Blog Index
Click on the name or phrase to take you to that post. We will add new links to existing posts on an ongoing basis.
Acquisition
Active/Active Load Balancing
Adaptive Identity
Adware
Ansible
API (Application Programming Interface)
APT (Advanced Persistent Threat)
Asymmetric Encryption
BCP (Business Continuity Plan)
BEC (Business Email Compromise)
Bollards
Brand Impersonation
Buffer Overflow
Bug Bounty
CASB (Cloud Access Security Broker)
Certutil Video
Change Management
Clean Desk Policy
BCP (Business Continuity Plan)
BEC (Business Email Compromise)
Bollards
Brand Impersonation
Buffer Overflow
Bug Bounty
CASB (Cloud Access Security Broker)
Certutil Video
Change Management
Clean Desk Policy
Cloud Responsibility Matrix
Containers
CSRF (Cross-Site Request Forgery)
Dark Web
Data Owner
Data Processor
Data in Transit
Data in Use
Data Sovereignty
Directory Traversal Attack
DKIM
DMARC
DNS Hijacking
DrDoS
EAP-FAST
EAP-TLS
EAP-TTLS
EDR
Elasticity
ESP (Encapsulating Security Payload)
Expansionary Risk Appetite
Fail Closed
Containers
CSRF (Cross-Site Request Forgery)
Dark Web
DATA GOVERNANCE ROLES
Data CustodianData Owner
Data Processor
***********************************
DATA PROTECTION
Data at RestData in Transit
Data in Use
***********************************
Data RetentionData Sovereignty
Directory Traversal Attack
DKIM
DMARC
DNS Hijacking
DrDoS
EAP-FAST
EAP-TLS
EAP-TTLS
EDR
Elasticity
ESP (Encapsulating Security Payload)
Expansionary Risk Appetite
Fail Closed
Fail Open
Flow Collector
Fuzzing
Geographic Restrictions
Geolocation
GPS Tagging
Guard Rails
Homomorphic Encryption
Honeyfile
Honeypot / Honeynet
Honeytoken
IaC (Infrastructure as Code)
IKE Phase 1
IMAP
IPSec
IPSec Transport Mode
ISACs
Jump Box / Jump Server
Key Escrow
Key Stretching
KPI (Key Performance Indicator)
Flow Collector
Fuzzing
GDPR (General Data Protection Regulation)
Right to be Forgotten***************************************
GeofencingGeographic Restrictions
Geolocation
GPS Tagging
Guard Rails
Homomorphic Encryption
Honeyfile
Honeypot / Honeynet
Honeytoken
IaC (Infrastructure as Code)
IKE Phase 1
IMAP
IPSec
IPSec Transport Mode
ISACs
Jump Box / Jump Server
Key Escrow
Key Stretching
KPI (Key Performance Indicator)
Malware Types Part 3
Metadata
Microservices
Mimikatz
MTBF
MTTF
Nation State
NFC
NGFW (Next Generation Firewall)
Nikto
OAuth
OCSP (Online Certificate Status Protocol)
Metadata
Microservices
Mimikatz
MTBF
MTTF
Nation State
NFC
NGFW (Next Generation Firewall)
Nikto
OAuth
OCSP (Online Certificate Status Protocol)
OWASP Dependency-Track
PAM (Privilege Access Management)
Password Attacks - Offline
Password Reuse
PEAP
Persistence - Load Balancing
Phishing Campaign
Playbook
Policy Administrator (Zero Trust)
Policy Engine (Zero Trust)
POP3 (Post Office Protocol 3)
Pressure sensors
Pretexting
Race Condition
Rapid Elasticity
Regionally Diverse Backups
Reverse Engineering
Right to be Forgotten
Risk Register
PAM (Privilege Access Management)
Password Attacks - Offline
Password Reuse
PEAP
Persistence - Load Balancing
Phishing Campaign
Playbook
Policy Administrator (Zero Trust)
Policy Engine (Zero Trust)
POP3 (Post Office Protocol 3)
Pressure sensors
Pretexting
Race Condition
Rapid Elasticity
Regionally Diverse Backups
Reverse Engineering
Right to be Forgotten
Risk Register
RTO (Recovery Time Objective)
RTOS (Real-Time Operating System)
SaaS (Software as a Service)
Salting Passwords
SAN (Storage Area Network)
SASE
SDN
SD-WAN
Secure Enclave
RTOS (Real-Time Operating System)
SaaS (Software as a Service)
Salting Passwords
SAN (Storage Area Network)
SASE
SDN
SD-WAN
Secure Enclave
Security Controls
Security Control Categories
SED (Self-Encrypting Drive)
SELinux
Sensitive Data
Serverless
Session Hijacking
SFTP vs SCP
Shadow IT
Shodan
Side Channel Attack
SIEM
Single Pane of Glass
SMB (Server Message Block)
S/MIME
Smishing
SMTP (Simple Mail Transfer Protocol)
SNMP
SOAR (Security Orchestration, Automation, and Response)
SOC 2 Type 1 and 2
SPF (Sender Policy Framework)
SSRF (Server-Side Request Forgery)
Steganography
STIX
Strings
Supply Chain Security
SY0-701 Acronym Flashcards
Syslog
TAXII
Tcpdump
Security Control Categories
SED (Self-Encrypting Drive)
SELinux
Sensitive Data
Serverless
Session Hijacking
SFTP vs SCP
Shadow IT
Shodan
Side Channel Attack
SIEM
Single Pane of Glass
SMB (Server Message Block)
S/MIME
Smishing
SMTP (Simple Mail Transfer Protocol)
SNMP
SOAR (Security Orchestration, Automation, and Response)
SOC 2 Type 1 and 2
SPF (Sender Policy Framework)
SSRF (Server-Side Request Forgery)
Steganography
STIX
Strings
Supply Chain Security
SY0-701 Acronym Flashcards
Syslog
TAXII
Tcpdump
Tcpreplay
TFTP
theHarvester
Hacktivist
Insider
Nation-State / APT
Organized Crime / Criminal Syndicate
Unskilled / Script Kiddie
Threat Vector
Tokenization
TPM (Trusted Platform Module)
UEBA
UTM (Unified Threat Management)
Vishing
VM Escape
VM Sprawl
Vulnerable Software
WAF (Web Application Firewall)
Watering Hole Attack
WEP
Wireless Heat Map
Workforce Multiplier
Worm
WPA
XDR
XXE attack
Zero Trust Policy Administrator
Zero Trust Policy Engine
ZTA (Zero Trust Architecture)
TFTP
theHarvester
THREAT ACTORS
CompetitorHacktivist
Insider
Nation-State / APT
Organized Crime / Criminal Syndicate
Unskilled / Script Kiddie
********************************
Threat Scope ReductionThreat Vector
Tokenization
TPM (Trusted Platform Module)
UEBA
UTM (Unified Threat Management)
Vishing
VM Escape
VM Sprawl
Vulnerable Software
WAF (Web Application Firewall)
Watering Hole Attack
WEP
Wireless Heat Map
Workforce Multiplier
Worm
WPA
XDR
XXE attack
Zero Trust Policy Administrator
Zero Trust Policy Engine
ZTA (Zero Trust Architecture)
No comments:
Post a Comment