CASP Glossary
CASP Glossary
This glossary corresponds to the key definitions that are introduced in each lesson. You can
reference all of the definitions here in one place as a supplementary study guide.
Numbers
2-Step Verification
An authentication method that uses out-of-band mechanisms and generates a token serverside
that is sent to the user to provide for verification. This might be an SMS message with a code, a
phone call, a push notification to a mobile phone, or an email.
3D Printing
An emerging technology that uses special-purpose printers that build 3D objects rather than
printing on paper. Printing is done by adding layers on top of layers according to a model using
computer-aided design (CAD) software. It allows for rapid design and the creation of just about
anything.
802.1x
An authentication protocol that uses EAP for wireless, ethernet, or VPN gateway to provide
authentication.
Agile Model
In this approach to software development, an iterative process is used to release well-tested
code in smaller blocks. Development is continuous. It is adaptive to allow for changes
throughout the process. It focuses on rapid development, sometimes at the expense of security.
Air Gap
A host that is physically disconnected from any network so as to protect that network by being
segmented from it. (This is a form of segmentation.)
Aircrack-ng
A suite of tools for assessing and analyzing Wi-Fi networks. It is used to monitor, attack, test,
and crack WiFi networks.
Analytical Zone
A form of cloud-based data zone where data is used for practical purposes.
Anonymization
A process that removes data that could be used to uniquely identify a person. It is a common
requirement in compliance laws.
Antivirus Software
Software that detects and identifies malicious software on an endpoint. Originally, antivirus
programs were signature-based file scans that would detect viruses, but now they monitor when
processes are launched, intercept them, and look for signature matches.
Application Virtualization
A client accesses an application hosted on a server. This usually occurs through a browser. It
allows for specific apps to be shared from a single server through a user's browser. Examples:
App-V, XenApp, ThinApp.
Artificial Intelligence
The science of creating computing systems that can simulate or demonstrate intelligence levels
similar to humans. Machine learning uses algorithms to parse data then develops strategies for
using that data. Machine learning can modify the algorithms and make gradual improvements in
its ability to make decisions.
Asset Value
Within Quantitative Risk Analysis, this is the value that a given asset is worth.
Attestation of Compliance
The set of policies, contracts, and standards between two entities that have been designated as
essential. It will identify how the relationship will be governed, including how incidents will be
reported and addressed, the use of independent auditors, data protection requirements, and
violation agreements.
Authentication Bypass
An attack that exploits how logins are received and processed by web applications. An example
would be sending an SQL string rather than the login credentials the app is expecting.
Autoscaling
A method of automation in a cloud deployment that dynamically adjusts the allocated resources
based on the current need.
AWS CloudTrail
An audit logging service for AWS apps.
AWS CloudWatch
A graphical reporting and analytics service that provides monitoring and alerting in AWS.
BGP/Route Hijacking
An attack that involves hijacking BGP routing. BGP is the routing protocol of the Internet. It was
designed when security wasn't a consideration, so it depends on interconnected networks to
truthfully and accurately maintain the routing tables.
Big Data
Data collections that are too big for traditional database tools to utilize. Ideally suited to AI as the
larger the dataset for AI to study, the more effective it will be.
Binwalk
A tool that can be used to inspect binary firmware image files to better understand what is inside
the file itself.
BIOS
Basic Input/Output System - this is the program that starts a computer system after it is turned
on.
Blob Storage
A cloud-based storage model that supports the storage of large amounts of unstructured data. It
is used to store archives and backups.
Block Cipher
An encryption where plaintext is separated into equal-sized blocks, usually 128 bits in size. If
there isn't enough data to fill a block, it is padded to make up the rest of the space. Each block
is then encrypted based on the mode of operation being used.
Block Storage
A cloud-based storage model that supports high-performance, transactional apps like
databases.
Blockchain
An expanding list of transnational records secured by cryptography. Each record is known as a
block and the blocks are connected in a chain. Each block is hashed and the hash value of the
previous block is included with it. In this way, each block validates the next block in the chain. It
is a public ledger that is distributed across a P2P network.
Bluetooth
A short-range wireless communication technology. It can be used to create wireless personal
networks (WPANs). It is most often used to connect keyboards, mice, headsets, etc. It is
vulnerable to several attacks, but the most dangerous is the BlueBorne attack, which allows for
complete control of the device by the attacker and does not require the attacker to be connected
to the victim device.
Bootstrapping
A method of automation in a cloud deployment that involves automatically deploying instances.
Bring Your Own Device (BYOD)
A mobile device policy where the employee owns the device, but the device must meet certain
corporate specifications and allow auditing. With this type of policy, it is not as easy to fully
secure devices as when they are corporately owned and issued by the company to the
employee.
Broken Authentication
When an app doesn't protect authentication mechanisms, it allows an attacker to compromise
user sessions or passwords.
Browser Extensions
Additional functionality that can be added to a browser. They are not accessible by the code
launched by the browser. Plugins can be called by website code.
Buffer Overflow
The process of filling temporary memory space. A well-designed attack can access other parts
of the system memory for code insertion and execution.
Bytecode
A type of software code that represents an intermediary state of source code created by a
high-level language (when compiled) and is designed to be processed by an interpreter on the
target system. The interpreter translates the bytecode into machine code.
C
Caching
A form of scaling that involves making copies of data that either doesn't change or doesn't
change often. This improves performance with load times.
Certificate Authority
An entity that is responsible for issuing and then guaranteeing certificates. They provide
certificate services to a community of users. They ensure that certificates are valid and that the
identity of those applying for certificates is also valid. They perform key and certificate life cycle
management, including revoking invalid certificates.
Certificate Errors
A class of vulnerability involving improperly configured certificates. Certificates are a necessary
part of SSL encryption. If improperly configured certificates can cause browser viewable errors.
This can train users to simply click past the error.
Certificate Pinning
A technique to ensure that when a client inspects a certificate, it is inspecting the proper
certificate. Due to chains, there could be many certificates and if one of these were swapped out
with a malicious certificate, it could compromise traffic.
Certificate Stapling
Web servers will periodically obtain OCSP responses that are time-stamped. When clients
submit an OCSP request, the web server sends the time-stamped response.
Chain of Custody
In forensics, this is the record of evidence handling from collection through presentation in court.
Client Authentication
Digital certificates can be used to validate that a client is authorized to connect to a server.
Cloud Security Alliance (CSA) Security Trust and Risk (STAR) certification
This is a third-party assessment of the ability of a Cloud Service Provider (CSP) to adhere to
key principles of transparency, auditing, and best practices for security. It measures the security
capabilities and privacy controls of a cloud service provider against the CSA Cloud Controls
Matrix (CCM).
Code Signing
Executables, drivers, applications can all be signed with a certificate (key) issued by a trusted
certificate authority (CA). Code signing certificates are issued to software developers so that
software can be proven to come from a trusted source.
Command Injection
An attack that takes advantage of web apps that bypass operating system APIs and instead will
spawn command shells.
Community Cloud
A cloud deployment model where several organizations share the cost of a hosted private or
totally private cloud.
Conntrack
A tool that allows for interactions with connection tracking systems and can read data from
IPTables.
Containerization
Also known as operating system-level virtualization, this is a virtualization method that uses a
system's kernel instead of a hypervisor. It creates a virtual environment with the bare minimum
needed parts for an app to run. There are performance benefits to this method due to not
needing a hypervisor. Example: Docker.
Continuous Delivery
This software delivery practice calls for delivering software in short cycles and testing the
infrastructure that supports the app, networks, databases, client software, and security as part
of delivery.
Continuous Deployment
This software delivery practice utilizes configuration management tools to make changes to a
production environment through automated deployments.
Continuous Integration
This software delivery practice requires that DevOps automates the integration of code changes
and commits and tests updates often.
Continuous Validation
This software delivery practice involves monitoring and evaluating feedback from delivery and
development to ensure goals are meeting user needs.
Control Objectives for Information and Related Technologies (COBIT)
A framework created by ISACA that frames risk according to the leadership of a business
organization. The five components are framework, process descriptions, control objectives,
management guidelines, and maturity models.
Control Plane
A type of SDN plane that decides on traffic priority, security, and where switching occurs.
Counter (CTR)
A cipher mode of operation that applies an Initialization Vector (IV) and an incrementing counter
value to the key to create a keystream. It does not require padding, and the left-over space is
removed.
Cryptanalysis
The art of breaking encryption. In certain forensics situations, this may be a requirement if
collected data is encrypted.
Crypto Erase
A method of data sanitization that involves removing the key necessary to decrypt the data.
Custom DNS
Since DNS (domain name service) is unencrypted, this type of DNS uses third-party servers to
filter malicious DNS requests.
Data at Rest
The state of data when it is stored in databases and other areas.
Data Dispersion
Intentionally spreading data across multiple storage locations and/or cloud providers to ensure
that data is safe and available.
Data in Transit
The state of data when it is in motion, moving from one place to another.
Data in Use
The state of data when it is in volatile memory (system RAM, CPU registers, cache). Example:
Fields in a database while the data is being updated.
Data Ownership
The data owner is the entity that is responsible for protecting the data under their control. They
are responsible for ensuring the data has been protected in appropriate ways.
Data Plane
A type of SDN plane that handles switching and routing of traffic, as well as ACLs.
Data Sanitization
Removing data from media using the methods of clear, purge, or doing damage to the
hardware. It includes removing all labels, markings, and logs. The clear method involves
multiple block-level over-writing of data that protects against recovery except in clean
rooms. The purge method involves protecting against all recovery methods including clean
rooms. The damage method involves physically breaking the storage medium to make it
useless.
Data Sovereignty
The laws in the country where the data is stored that govern data collection and its use in
the global economy. Regulations vary widely and these can impact how data is stored,
transmitted to another country, and what type of encryption must be used to protect it.
Data Zones
A form of cloud-based network segmentation that describes the state and location of data to
isolate and protect it.
dd
A Command line tool for making forensic copies of block-level storage. Copies at the block
level rather than file level.
Decoy Files
Files that would be appealing to an attacker but are monitored for signs of access:
honeytokens.
Deep Learning
A type of machine learning that takes apart knowledge and breaks it into smaller parts.
Complex topics can be broken down into parts that are easier to interpret. A deep learning
system can decide which parts are applicable to a given problem and make decisions
based upon them. IBM's Watson is a good example of this in action.
Deep Web
The parts of the web that are not indexed and are generally hidden. It includes the Dark
Web.
Dependency Management
Evaluating vulnerabilities in third-party libraries and components of software and hardware.
Deperimeterization
Until recently, networks were like castles, and their defenses were set up to trust anything
inside the perimeter and nothing outside of it. However, with the advent of remote work,
cloud adoption, and the need for 24/7 access to data, the concept of just protecting the
perimeter is eroding.
Development Environment
In software development, this is the environment that is used in the early stages of
development by individual developers. Like the developer's personal sandbox.
DevOps Pipeline
A set of automated processes and tools that allows developers and operations
professionals to collaborate on building and deploying code to a production environment.
Diameter
An authentication protocol that improves upon RADIUS. It is TCP-based, requires IPSec
and TLS for confidentiality. Diameter is considered "twice" as good as RADIUS.
Digital Certificate
Public assertion of identity validated by a Certificate Authority (CA). Can be used for signing
messages, encrypting web server communications. Often used to prove and guarantee the
identity of a website, assuming that the certificate provider is trustworthy
Directory Services
A directory of all the resources within a network. Example: Active Directory.
Directory Traversal
Also known as file path traversal, is a web server vulnerability that allows access to files
outside of the web document directory.
Distributed Allocation
A type of resiliency that involves spreading workloads across multiple units that work
together.
Distributed Consensus
An emerging technology that is a distributed/decentralized system where all systems come
to an agreement for a specific computation to maintain the overall integrity fo a distributed
system. It includes the possibility that some systems are malicious so it takes a vote from all
included systems on the data. The value with the most votes is accepted.
Due Care
What is considered to be the reasonable and expected protections of an asset. this is a
baseline and will vary widely based on what is being protected. Also called the "prudent
man rule."
Due Diligence
The ongoing and documented processes to continuously evaluate and improve the ways we
protect data.
Dynamic Analysis
A type of vulnerability analysis that involves an evaluation of software or a system while it is
running.
e-Discovery
Identifying, collecting, and providing the Electronically Stored Information (ESI) that is identified
in a Legal Hold.
ExifTool
A tool to read/write file metadata for many file formats.
Exploit Framework
A collection of tools for exploiting systems and software. Examples: Metasploit, PowerShell
Empire.
Exposure Factor
Within Quantitative Risk Analysis, this is the portion of an asset that would be lost given a
certain bad thing happening; in other words, the percentage of the asset lost. For example:
how much of an office building would be damaged if a hurricane hit it. That would be its
exposure factor.
False Negative
Something not identified as an issue, but it is an issue.
False Positive
Something that is not an issue but was identified as one.
Federation
Trusting accounts made and used by other organizations. This allows these organizations to
connect across each other. Examples: using your Google ID to log into other sites/applications.
File-based storage
A cloud-based storage model that consists of a hierarchical file system that stores files by path
and includes attributes like owner and access permissions.
foremost
A Linux utility used to extract deleted or corrupted data from a partition. Even if there is no file
system in place, data can be recovered.
Forward Proxy
A configuration of CASB where the appliance is at the network edge of the customer and traffic
is directed to the cloud network if policies allow.
Fuzzing
Purposely injecting malformed data into an application to see if the application will reveal
sensitive data.
Ghidra
A free and open-source tool developed by the NSA, written in Java, that is used for reverse
engineering.
Guest Environment
A guest network that is completely isolated from the main network.
Hacktivists
Hackers who use cyber attacks to support a political agenda. They may target corporations for
their actions or social stances. Example: Anonymous.
Hardening
The process to remove unnecessary elements from a system and make configuration changes
to make a system less vulnerable.
Hashing
A mathematical function that inputs data and transforms it into a fixed-length hexadecimal
output. The same input will always produce the same output. There is no way to use the output
to recreate the input. It is irreversible. The output is also called a "digest."
hexdump
A utility that can extract data from a binary file and present it in hex, decimal, octal, and ASCII
HMAC
A hash-based Message Authentication Code where both the source and the message content
can be verified without needing anything else. HMACs have two parameters: the message and
a secret key that is known by the sender and receiver. They both use the MAC hashing
algorithm, and the receiver can check the hash of the message to confirm its integrity.
Homomorphic Encryption
Encryption that is primarily used to share privacy-sensitive data. It allows for statistical analysis
of data without decrypting it.
Honeynet
Several honeypots together that pretend to be an entire network with monitoring to see if
attackers try to access it.
Honeypot
A fake computer system that is monitored for activity and set up to see if attackers try to access
it.
Host-Based Firewalls
A firewall running on a host that will protect it only. It uses packet filtering ACLs to allow/block
traffic.
Host-Based IDS (HIDS)
Similar to an IDS but on a single system. It monitors OS logs, files, and processes. It may utilize
file integrity monitoring (FIM).
HTTP Interceptor
A tool that captures HTTP/S traffic between hosts to inspect or modify the data. Example:
Burp Suite.
HUMINT
Human Intelligence - collecting intelligence by interacting with people.
Hybrid SDN
A type of SDN that involves traditional networks and SDNs working together.
Identity Proofing
Verifies that a user's various characteristics and credentials are accurate and unique to the
individual.
Immutable Systems
A system that is unchangeable, often referred to as frozen.
Improper Headers
A class of vulnerability that involves improper HTTP headers. HTTP response headers control
how web servers operate to increase overall security. Properly configured headers can prevent
CSRF, XSS, downgrade attacks, cookie hijacking, user impersonation, clickjacking, and other
attacks.
Inherent Risk
This is risk that is built-in. Everything in life carries some level of risk, and mitigating controls
lower the risk.
Insecure References
A class of vulnerability related to weak access controls. An app takes user-supplied input and
uses it to give access to areas that normally shouldn't be accessible
Insider Threat
An employee or contractor who is already on the inside and poses a threat either intentionally
(through malicious acts) or unintentionally (through poor security practices).
Integration Testing
In software development, this type of testing ensures individual components are tested together
to ensure they all work together as expected.
Interception Attacks
Any unauthorized access to network traffic. Defenses include access controls and traffic
encryption
Jailbreaking
A type of exploit that enables a user to become root on an iOS device. It allows the user to
install apps, change carriers, and customize the system in ways that a normal user wouldn't
normally be able to do.
Jump Box
A hardened and monitored system used to perform administrative functions. This is a form of
segmentation to protect the wider network/system.
Kerberos
An authentication protocol that is single sign-on network authentication. It is used in Active
Directory. Clients request services from a server. Clients and servers both rely on a Key
Distribution Center (KDC) for authentication. The KDC has two parts: Authentication Service
and Ticket Granting Service. KDC runs on port 88 TCP or UDP.
L
Ladder Logic
A sequential control language that dictates out Programmable Logic Controllers (PLCs) operate
in Industrial Control Systems (ICSs). Ladder Logic uses a graphical flow-chart-like interface.
LDAP Injection
An attack that manipulates LDAP strings to perform malicious actions.
ldd
A command-line utility that displays a program's dependencies.
Legal Hold
Also called a litigation hold, this is a notification received by an entity that requires the
preservation of electronically stored information (ESI) and paper records that may be relevant to
a pending legal proceeding. It is handled by legal teams, but cybersecurity teams are involved
to place holds on the data.
Location Services
The capability on a mobile device to provide geographical positioning of the device using
several methods. GPS is the most common method, but cellular tower triangulation, Wi-Fi
signals, and Bluetooth can also be used. Geofencing is a capability to trigger a response if a
mobile device enters a pre-defined geographical area. Geotagging is a capability to add location
metadata to files or devices, usually for the purposes of asset management.
lsof
A command-line utility that displays the list of open files and their associated processes.
Machine Code
The lowest level of source code; devices can understand it.
Management plane
A type of SDN plane that monitors traffic conditions and overall network status.
Measured Boot
During the boot process, this mechanism uses platform configuration registers (PCRs) in the
TPM at every stage of the process. It validates that hashes of the key boot firmware, boot
loader, kernel, and drivers haven't been altered.
Microcontrollers
Perform sequential operations from a vendor-determined dedicated instruction set. Embedded
systems often only need to perform the same basic task over and over, so hardware controllers
can be programmed with these instructions at creation.
Microsegmentation
A cloud-based network segmentation that isolates workloads from each other and protects them
individually.
Middleware
Software applications that are designed to integrate two systems together.
MITRE ATT&CK
The MITRE Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) is a knowledge
base of real-world information about adversary TTPs. It describes in detail how adversaries
perform their attacks and breaks them down into logical groupings. See attack.mitre.org.
Modbus
The protocol used on OT networks which allows control servers and SCADA devices to query
and change configurations of PLCs. Originally, Modbus was a serial protocol (Modbus RTU), but
it has been modified to run on Ethernet and TCP/IP now.
NAC Lists
Pronounced "nackles" - these are used to control inbound and outbound traffic between VPCs
as a form of cloud-based network segmentation.
Netcat
A tool for reading and writing from network connections using TCP or UDP.
Netflow
Netflow and sFlow are network protocols for capturing network traffic for analysis.
netstat
A command-line utility that displays current network connections and their state.
Network Segmentation
Dividing a network into smaller parts. Other related terms: subnetting, VLAN, screened subnet.
NMap
An open-source IP scanner for host and network discovery.
Non-Disclosure Agreement (NDA)
An agreement that defines how an entity can use data it has access to while working with
another party and what must be kept confidential. It also contains the legal ramifications to be
faced in the event of disclosure to serve as a deterrent to disclosure.
OAuth
Open Authorization - an authentication protocol that is often used for authentication and
authorization for RESTful APIs. The user account is hosted by one or more resource servers.
Authorization requests are processed by authorization servers. It uses JavaScript object
notation (JSON) web token (JWT) format. It can be passed in URLs and HTTP headers and can
be digitally signed for authentication and integrity.
Objdump
A tool that, similar to readelf, is used to analyze object files, also includes a disassembler.
Object storage
A cloud storage model that supports cloud-based applications needing access to documents,
videos, and image files.
OllyDbg
A debugger that performs binary code analysis. It has a GUI and is focused on Microsoft
Windows.
Open SDN
A type of SDN that is open source and used to reduce vendor lock-in.
OSINT
Open-source Intelligence - publicly available information, social media, DNS records, and
websites, from which threat intelligence may be obtained.
Over-the-Air (OTA)
Over-the-air updates are delivered to mobile devices via cellular or Wi-Fi connections. These
can be firmware updates to the radio modem that is used for cellular, Wi-Fi, Bluetooth, NFC, and
GPS operations.
OWASP
Open Web Application Security Project - produces free and open-source resources to promote
secure coding, including the OWASP Top 10 list of software security vulnerabilities and attack
vectors
Packet Capture
Capturing network traffic for the purposes of analyzing the packets. It requires a sniffing tool
or protocol analyzer. Examples: Wireshark and TCPDump.
Password Cracker
A utility designed to crack passwords from a variety of sources using several methods such
as brute force and dictionary attacks. Example: John the Ripper.
Persistence
An attacker's ability to maintain access to an environment and stay undetected.
Pivoting
Once an attacker has exploited one system, they will use it to target others on the same
network to gain further access.
Port Scanner
A tool that looks for services running on ports on a specific system. it can also be used for
network discovery.
Private Cloud
A cloud deployment model where the organization using the cloud completely owns and
operates the infrastructure itself and does not rely on a third-party provider.
Process Injection
Defined within the MITRE ATT&CK Framework as an attack where an attacker injects code
into a currently running process.
Production Environment
In software development, this is the live environment where the software is moved for use
by its intended users.
Protocol Analyzer
A tool used to capture network traffic for analysis. Example: Wireshark.
ps (process status)
A command-line utility used to display running processes on a Linux system including the
PID and user running it.
Public Cloud
Also known as multi-tenant, this cloud deployment model is offered over the Internet by a
cloud service provider. Example: AWS, Azure.
Quantum Computing
Manipulates data at the atomic level. Qubits (quantum bits) are the base unit in quantum
computing. Qubits can have a value/state of 0 or 1 or any value in between. They can also
have multiple states at the same time. Qubits can become entangled and the value can only be
observed by collapsing the quantum effect. The only way to get measurements is to indirectly
entangle two qubits. This allows quantum computers to perform many calculations at once.
Because of this, quantum computing is especially useful in breaking RSA and ECC encryption.
Race Conditions
Conditions that occur in software when several processes are needed to complete a task at one
time and bugs can occur as a result. In addition, applications can be manipulated by altering the
assumptions made on the processes and their outcomes.
RACE Integrity Primitives Evaluation Message Digest (RIPEMD)
An algorithm that was developed completely independently from the U.S. government. It has
128, 160, 256, and 320-bit outputs and is used for Bitcoin addresses.
RADIUS
Remote Authentication Dial-In User Service - an authentication protocol that uses UDP and
authenticates with a shared secret.
Raw Zone
A form of cloud-based data zone that has data from multiple sources.
readelf
A tool that is able to read the Executable and Linkable Format (ELF) within an object file.
Regions
A form of cloud-based network segmentation that involves having data centers physically
located in a globally distributed cloud.
Registration Authority
Accepts requests for digital certificates and validates that the one requesting the certificate is
who they say they are.
Regression Testing
In software development, this type of testing ensures that new changes in code do not break
previously existing functionality or features.
Remote Wipe
If a device is lost or stolen, a remote wipe can be performed, and the device will remotely be
restored to factory defaults and all sensitive data will be removed. A person can prevent a
remote wipe from being possible by using a faraday bag.
Replication
A type of resiliency that involves copying data to where it can be used most effectively.
Residual Risk
The risk that is left over after mitigating controls have been applied.
Resiliency
Enables systems to recover when some of their parts fail. Offers high availability of resources in
the event of increased demand or failures. Increases the complexity, costs, and management of
the network.
REST
Representational State Transfer - an architecture for data exchange based on web
technologies.
Reversible Encryption
Storing passwords in a way that they can be decrypted. This is a massive security risk and
should never be used.
Reverse Engineering
A type of vulnerability analysis that involves deconstructing software/hardware to see how it
functions.
Reverse Proxy
A configuration of CASB where the appliance is positioned at the cloud network edge, and it
directs traffic to cloud services if the traffic complies with the policies.
Risk
A measurement of the impact (or consequence) and likelihood that a threat will exploit a
vulnerability.
Risk Appetite
The level of residual risk that is acceptable for an organization.
Risk Register
A visualization of identified risks and corresponding controls. It is the most recognized output of
a risk management program, and it is a working document.
Risk Tolerance
The level of risk that is acceptable to achieve a goal.
Sandbox Detonation
A segregated system that can allow for the execution of malware to see what it does without the
risk of it infecting production systems.
Sandbox Escape
Often occurs in web browsers when code escapes the safety of the browser sandbox and
executes outside of it.
Sandboxing
In software development, this is the process of ensuring each process is segmented from other
processes and each part of the development process does not cause changes in other parts.
This allows developers to work on their parts of the software without disrupting each other's
work.
Scalability
The ability to expand with the growth and changing needs of your organization by adding
resources as they are needed. Scalability performs in two ways: vertically (resources like
processing, memory, and storage, are added to an individual system) and horizontally
(additional servers are added to process the same workload)
SCAP Scanner
A tool that uses SCAP to compare a scanned device against SCAP baselines. Example: DoD
SCAP Scanner.
Screened subnet
Has two firewalls placed on each side of a DMZ (demilitarized zone, which is a perimeter
network set up to protect your internal network.)
Script Kiddie
A person who is utilizing hacker tools without having the knowledge of how they work. Usually,
this type of threat actor's goals are thrill-seeking or to gain attention or prove their skills.
Scrubbing
A data integrity control designed to find and remove invalid, redundant, or outdated data from a
database or data warehouse. If you don't need it, get rid of it.
SDN Overlay
Using existing hardware with software that allows for the creation and management of new
virtual networks.
SecDevOps
A discipline of software development and operations that requires security to be included in all
decisions, plans, and coding. It also requires developers to have a strong understanding of
possible vulnerabilities and to use version control for code changes.
Secure Boot
During the boot process, this mechanism prevents computers from being hijacked by a
malicious OS. Configured with a digital certificate from valid OS vendors, and firmware checks
the bootloader to ensure the certificate is valid. Requires UEFI but not TPM.
Security Groups
A form of cloud-based network segmentation that involves virtual firewalls limiting inbound and
outbound traffic for an instance.
Server Authentication
Digital certificates can be used to validate that a server is legitimate. Example: Web server
certificates used to validate a website.
Serverless Computing
An architecture where all network architecture is in the cloud. This architecture is designed to
replace LANs. Applications are functions and microservices that interact with each other for
handling client requests. The cloud will create a container, perform the processing, and then
destroy the container. Billing is handled by execution time, rather than hourly rates. Also called
Function as a Service (FaaS).
sha256sum
A hashing utility in Linux that generates SHA-2 hashes for files with a digest length of 256 bits.
Shell Restrictions
Restrict what a shell is allowed to do.
Shibboleth
A federated trust model that is based on SAML (Security Assertion Markup Language) and is
often used by universities and public service organizations. The process flow is that the user
contacts the Shibboleth site via SAML. The site redirects to an identity provider that verifies
using SAML info. The identity provider responds to the site with authentication information. The
site validates and then gives access based on the user's SAML info.
Side-Channel Analysis
A type of vulnerability analysis that involves inspections of a system or software while running
by analyzing its data: sniffers.
Sideloading
The installation of apps on a mobile device from any third party. Management suites can be
configured not to allow this.
Social Engineering
Manipulating users by using emotions (fear, need to be helpful, etc) to gain access or get them
to do what that attacker wants.
Spiral Method
In this approach to software development, development is modified continually throughout the
process based on stakeholder feedback. Risk analysis is performed at each iterative step. It is
suited well for large, complex projects.
SQL Injection
An attack that manipulates the SQL language to gain access to data stored in the targeted
database.
ssdeep
A hashing utility that is commonly used by antivirus programs to compare files to identity
matches. It utilizes context-triggered piecewise hashing (CTPH).
Staging or QA Environment
In software development, this is the environment where work is performed in the final stages to
confirm the software is ready for release.
Static Analysis
A type of vulnerability analysis that involves manually reviewing source code or using
applications that can look for coding errors.
Steganalysis
This process is concerned with locating data that may be hidden within other files. This is
usually associated with images, but data can be stored in many types of files.
strace
A tool used to identify interactions between processes and the Linux kernel.
Stream Cipher
An encryption where each digit of plaintext data is encrypted one at a time using a keystream (a
stream of pseudorandom values). It is useful for encrypting data when the amount or length of
the data isn't known, such as with video. Keystreams are generated by an initialization vector
(IV) that is combined with a static key. This creates a unique keystream. The IV is always
changing to ensure that unique ciphertext is created from the same plaintext.
strings
A Unix/Linux utility that can recover text strings and discover attributes regarding the internal
structure of a program.
Structured/Curated Zone
A form of cloud-based data zone where the data is checked for quality and formatted for later
use.
Symmetric Algorithms
Algorithms that are used to encrypt data or messages. They can only be unlocked with a single
key. Encryption is not like hashing, as you can view the data once it's decrypted. The weakness
is in creating and distributing the keys in a secure way.
TACACS+
Terminal Access Controller Access Control System Plus - is a CISCO-developed authentication
protocol. It uses TCP port 49, data is encrypted, and AAA functions are all discrete.
tcpdump
A command-line packet analysis tool. It captures network data and saves it to a pcap file for
analysis.
Test/Integration Environment
In software development, this is the environment that is where code from multiple developers
can be merged and tested to ensure that code builds properly and functions correctly.
Threat Emulation
Using known TTPs (tactics, techniques, and procedures) to emulate how an attacker may
operate in a realistic way. Can be used to test current defenses.
Threat Hunting
Using assessment techniques with insight gained from threat intelligence so that threats can be
proactively found.
Threat Intelligence
The continual process organizations use to collect and analyze threat information so they can
understand the threats that they face. Threat intelligence can be of one of three types: tactical,
strategic, and operational.
Time Series Cloud Storage Database
Focused on supporting apps that analyze data and changes over time, best represented using
time intervals
Tokenization
A security mechanism used in credit card processing; data is replaced with a token that cannot
be reversed.
Traffic Mirroring
A critical part of NIDS devices. Other terms are port mirroring and SPAN ports. Sniffs the
network data in real-time to see the traffic packets. Traffic frames are copied to the port for
analysis.
Transitive Trust
A trust mechanism that assumes if resource A trusts B, and B trusts C, then A trusts C.
Example: Active Directory.
True Negative
Something correctly identified as not an issue.
True Positive
Something identified as an issue that is an issue.
Type 1 Hypervisor
A type of virtualization that consists of bare metal, doesn't need a host OS, interacts with
hardware directly. Examples: Hyper-V, XEN, Proxmox, VMWare, ESXI
Type 2 Hypervisor
A type of virtualization that requires a host OS. Examples: Virtual Box, VMWare Workstation,
Parallels Workstation
U
Unit Testing
In software development, this type of testing is done on individual blocks of code to make sure it
performs the exact function it was intended to perform.
Vendor Lock-in
A vendor assessment consideration related to whether the customer could become completely
dependent on the vendor because changing to another vendor would be either too expensive or
impossible.
Vendor Lock-out
A vendor assessment consideration where the vendor's product will not work with other vendors'
products.
Vendor Viability
A vendor assessment consideration where the customer needs to assess whether the vendor
will stay in business in the future and/or grow and expand in their field.
Virtual/Augmented Reality
Extended concept of AI. Emulates a real-life environment with computer-generated sights and
sounds. It has numerous applications and can be used for training or providing information to a
user on people or objects that are within view.
Virtualization
Creating a simulated or virtual environment that is not limited by the physical one. It allows for
multiple operating systems to be run at the same time on the same computer. It requires three
components: host hardware, a hypervisor (virtualization software), and the guest operating
system, virtual machines, or instances.
VLAN Hopping
An attack that allows attackers to move between otherwise isolated networks. It usually occurs
by spoofing a switched network.
vmstat
A command-line tool used to display real-time information on system memory, running
processes, interrupts, paging, and I/O stats.
Volatility
A command-line tool used to perform memory analysis. It can be used to view the contents of a
memory dump.
Vulnerability
Any area of the enterprise where you are not fully protected and could be exploited by attackers.
This does not only relate to software bugs or weak patches but can also be things like
insufficient security training for staff or the lack of an alarm system to protect your premises.
Vulnerability Scanner
A tool that scans devices on your network to see what areas might be vulnerable. They may test
known exploits against your systems, look for missing patches and misconfigured system
settings or default settings that need to be changed. Example: Nessus.
W
Wassenaar Agreement
An agreement that was established in 1996 to define export controls for "conventional arms and
dual-use goods and technologies." It was agreed to by 42 participating states that work to
prevent sensitive technology from getting to terrorist groups and rogue nations.
Waterfall
In this approach to software development, each phase cascades downward when all tasks in
the previous phase have been completed. Code check is performed at the end of each phase. It
is very rigid and you cannot skip a phase.
Watermarking
Marking data so that it clearly displays important details about the data, such as ownership,
classification, usage, etc.
Wireshark
A GUI-based packet analysis tool.
Zero Trust
The concept of never trusting anything, always verifying and assuming something could be
a breach. This means that every connection and request on the network must be explicitly
evaluated and validated. It focuses on resources. The NIST SP 800-207 covers the Zero
Trust Architecture.