Single system overwhelms a target with traffic
DoS
Denial of Service
Multiple compromised systems flood a target
DDoS
Distributed Denial of Service
Attacker intercepts communications between two parties
MITM
Man in The Middle
Malware providing remote control of a system
RAT
Remote Access Trojan
IP hash or domain linked to malicious activity
IOC
Indicator of Compromise
Injected script executes in victim browser
XSS
Cross Site Scripting
User tricked into performing unwanted actions
CSRF
Cross Site Request Forgery
System actively blocks malicious traffic
IPS
Intrusion Prevention System
System detects and alerts only
IDS
Intrusion Detection System