls, and micro-segmentation within virtualized environments
  • Virus — Requires a host file to execute; spreads when the infected file is opened or executed
  • Vishing — Voice-based phishing via phone calls to trick victims into revealing information
  • VLAN hopping — Exploiting trunk port configurations to access traffic on VLANs other than the attacker
  • VLANs (Virtual LANs) — logically separate broadcast domains on a single switch; require a router or Layer 3 switch to route between VLANs
  • VLSM — Variable-length Subnet Masking: subnetting technique allowing different subnet sizes within the same network
  • VM escape — attacker breaks out of a VM and accesses the hypervisor or other VMs; a critical virtualization threat
  • VM isolation — ensuring one VM cannot access another VM
  • VM sprawl — uncontrolled proliferation of VMs that become unpatched, unmonitored, and forgotten security liabilities
  • VoIP — Voice over IP: transmitting voice calls over IP networks; requires encryption (SRTP) to prevent eavesdropping
  • Volumetric attacks — Flooding the target with massive traffic to saturate bandwidth (UDP floods, ICMP floods)
  • VPC — Virtual Private Cloud: isolated virtual network within a public cloud environment
  • VPN concentrator
  • VTC — Video Teleconferencing: real-time video communication; requires encryption and access controls to prevent eavesdropping — dedicated device that terminates large numbers of VPN tunnels, centralizing remote access management
  • Vulnerability assessment — identifying weaknesses that could be exploited
  • Vulnerability scanning — automated probing of systems to identify known vulnerabilities, misconfigurations, and missing patches

W

  • War driving — Scanning for wireless networks while moving through an area to map vulnerable access points
  • WAP — Wireless Access Point: device providing wireless connectivity to a wired network
  • Watering hole attack — Compromising a website frequently visited by the target group to infect visitors
  • Weak encryption — Using deprecated algorithms (DES, MD5, SHA-1, RC4) or insufficient key lengths
  • WEP — Wired Equivalent Privacy: legacy wireless encryption protocol; critically broken and should never be used
  • Windows Event Log — built-in Windows logging system capturing security, system, and application events; critical for SIEM ingestion
  • Worm — Self-replicating malware that spreads across networks without user interaction
  • WIDS — Wireless Intrusion Detection System: monitors wireless traffic for rogue access points and unauthorized activity
  • WIPS — Wireless Intrusion Prevention System: detects and automatically blocks wireless threats like rogue APs and deauth attacks
  • WPA2 handshake capture — Capturing the 4-way handshake to perform offline brute-force password cracking
  • WPS attacks — Exploiting Wi-Fi Protected Setup PIN vulnerability to recover the WPA key
  • WPS — WiFi Protected Setup: simplified wireless setup using a PIN; vulnerable to brute-force attacks
  • Write blockers — hardware or software devices that prevent any writes to digital evidence media, preserving forensic integrity
  • WS-Federation — web services federation standard for sharing identity across security domains using passive and active profiles

X

  • X.509 certificate fields — subject, issuer, serial number, validity period, public key, signature algorithm, and extensions
  • XaaS — Anything as a Service: umbrella term for cloud service models (IaaS, PaaS, SaaS, and beyond)
  • XXE — Injecting malicious XML to read files, perform SSRF, or cause denial of service
  • XML — Extensible Markup Language: markup language for structured data; vulnerable to XXE injection and XML bombs
  • XOR — Exclusive OR: bitwise operation fundamental to encryption; outputs true when inputs differ
  • XSRF — Cross-site Request Forgery: attack forcing authenticated users to submit unintended requests to a web application

Z

  • Zero trust architecture — never trust, always verify; authenticate and authorize every access request regardless of network location
  • Zero-day vulnerabilities — Flaws unknown to the vendor with no available patch — exploits are highly valued by attackers