Technical controls
Controls implemented using systems
Operating system controls
Firewalls, anti-virus
Management controls
Administrative controls associated with security design and implementation
Security policies, standard operating procedures
Influence campaign
A significant initiative launched by entities like nation-states to sway public opinion on specific topics, often utilizing various techniques including disinformation.
Digital espionage
The use of cyber tools and techniques to secretly access, steal, or monitor sensitive information from computers or networks.
Soft power
The ability of a country or organization to influence others through culture, values, diplomacy, or attraction rather than force or coercion.
reflected DDoS attack
A type of cyberattack where the attacker sends requests to a third-party server that then unwittingly sends large responses to the victim, overwhelming their network.
SQL injection
A cyberattack that inserts malicious SQL code into a website’s input fields to manipulate or access a database without authorization.
amplified DDoS attack
A cyberattack that increases the volume of traffic sent to a victim by exploiting vulnerable servers, making a small request generate a much larger response to overwhelm the target.
Netflow
A network monitoring and analysis tool that provides visibility into network traffic, allowing administrators to understand and analyze the flow of data across the network.
key escrow
A security method where encryption keys are stored by a trusted third party, allowing authorized access to encrypted data if needed.
key exchange
A process in cryptography where two parties securely share encryption keys to enable confidential communication.
Public key infrastructure (PKI)
A system that manages digital certificates and public-private key pairs to secure communication, verify identities, and enable encryption.
Key generation
The process of creating cryptographic keys used for encrypting, decrypting, or signing data in secure communications.
Ticket creation
The automatic generation of a support or service request in a tracking system when a specific event or issue occurs, streamlining workflow and incident management.
Cryptographic collision
When two different inputs produce the same output (hash) in a cryptographic function, potentially compromising data integrity.
Time memory trade-off
A technique in computing or cryptography where increased memory usage reduces processing time, or vice versa, to optimize performance.
Brute force attack
A method of breaking passwords or encryption by systematically trying every possible combination until the correct one is found.
Hash extension attack
A cryptographic attack where an attacker uses a known hash to append data and create a valid hash for the extended message without knowing the original input.
WEP (Wired Equivalent Privacy)
An outdated Wi-Fi security protocol designed to protect wireless networks, now considered insecure due to vulnerabilities in its encryption.
TKIP (Temporal Key Integrity Protocol)
A Wi-Fi security protocol designed to improve WEP by dynamically changing encryption keys, though now considered less secure than modern standards like WPA2.
WPA (Wi-Fi Protected Access)
A Wi-Fi security protocol that improves upon WEP by using stronger encryption and authentication methods to protect wireless networks.
AES (Advanced Encryption Standard)
A widely used symmetric encryption algorithm that secures data with fast, strong, and reliable encryption.
Sanitization
The process of removing or cleaning sensitive data from a system or document to prevent unauthorized access or disclosure.
Enumeration
In cybersecurity, the process of actively gathering detailed information about a system, network, or user accounts to identify potential attack points.