Glossary
Some security terms for reference below:
- Computer Security Incident Response Team (CSIRT): A team of security experts trained in managing and responding to security incidents.
- Documentation: Recorded material serving a specific purpose.
- Endpoint Detection and Response (EDR): Software monitoring endpoints for malicious activities.
- Event: An observable incident within a network, system, or device.
- False Negative: A situation where a threat goes undetected.
- False Positive: An erroneous alert indicating a non-existent threat.
- Incident: An event compromising the confidentiality, integrity, or availability of information or systems, or breaching laws or policies.
- Incident Handler’s Journal: Documentation used in incident response.
- Incident Response Plan: A documented strategy detailing steps for incident response.
- Intrusion Detection System (IDS): Software alerting to potential intrusions in a system.
- Intrusion Prevention System (IPS): Software monitoring for and stopping intrusive activities.
- National Institute of Standards and Technology (NIST) Incident Response Lifecycle: A framework outlining four phases of incident response: Preparation, Detection and Analysis, Containment, Eradication, and Recovery, and Post-Incident Activity.
- Playbook: A manual detailing operational actions.
- Security Information and Event Management (SIEM): Software collecting and analysing log data to monitor organisational activities.
- Security Operations Center (SOC): A unit monitoring networks and systems for security threats.
- Security Orchestration, Automation, and Response (SOAR): A suite of tools and workflows automating responses to security events.
- True Negative: A situation with correctly undetected malicious activity.
- True Positive: A correct alert identifying an attack.
- Cybersecurity: Protecting information by securing networks, devices, and data against unauthorised access.
- Cloud Security: Ensuring cloud-stored assets are properly configured and accessed only by authorised users.
- Internal Threat: A security risk from current or former employees, vendors, or partners.
- Network Security: Protecting a network infrastructure from unauthorised access.
- Personally Identifiable Information (PII): Information identifying an individual.
- Security Posture: An organisation’s capability to defend critical assets and adapt to changes.
- Sensitive Personally Identifiable Information (SPII): PII requiring stricter handling.
- Technical Skills: Knowledge-based abilities regarding specific tools and procedures.
- Threat: Any potential negative impact on assets.
- Threat Actor: Individuals or groups posing security risks.
- Transferable Skills: Abilities applicable across different careers.
- Adversarial Artificial Intelligence (AI): Techniques manipulating AI and machine learning for efficient attacks.
- Business Email Compromise (BEC): Phishing attacks via email impersonation for financial gain.
- Computer Virus: Malicious code damaging data and software.
- Cryptographic Attack: Compromising secure communication between sender and receiver.
- Hacker: Someone accessing computer systems, networks, or data without authorization.
- Malware: Software designed to damage devices or networks.
- Password Attack: Attempts to access password-protected systems or data.
- Phishing: Digital deception to acquire sensitive data or spread malware.
- Physical Attack: A security breach affecting both digital and physical environments.
- Physical Social Engineering: Impersonating others to gain unauthorized physical access.
- Social Engineering: Manipulation exploiting human error to gain information or access.
- Social Media Phishing: Gathering information on social media for targeted attacks.
- Spear Phishing: Targeted malicious email attacks from seemingly trusted sources.
- Supply-Chain Attack: Targeting systems or software for malware deployment.
- USB Baiting: Leaving malware-infected USBs to infiltrate networks.
- Vishing: Voice communication exploitation to obtain sensitive information.
- Watering Hole Attack: Compromising a frequently visited website to target specific users.
- Asset: Valuable items to an organisation.
- Availability: Ensuring authorised access to data.
- Compliance: Adhering to internal and external standards and regulations.
- Confidentiality: Restricting data access to authorised users.
- Confidentiality, Integrity, Availability (CIA) Triad: A model guiding risk assessment in security policies.
- Hacktivist: Hackers pursuing political goals.
- Health Insurance Portability and Accountability Act (HIPAA): A US law protecting patient health information.
- Integrity: Maintaining data accuracy and reliability.
- NIST Cybersecurity Framework (CSF): Guidelines for managing cybersecurity risks.
- Privacy Protection: Safeguarding personal information from unauthorised use.
- Protected Health Information (PHI): Health-related information requiring protection.
- Security Architecture: Design combining components to protect against risks.
- Security Controls: Measures reducing security risks.
- Security Ethics: Decision-making guidelines for security professionals.
- Security Frameworks: Guidelines for risk mitigation and data protection.
- Security Governance: Practices directing an organisation’s security efforts.
- Antivirus Software: Programs detecting and eliminating malware.
- Database: Organised data collection.
- Data Point: Specific information units.
- Linux: An open-source operating system.
- Log: A record of events in organisational systems.
- Network Protocol Analyzer (Packet Sniffer): Tools capturing and analysing network traffic.
- Order of Volatility: Data preservation priority sequence.
- Programming: Creating computer-executable instructions.
- Protecting and Preserving Evidence: Handling digital evidence correctly.
- SQL (Structured Query Language): Language for database interaction.
- Assess: Evaluating the implementation of controls (NIST Risk Management Framework).
- Authorize: Accountability for security and privacy risks in an organisation.
- Business Continuity: Maintaining productivity through disaster recovery planning.
- Categorize: Developing risk management processes (NIST RMF).
- External Threat: External risks to organisational assets.
- Implement: Executing security and privacy plans (NIST RMF).
- Internal Threat: Security risks from current/former employees or partners.
- Monitor: Observing system operations (NIST RMF).
- Prepare: Pre-breach security and privacy risk management (NIST RMF).
- Ransomware: Malware encrypting data for extortion.
- Risk: Potential impacts on asset confidentiality, integrity, or availability.
- Risk Mitigation: Procedures reducing breach impacts.
- Select: Choosing controls for organisational protection (NIST RMF).
- Shared Responsibility: Collective role in reducing risks and maintaining security.
- Social Engineering: Exploiting human error for information or access.
- Vulnerability: Exploitable security weaknesses.
- Attack Vectors: Paths for security breaches.
- Authentication: Verifying identity.
- Authorization: Granting access to system resources.
- Biometrics: Unique physical traits for identity verification.
- Detect: Identifying security incidents (NIST core function).
- Encryption: Converting readable data to encoded formats.
- Identify: Managing cybersecurity risks (NIST core function).
- NIST Special Publication (SP) 800-53: A framework for securing US federal information systems.
- Open Web Application Security Project (OWASP): An organisation improving software security.
- Protect: Safeguarding against cybersecurity threats (NIST core function).
- Recover: Restoring systems after incidents (NIST core function).
- Respond: Containing and analysing security incidents (NIST core function).
- Security Audit: Reviewing security controls and policies.
- Chronicle: A cloud-native tool for data retention, analysis, and search.
- Incident Response: Rapidly addressing security breaches.
- Metrics: Key technical attributes assessing software performance.
- Splunk Cloud: A cloud-based tool for log data collection and monitoring.
- Splunk Enterprise: A self-hosted tool for real-time security information and alerts.
- Bandwidth: Maximum data transmission rate over a network.
- Cloud Computing: Using internet-hosted servers and services.
- Data Packet: Basic information unit in network transmission.
- Hub: A network device broadcasting information to all connected devices.
- Internet Protocol (IP): Standards for routing and addressing network data packets.
- Local Area Network (LAN): A network covering a small geographical area.
- Media Access Control (MAC) Address: A unique identifier for network devices.
- Modem: A device connecting a router to the internet.
- Network: A collection of interconnected devices.
- Open Systems Interconnection (OSI) Model: A concept explaining communication layers in networks.
- Packet Sniffing: Capturing and inspecting network data packets.
- Port: A digital location for data transmission between devices.
- Router: A device connecting multiple networks.
- Speed: Data transmission rate of a device.
- Switch: A device connecting specific network devices for data exchange.
- TCP/IP Model: A framework for data organisation and transmission across networks.
- Analysis: The investigation and validation of alerts
- Broken chain of custody: Inconsistencies in the collection and logging of evidence in the chain of custody
- Business continuity plan (BCP): A document that outlines the procedures to sustain business operations during and after a significant disruption
- Chain of custody: The process of documenting evidence possession and control during an incident lifecycle
- Containment: The act of limiting and preventing additional damage caused by an incident
- Crowdsourcing: The practice of gathering information using public input and collaboration
- Detection: The prompt discovery of security events
- Documentation: Any form of recorded content that is used for a specific purpose
- Eradication: The complete removal of the incident elements from all affected systems
- Final report: Documentation that provides a comprehensive review of an incident
- Honeypot: A system or resource created as a decoy vulnerable to attacks with the purpose of attracting potential intruders
- Incident response plan: A document that outlines the procedures to take in each step of incident response
- Indicators of attack (IoA): The series of observed events that indicate a real-time incident
- Indicators of compromise (IoC): Observable evidence that suggests signs of a potential security incident
- Intrusion detection system (IDS): An application that monitors system activity and alerts on possible intrusions
- Lessons learned meeting: A meeting that includes all involved parties after a major incident
- Open-source intelligence (OSINT): The collection and analysis of information from publicly available sources to generate usable intelligence
- Playbook: A manual that provides details about any operational action
- Post-incident activity: The process of reviewing an incident to identify areas for improvement during incident handling
- Recovery: The process of returning affected systems back to normal operations
- Resilience: The ability to prepare for, respond to, and recover from disruptions
- Standards: References that inform how to set policies
- Threat hunting: The proactive search for threats on a network
- Threat intelligence: Evidence-based threat information that provides context about existing or emerging threats
- Triage: The prioritising of incidents according to their level of importance or urgency
- VirusTotal: A service that allows anyone to analyse suspicious files, domains, URLs, and IP addresses for malicious content
- Anomaly-based analysis: A detection method that identifies abnormal behavior
- Array: A data type that stores data in a comma-separated ordered list
- Common Event Format (CEF): A log format that uses key-value pairs to structure data and identify fields and their corresponding values
- Configuration file: A file used to configure the settings of an application
- Endpoint: Any device connected on a network
- Endpoint detection and response (EDR): An application that monitors an endpoint for malicious activity
- False positive: An alert that incorrectly detects the presence of a threat
- Host-based intrusion detection system (HIDS): An application that monitors the activity of the host on which it’s installed
- Intrusion detection systems (IDS): An application that monitors system activity and alerts on possible intrusions
- Key-value pair: A set of data that represents two linked items: a key, and its corresponding value
- Log: A record of events that occur within an organization’s systems
- Log analysis: The process of examining logs to identify events of interest
- Log management: The process of collecting, storing, analyzing, and disposing of log data
- Logging: The recording of events occurring on computer systems and networks
- Network-based intrusion detection system (NIDS): An application that collects and monitors network traffic and network data
- Object: A data type that stores data in a comma-separated list of key-value pairs
- Search Processing Language (SPL): Splunk’s query language
- Security information and event management (SIEM): An application that collects and analyzes log data to monitor critical activities in an organization
- Signature: A pattern that is associated with malicious activity
- Signature analysis: A detection method used to find events interest
- Suricata: An open-source intrusion detection system, intrusion prevention system, and network analysis tool
- Telemetry: The collection and transmission of data for analysis
- Wildcard: A special character that can be substituted with any other character
- YARA-L: A computer language used to create rules for searching through ingested log data
- Zero-day: An exploit that was previously unknown
- Automation: The use of technology to reduce human and manual effort to perform common and repetitive tasks
- Boolean data: Data that can only be one of two values: either True or False
- Command-line interface: A text-based user interface that uses commands to interact with the computer
- Comment: A note programmers make about the intention behind their code
- Conditional statement: A statement that evaluates code to determine if it meets a specified set of conditions
- Data type: A category for a particular type of data item
- Dictionary data: Data that consists of one or more key-value pairs
- Float data: Data consisting of a number with a decimal point
- Integer data: Data consisting of a number that does not include a decimal point
- Integrated development environment (IDE): A software application for writing code that provides editing assistance and error correction tools
- Interpreter: A computer program that translates Python code into runnable instructions line by line
- Iterative statement: Code that repeatedly executes a set of instructions
- List data: Data structure that consists of a collection of data in sequential form
- Loop variable: A variable that is used to control the iterations of a loop
- Notebook: An online interface for writing, storing, and running code
- Programming: A process that can be used to create a specific set of instructions for a computer to execute tasks
- Set data: Data that consists of an unordered collection of unique values
- String data: Data consisting of an ordered sequence of characters
- Syntax: The rules that determine what is correctly structured in a computing language
- Tuple data: Data structure that consists of a collection of data that cannot be changed
- Type error: An error that results from using the wrong data type
- Variable: A container that stores data
- Argument (Python): The data brought into a function when it is called
- Built-in function: A function that exists within Python and can be called directly
- Comment: A note programmers make about the intention behind their code
- Function: A section of code that can be reused in a program
- Global variable: A variable that is available through the entire program
- Indentation: Space added at the beginning of a line of code
- Library: A collection of modules that provide code users can access in their programs
- Local variable: A variable assigned within a function
- Module: A Python file that contains additional functions, variables, classes, and any kind of runnable code
- Parameter (Python): An object that is included in a function definition for use in that function
- PEP 8 style guide: A resource that provides stylistic guidelines for programmers working in Python
- Python Standard Library: An extensive collection of Python code that often comes packaged with Python
- Return statement: A Python statement that executes inside a function and sends information back to the function call
- Style guide: A manual that informs the writing, formatting, and design of documents
- User-defined function: A function that programmers design for their specific needs
- Automation: The use of technology to reduce human and manual effort to perform common and repetitive tasks
- Conditional statement: A statement that evaluates code to determine if it meets a specified set of conditions
- Debugger: A software tool that helps to locate the source of an error and assess its causes
- Debugging: The practice of identifying and fixing errors in code
- Exception: An error that involves code that cannot be executed even though it is syntactically correct
- File path: The location of a file or directory
- Function: A section of code that can be reused in a program
- Integrated development environment (IDE): A software application for writing code that provides editing assistance and error correction tools
- Iterative statement: Code that repeatedly executes a set of instructions
- Log: A record of events that occur within an organization’s systems
- Logic error: An error that results when the logic used in code produces unintended results
- Parsing: The process of converting data into a more readable format
- Syntax error: An error that involves invalid usage of a programming language
- Variable: A container that stores data
- Business continuity plan (BCP): A document that outlines the procedures to sustain business operations during and after a significant disruption
- Confidential data: Data that often has limits on the number of people who have access to it
- Disaster recovery plan: A plan that allows an organization’s security team to outline the steps needed to minimize the impact of a security incident
- Private data: Information that should be kept from the public
- Public data: Data that is already accessible to the public and poses a minimal risk to the organization if viewed or shared by others
- Security mindset: The ability to evaluate risk and constantly seek out and identify the potential or actual breach of a system, application, or data
- Sensitive data: A type of data that includes personally identifiable information (PII), sensitive personally identifiable information (SPII), and protected health information (PHI)
