CIA Triad
Confidentiality: Certain information only known by certain people
Integrity: Data is stored and transferred was intended without modification
Availabilty: Information is accessible to those authorized to access it
Vulnerability
Threat
Risk
Likelihood and impace of threat actor exercising vulnerability
Risk Management
Security Controls
Risk Posture
- Shows which risk response options can be identified and prioritized
Posture Assessment
MEF
Mission Essential Function
BIA
Business Impact Analysis
Exploit
Zero-Day
Vulnerability Assessment
CVE
Common Vulnerabilities and Exposures
- Dictionary of vulnerabilities that is published
TTP
Tactics, Techniques and Procedures of threat actors
Behavioral threat research
Reputational threat intelligence
Threat Data
SIEM
Security Information and Event Management
Penetration Testing
Vendor Management
ACL
Access Control List
- List of subjects and rights or permissions they have access to
Local Authentication provider
Software architecture and code that underpins the mechanism by which the user is authenticated before starting a shell.
- Microsoft or Linux sign in
Hash