- Jun 9, 2013
- 6,720
A15
Advanced Persistent Threat / APT
Adware
Angler Exploit Kit
Anomaly-based detection
Anonymizing proxy
Anti-malware
Anti-spam
Anti-spoofing
Antispyware software
Antivirus software
Atmos
Attack (online)
Attack signature
Authentication
Autorun worm
B15
Backdoor Trojan
Backup
Baseline security
Blacklisting
Blended Threat
Boot sector malware
Bot
Botnet
Browser hijacking
Brute force attack
Buffer overflow
Bug
Bulk Encryption
Business Impact Analysis (BIA)
BYOD
C24
Cache
Cache Cramming
Chargeware
Chief Information Officer (CIO)
CISO
Citadel
Code injection
Command and control center
Computer Abuse
Computer Forensics
Computer Incident Response Team (CIRT)
Confidentiality
Cookie
CoreBOT
Crimeware
Cross Site Scripting (XSS)
CryptoLocker
CryptoWall
CSO
CTB Locker
Cyber Attack
Cyber incident
Cyber security
Cyber weapon
D20
Data Asset
Data Integrity
Data leakage
Data loss
Data theft
Denial of service attack (DDoS)
Dialer
Digital Signature
Disaster Recovery Plan (DRP)
DNS Cache Poisoning
DNS hijacking
Document malware
Domain generation algorithm (DGA)
Domain shadowing
Dormant code
Dridex
Drive-by attack
Due diligence
Dumpster diving
Dyreza / Dyre
E11
Eavesdropping Attack
Email malware distribution
Encrypted Network
Encryption
End-to-End Encryption
End-to-End Security
Enterprise Risk Management
Exploit
Exploit kit
Exploit kits-as-a-service
External Security Testing
F11
Fail Safe
Fake antivirus malware
False positive
File binder
Fileless malware
Financial malware
Firewall
Flip button
Flooding
Forensic Specialist
Form-grabbing malware
G0
Nothing to see here!
Don't worry, cyber criminals will probably think of something really soon.
H8
Hacker
Hacktivism
Heartbleed vulnerability
Hoax
Honeymonkey
Honeypot
HTTPS scanning
Hybrid attack
I18
Inadvertent Disclosure
Incremental Backups
Information Assurance (IA)
Information Flow Control
Information Security
Information Security Policy
Information Security Risk
Information System Resilience
Information Systems Security (INFOSEC)
Inside Threat
Integrity
Intellectual Property
Internal Security Testing
Internet worm
Intrusion
Intrusion Detection Systems (IDS)
IP Flood
IP Spoofing
J0
Nothing to see here!
Don't worry, cyber criminals will probably think of something really soon.
K2
Keylogging
Kovter
L5
Level of Concern
Likelihood of Occurrence
Locky
Logic Bomb
Low Impact
M15
Macro Virus
Malicious Applet
Malicious Code
Malvertisement
Malvertising
Malware
Malware
Malware-as-a-service
Man-in-the-middle Attack (MitM)
Maximum Tolerable Downtime
Mazar BOT
Mobile code
Mobile phone malware
Moderate Impact
Multifactor Authentication
N5
Netiquette
Network Sniffing
Neutrino
Non-Repudiation
Nuclear Exploit Kit
O4
Obfuscation
Offline Attack
Operation Tovar
Outside Threat
P25
Packet Sniffer
Parasitic viruses
Passive attack
Password sniffing
Patch
Patch Management
Patching
Payload
Penetration
Penetration Testing
Personal Firewall
Pharming
Phishing
Plaintext
Polymorphic code
Polymorphic engine
Polymorphic malware
Polymorphic packer
Pop-up ad
Potential Impact
Potentially unwanted application (PUA)
Poweliks
Power virus
Proprietary Information (PROPIN)
Proxy server
Q0
Nothing to see here!
Don't worry, cyber criminals will probably think of something really soon.
R16
Ransomware
Real-time reaction
Remote access
Remote access Trojan / RAT
Remote diagnostics / maintenance
Replay attacks
Residual risk
Resilience
Reverse engineering
Risk assessment
Risk management
Risk mitigation
Rogue security software
Rogueware
Root cause analysis
Rootkit
S28
Safeguards
Scareware
Scavenging
Security controls
Security impact analysis
Security requirements
Sensitive information
Shylock
Signature
Skimming
Sniffer
Social engineering
Spam
Spam filtering software
Spear phishing
Spillage
Spoofing (Email)
Spy-phishing
Spyware
SQL injection
SSL / Secure Sockets Layer
Stealware
Strong authentication
Supply chain attack
Suppression measure
Suspicious files and behavior
System administrator / Sysadmin
System integrity
T19
Tampering
Targeted threat
TeslaCrypt
Threat
Threat analysis
Threat assessment
Threat event
Threat monitoring
Threat scenario
Threat shifting
Threat source
Time bomb
Time-dependent password
Token
Tracking cookie
Traffic analysis
Traffic Encryption Key (TEK)
Trojan (Trojan horse)
Typhoid adware
U3
Unauthorized access
Unauthorized disclosure
URL injection
V7
Vaccine
Vawtrak / Neverquest
Virtual Private Network / VPN
Virus
Virus hoax
Vishing
Vulnerability
W8
Wabbits
Watering Hole
Web bug
Web content filtering software
Webattacker
Whaling
Whitelist
Worm
X0
Nothing to see here!
Don't worry, cyber criminals will probably think of something really soon.
Y0
Nothing to see here!
Don't worry, cyber criminals will probably think of something really soon.
Z7
Zero Day
Zero Day virus / malware
Zero-Day attack
ZeuS / Zbot
Zeus GameOver / Zeus P2P
Zip bomb
Zombie
Advanced Persistent Threat / APT
Adware
Angler Exploit Kit
Anomaly-based detection
Anonymizing proxy
Anti-malware
Anti-spam
Anti-spoofing
Antispyware software
Antivirus software
Atmos
Attack (online)
Attack signature
Authentication
Autorun worm
B15
Backdoor Trojan
Backup
Baseline security
Blacklisting
Blended Threat
Boot sector malware
Bot
Botnet
Browser hijacking
Brute force attack
Buffer overflow
Bug
Bulk Encryption
Business Impact Analysis (BIA)
BYOD
C24
Cache
Cache Cramming
Chargeware
Chief Information Officer (CIO)
CISO
Citadel
Code injection
Command and control center
Computer Abuse
Computer Forensics
Computer Incident Response Team (CIRT)
Confidentiality
Cookie
CoreBOT
Crimeware
Cross Site Scripting (XSS)
CryptoLocker
CryptoWall
CSO
CTB Locker
Cyber Attack
Cyber incident
Cyber security
Cyber weapon
D20
Data Asset
Data Integrity
Data leakage
Data loss
Data theft
Denial of service attack (DDoS)
Dialer
Digital Signature
Disaster Recovery Plan (DRP)
DNS Cache Poisoning
DNS hijacking
Document malware
Domain generation algorithm (DGA)
Domain shadowing
Dormant code
Dridex
Drive-by attack
Due diligence
Dumpster diving
Dyreza / Dyre
E11
Eavesdropping Attack
Email malware distribution
Encrypted Network
Encryption
End-to-End Encryption
End-to-End Security
Enterprise Risk Management
Exploit
Exploit kit
Exploit kits-as-a-service
External Security Testing
F11
Fail Safe
Fake antivirus malware
False positive
File binder
Fileless malware
Financial malware
Firewall
Flip button
Flooding
Forensic Specialist
Form-grabbing malware
G0
Nothing to see here!
Don't worry, cyber criminals will probably think of something really soon.
H8
Hacker
Hacktivism
Heartbleed vulnerability
Hoax
Honeymonkey
Honeypot
HTTPS scanning
Hybrid attack
I18
Inadvertent Disclosure
Incremental Backups
Information Assurance (IA)
Information Flow Control
Information Security
Information Security Policy
Information Security Risk
Information System Resilience
Information Systems Security (INFOSEC)
Inside Threat
Integrity
Intellectual Property
Internal Security Testing
Internet worm
Intrusion
Intrusion Detection Systems (IDS)
IP Flood
IP Spoofing
J0
Nothing to see here!
Don't worry, cyber criminals will probably think of something really soon.
K2
Keylogging
Kovter
L5
Level of Concern
Likelihood of Occurrence
Locky
Logic Bomb
Low Impact
M15
Macro Virus
Malicious Applet
Malicious Code
Malvertisement
Malvertising
Malware
Malware
Malware-as-a-service
Man-in-the-middle Attack (MitM)
Maximum Tolerable Downtime
Mazar BOT
Mobile code
Mobile phone malware
Moderate Impact
Multifactor Authentication
N5
Netiquette
Network Sniffing
Neutrino
Non-Repudiation
Nuclear Exploit Kit
O4
Obfuscation
Offline Attack
Operation Tovar
Outside Threat
P25
Packet Sniffer
Parasitic viruses
Passive attack
Password sniffing
Patch
Patch Management
Patching
Payload
Penetration
Penetration Testing
Personal Firewall
Pharming
Phishing
Plaintext
Polymorphic code
Polymorphic engine
Polymorphic malware
Polymorphic packer
Pop-up ad
Potential Impact
Potentially unwanted application (PUA)
Poweliks
Power virus
Proprietary Information (PROPIN)
Proxy server
Q0
Nothing to see here!
Don't worry, cyber criminals will probably think of something really soon.
R16
Ransomware
Real-time reaction
Remote access
Remote access Trojan / RAT
Remote diagnostics / maintenance
Replay attacks
Residual risk
Resilience
Reverse engineering
Risk assessment
Risk management
Risk mitigation
Rogue security software
Rogueware
Root cause analysis
Rootkit
S28
Safeguards
Scareware
Scavenging
Security controls
Security impact analysis
Security requirements
Sensitive information
Shylock
Signature
Skimming
Sniffer
Social engineering
Spam
Spam filtering software
Spear phishing
Spillage
Spoofing (Email)
Spy-phishing
Spyware
SQL injection
SSL / Secure Sockets Layer
Stealware
Strong authentication
Supply chain attack
Suppression measure
Suspicious files and behavior
System administrator / Sysadmin
System integrity
T19
Tampering
Targeted threat
TeslaCrypt
Threat
Threat analysis
Threat assessment
Threat event
Threat monitoring
Threat scenario
Threat shifting
Threat source
Time bomb
Time-dependent password
Token
Tracking cookie
Traffic analysis
Traffic Encryption Key (TEK)
Trojan (Trojan horse)
Typhoid adware
U3
Unauthorized access
Unauthorized disclosure
URL injection
V7
Vaccine
Vawtrak / Neverquest
Virtual Private Network / VPN
Virus
Virus hoax
Vishing
Vulnerability
W8
Wabbits
Watering Hole
Web bug
Web content filtering software
Webattacker
Whaling
Whitelist
Worm
X0
Nothing to see here!
Don't worry, cyber criminals will probably think of something really soon.
Y0
Nothing to see here!
Don't worry, cyber criminals will probably think of something really soon.
Z7
Zero Day
Zero Day virus / malware
Zero-Day attack
ZeuS / Zbot
Zeus GameOver / Zeus P2P
Zip bomb
Zombie