Archives: Glossary Terms

(OS)Operating system

Software that manages hardware resources and provides common services for executing various applications on a computer. Windows XP Home Basic and Windows XP Professional are operating systems; so are Android...

Read More

(OSINT)Open source intelligence

Relevant information derived from the systematic collection, processing, and analysis of publicly available information in response to known or anticipated intelligence requirements. (Source: DoD Dictionary of Military and Associated Terms.)...

Read More

(XDR) Extended Detection and Response

A unified security incident detection and response platform that connects to multiple tools in the security stack via APIs, collects telemetry from each, and attempts to correlate that telemetry into...

Read More

(XSS) Cross-site scripting

From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser.

Read More

abstraction layer

A process of hiding the complexity of a system by providing an interface that eases its manipulation.

Read More

account hijacking

A form of identity theft in which a criminal or other attacker obtains control over a user’s online account (normally but not exclusively a financial account).

Read More

account takeover prevention

Prevention of the first link in an intrusion kill chain exploitation technique, where an attacker steals valid login credentials from a targeted victim.

Read More

Accumulo

A sorted, distributed key/value open-source database designed to handle big data securely and consistently. More properly referred to as “Apache Accumulo™”.

Read More

acoustic cryptanalysis

A kind of side-channel attack in which an attacker exploits sounds made by hardware (usually keyboards or internal hardware) to defeat encryption.

Read More

Active Cyber Defense

An approach to cyber defense that concentrates on detection and mitigation of cyber risks in cyber-relevant (near-real) time. Active Cyber Defense involves placing sensors on one’s own networks, and then...

Read More