D.A.D. Triad
Disclosure, Alteration, Denial. The antithesis to the CIA triad, Confidentiality, Integrity, Availability
SIEM
Security Information and Event Management
Threat Hunting
Search an org’s infrastructure in search of signs of a successful attack
PCI DSS
Payment Card Industry Data Security Standard
CDE
Cardholder Data Environment (How PCI DSS refers to card processing environments)
CompTIA PenTesting Process
1) Planning and Scoping
2) Information Gathering and Vuln Scanning
3) Attacking and Exploiting
4) Reporting and Communicating Results
The Cyber Kill Chain
1) Reconnaissance
2) Weaponization
3) Delivery
4) Exploitation
5) Installation
6) Command & Control
7) Actions on Objectives