Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | |||
lists:abbreviations [2021/09/09 16:15] – seb | lists:abbreviations [2021/09/09 16:31] (current) – seb | ||
---|---|---|---|
Line 4: | Line 4: | ||
AES = Advanced Encryption Standard; also known as Rinnsale; established by the United States National Institute of Standards & Technology in 2001; block cypher with 128 bits block size; key length is 128, 192, or 256 bits ([[wp> Advanced_Encryption_Standard|AES]]) | AES = Advanced Encryption Standard; also known as Rinnsale; established by the United States National Institute of Standards & Technology in 2001; block cypher with 128 bits block size; key length is 128, 192, or 256 bits ([[wp> Advanced_Encryption_Standard|AES]]) | ||
+ | |||
+ | APT = Advanced Persistent Threat; stealthy threat actor, typically a nation state; stays undetected in compromised networks for an extended amount of time ([[wp> | ||
+ | |||
+ | ASN = Autonomous System Number; used in Border Gateway Protocol (BGP) based routing; the Internet is based on it ([[wp> | ||
C2 = Command & Control; refers to infrastructure/ | C2 = Command & Control; refers to infrastructure/ | ||
Line 11: | Line 15: | ||
EPP = Endpoint Protection Platform - aka next-gen AntiVirus; blocks know malware and programs that behaves like malware ([[wp> Endpoint_security|EPP]]) | EPP = Endpoint Protection Platform - aka next-gen AntiVirus; blocks know malware and programs that behaves like malware ([[wp> Endpoint_security|EPP]]) | ||
+ | IOC = Indicator of Compromise; artifacts like domain names, IP addresses, email addresses, file hashes, file names, folder names, URLs ([[wp> | ||
+ | |||
+ | MFA = Multi Factor Authentication; | ||
+ | |||
+ | NIST CSF = NIST CyberSecurity Framework; maturity assessment tool for # | ||
+ | |||
+ | PAM = Privilege Account/ | ||
+ | |||
+ | ransom = amount of money paid to receive a decryption key for maliciously encrypted data ([[wp> | ||
+ | |||
+ | SOAR = Security Orchestration Automation Response; tool to (semi) automate security operations tasks and manage incidents ([[wp> | ||
+ | |||
+ | TI = Threat Intelligence; | ||
+ | |||
+ | TIP = Threat Intelligence Platform; tool to gather, analyze, transform, and share threat intelligence ([[wp> | ||
+ | |||
+ | TVM = Threat & Vulnerability Management; tools and processes to discover, evaluate, prioritize, remediate, track software vulnerabilities with the goal to minimize attack surface ([[wp> | ||
+ | vuln = short for vulnerability; | ||