CIA
Confidentiality, Integrity, and Availability
AAA
Authentication, Authorization, and Accounting
PKI
Public Key Infrastructure
FDE
Full Disk Encryption
WPA
Wi-Fi Protected Access
IPSec
Internet Protocol Security
TLS
Transport Layer Security
HMAC
Hash-Based Message Authentication Code
SHA
Secure Hash Algorithm
MD5
Message Digest Algorithm #5
PKCS
Public Key Cryptography Standard
SAN
Subject Alternative Name
- a field in a digital certificate allowing a host to be identified by multiple host names/subdomains
CN
Common Name
- an X500 attribute expressing a host or username, also used as the subject identifier for a digital certificate
MSP
Managed Service Providers
- provisions and supports IT resources such as networks, security of web infrastructure
BEC
Business Email Compromise
- an impersonation attack in which the attacker gains control of the employee’s account and use it to convince other employees to perform fraudulent actions
TOCTOU
Time-of Check, Time-of-Use
- where a system state changes between the check (verification) state and the use (execution) stage
CASB
Cloud Access Security Brokers
- enterprise management software designed to mediate access to cloud services by users across all types of devices
XSS
Cross-Site Scripting
- a malicious script hosted on the attacker’s site or coded in a link injected onto a trusted site designed to compromise clients’ browsing the trusted site, circumventing the browser’s security model or trusted zones
SQLi
Structured Query Language Injection
PUP/PUA
Potentially Unwanted Programs / Potentially Unwanted Applications
- software that cannot be definitively be classed as malicious, buy may not have been chosen by or wanted by the user
APT
Advanced Persistent Threat
- threat actors with the ability to craft novel exploits and techniques to obtain, maintain, and diversify unauthorized access to network systems over a long period
DDoS
Distributed Denial of Service
- an attack that involves the use of infected Internet-connected computers and devices to disrupt the normal flow of traffic of a server or a service overwhelming the target with traffic
ARP
Address Resolution Protocol
- broadcast mechanism by which the hardware MAC address of an interface is matched to an IP address on a local network segment
HIPS
Host-based Intrusion Prevention System
- endpoint protection that can detect and prevent malicious activity via signature and heuristic pattern matching