Skip to content
SynAc
Discovery

Recently updated

Published entries ordered by most recent updates.

  1. Adversaries may leverage manufacturer or supplier set default credentials on control system devices. These default credentials may have administrative permissions and may be necessary for initial configuration of the device. It is general best practice to change the passwords for these accounts as soon as possible, but some manufacturers may have devices that have passwords or usernames that cannot be changed. (Citation: Keith Stouffer May 2015)

  2. Synonym for "checksum".

  3. classifiedJan 06, 2026

    Refers to information (stored or conveyed, in any form) that is formally required by a security policy to receive data confidentiality service and to be marked with a security label (which, in some cases, might be implicit) to indicate its protected status. (See: classify, collateral information, SAP, security level. Compare: unclassified.)

  4. ETSIJan 06, 2026

    See: European Telecommunication Standards Institute.

  5. KEKJan 06, 2026

    See: key encrypting key. (Compare: KAK.)

  6. BCAJan 06, 2026

    See: brand certification authority.

  7. computer systemJan 06, 2026

    Synonym for "information system", or a component thereof. (Compare: computer platform.)

  8. Denotes various forms of digitized images of handwritten signatures. (Compare: digital signature).

  9. Computer to computer exchange, between trading partners, of business data in standardized document formats.

  10. Adversaries may circumvent mechanisms designed to control elevated privileges to gain higher level permissions. Most modern systems contain native elevation control mechanisms that are intended to limit privileges that a user can gain on a machine. Authorization has to be granted to specific users in order to perform tasks that are designated as higher risk. An adversary can use several methods to take advantage of built in control mechanisms in order to escalate privileges on a system.

  11. Adversaries may inject malicious code into processes via ptrace (process trace) system calls in order to evade process based defenses as well as possibly elevate privileges. Ptrace system call injection is a method of executing arbitrary code in the address space of a separate live process.

  12. access modeJan 06, 2026

    A distinct type of data processing operation (e.g., read, write, append, or execute, or a combination of operations) that a subject can potentially perform on an object in an information system. [Huff] (See: read, write.)

  13. Input InjectionJan 06, 2026

    A malicious application can inject input to the user interface to mimic user interaction through the abuse of Android's accessibility APIs.

  14. data recoveryJan 06, 2026

    A process for learning, from some cipher text, the plain text that was previously encrypted to produce the cipher text. (See: recovery.)

  15. A Government, interagency, standing committee of the President's Critical Infrastructure Protection Board. The CNSS is chaired by the Secretary of Defense and provides a forum for the discussion of policy issues, sets national policy, and promulgates direction, operational procedures, and guidance for the security of national security systems. The Secretary of Defense and the Director of Central Intelligence are responsible for developing and overseeing the implementation of Government wide policies, principles, standards, and guidelines for the security of systems that handle national security information.

  16. natural disasterJan 06, 2026

    See: secondary definitions under "corruption" and "incapacitation".

  17. A Standard [ITSEC] jointly developed by France, Germany, the Netherlands, and the United Kingdom for use in the European Union; accommodates a wider range of security assurance and functionality combinations than the TCSEC. Superseded by the Common Criteria.

  18. incapacitationJan 06, 2026

    A type of threat action that prevents or interrupts system operation by disabling a system component. (See: disruption.)

  19. indirect attackJan 06, 2026

    See: secondary definition under "attack". Compare: direct attack.

  20. guardJan 06, 2026

    A computer system that (a) acts as gateway between two information systems operating under different security policies and (b) is trusted to mediate information data transfers between the two. (See: controlled interface, cross domain solution, domain, filter. Compare: firewall.)

  21. "Secure telecommunications or information handling equipment, or associated cryptographic component, that is unclassified but governed by a special set of control requirements." [C4009] (Compare: EUCI.)

  22. KerberosJan 06, 2026

    A system developed at the Massachusetts Institute of Technology that depends on passwords and symmetric cryptography (DES) to implement ticket based, peer entity authentication service and access control service distributed in a client server network environment. [R4120, Stei] (See: realm.)

  23. Adversaries may delete, alter, or hide generated artifacts on a device, including files, jailbreak status, or the malicious application itself. These actions may interfere with event collection, reporting, or other notifications used to detect intrusion activity. This may compromise the integrity of mobile security solutions by causing notable events or information to go unreported.

  24. MOSSJan 06, 2026

    See: MIME Object Security Services.

  25. See: /authentication/ under "credential".

  26. A place where ECU hardware is activated after being fabricated. (Compare: CLEF.)

  27. A process to identify, control, and protect evidence of the planning and execution of sensitive activities and operations, and thereby prevent potential adversaries from gaining knowledge of capabilities and intentions. (See: communications cover. Compare: operational security.)

  28. degausserJan 06, 2026

    An electrical device that can degauss magnetic storage media.

  29. bagbiterJan 06, 2026

    "An entity, such as a program or a computer, that fails to work or that works in a remarkably clumsy manner. A person who has caused some trouble, inadvertently or otherwise, typically by failing to program the computer properly." [NCSSG] (See: flaw.)

  30. See: OSIRM.

  31. IP addressJan 06, 2026

    A computer's internetwork address that is assigned for use by IP and other protocols.

  32. Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and languages provide ways of interacting with computer systems and are a common feature across many different platforms. Most systems come with some built in command line interface and scripting capabilities, for example, Android is a UNIX like OS and includes a basic Unix Shell that can be accessed via the Android Debug Bridge (ADB) or Java’s package.

  33. acquirerJan 06, 2026

    Stakeholder that acquires or procures a product or service.

  34. An adversary may attempt to get detailed information about remote systems and their peripherals, such as make/model, role, and configuration. Adversaries may use information from Remote System Information Discovery to aid in targeting and shaping follow on behaviors. For example, the system's operational role and model information can dictate whether it is a relevant target for the adversary's operational objectives. In addition, the system's configuration may be used to scope subsequent technique usage.

  35. Any mark in electronic form associated with an electronic document, applied with the intent to sign the document.

  36. An Internet IPsec protocol [R2408] to negotiate, establish, modify, and delete security associations, and to exchange key generation and authentication data, independent of the details of any specific key generation technique, key establishment protocol, encryption algorithm, or authentication mechanism.

  37. deterrenceJan 06, 2026

    See: secondary definition under "security".

  38. A security service that protects against a system entity using a system resource in a way not authorized by the system's security policy. (See: access control, discretionary access control, identity based security policy, mandatory access control, rule based security policy.)

  39. Adversaries may exploit software vulnerabilities to gain initial access to a mobile device.

  40. Clark-Wilson modelJan 06, 2026

    A security model [Clark] to maintain data integrity in the commercial world. (Compare: Bell LaPadula model.)

  41. The property that the information represented by data is accurate and consistent. (Compare: data integrity, source integrity.)

  42. countermeasureJan 06, 2026

    An action, device, procedure, or technique that meets or opposes (i.e., counters) a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken.

  43. active attackJan 06, 2026

    An attack on a secure communication protocol where the attacker transmits data to the claimant, Credential Service Provider (CSP), verifier, or Relying Party (RP). Examples of active attacks include man in the middle (MitM), impersonation, and session hijacking.

  44. MHSJan 06, 2026

    See: message handling system.

  45. Synonym for the Internet electronic mail system.

  46. dual controlJan 06, 2026

    A procedure that uses two or more entities (usually persons) operating in concert to protect a system resource, such that no single entity acting alone can access that resource. (See: no lone zone, separation of duties, split knowledge.)

  47. Least PrivilegeJan 06, 2026

    Least privilege means granting only the minimum access necessary to perform an authorized task.

  48. An adversary may push an update to a previously benign application to add malicious code. This can be accomplished by pushing an initially benign, functional application to a trusted application store, such as the Google Play Store or the Apple App Store. This allows the adversary to establish a trusted userbase that may grant permissions to the application prior to the introduction of malicious code. Then, an application update could be pushed to introduce malicious code.(Citation: android app breaking bad)

  49. Loss of ControlJan 06, 2026

    Adversaries may seek to achieve a sustained loss of control or a runaway condition in which operators cannot issue any commands even if the malicious interference has subsided. (Citation: Corero) (Citation: Michael J. Assante and Robert M. Lee) (Citation: Tyson Macaulay)

  50. Adversaries may try to access and collect application data resident on the device. Adversaries often target popular applications, such as Facebook, WeChat, and Gmail.(Citation: SWB Exodus March 2019)