Skip to content
SynAc
Discovery

Recently updated

Published entries ordered by most recent updates.

  1. demilitarized zoneJan 06, 2026

    Synonym for "buffer zone".

  2. A CA that issues digital certificates to merchants and is operated on behalf of a payment card brand, an acquirer, or another party according to brand rules. Acquirers verify and approve requests for merchant certificates prior to issuance by the MCA. An MCA does not issue a CRL, but does distribute CRLs issued by root CAs, brand CAs, geopolitical CAs, and payment gateway CAs. [SET2]

  3. floodingJan 06, 2026

    An attack that attempts to cause a failure in a system by providing more input than the system can process properly. (See: denial of service, fairness. Compare: jamming.)

  4. ciphonyJan 06, 2026

    The process of encrypting audio information.

  5. Program UploadJan 06, 2026

    Adversaries may attempt to upload a program from a PLC to gather information about an industrial process. Uploading a program may allow them to acquire and study the underlying logic. Methods of program upload include vendor software, which enables the user to upload and read a program running on a PLC. This software can be used to upload the target program to a workstation, jump box, or an interfacing device.

  6. flow analysisJan 06, 2026

    An analysis performed on a nonprocedural, formal, system specification that locates potential flows of information between system variables. By assigning security levels to the variables, the analysis can find some types of covert channels. [Huff]

  7. See: secondary definition under "ISO".

  8. An adversary may use access to cloud services (e.g. Google's Android Device Manager or Apple iCloud's Find my iPhone) or to an enterprise mobility management (EMM)/mobile device management (MDM) server console to track the location of mobile devices managed by the service.(Citation: Krebs Location)

  9. A distributed system in which one or more entities, called clients, request a specific service from one or more other entities, called servers, that provide the service to the clients.

  10. Adversaries may leverage external facing remote services to initially access and/or persist within a network. Remote services such as VPNs, Citrix, and other access mechanisms allow users to connect to internal enterprise network resources from external locations. There are often remote service gateways that manage connections and credential authentication for these services. Services such as Windows Remote Management and VNC can also be used externally.(Citation: MacOS VNC software for Remote Desktop)

  11. CPSJan 06, 2026

    See: certification practice statement.

  12. MISPCJan 06, 2026

    See: Minimum Interoperability Specification for PKI Components.

  13. algorithmJan 06, 2026

    A finite set of step by step instructions for a problem solving or computation procedure, especially one that can be implemented by a computer. (See: cryptographic algorithm.)

  14. "Official responsible for directing the operation of a cryptonet and for managing the operational use and control of keying material assigned to the cryptonet." [C4009, N4006]

  15. The private extension defined by PKIX for X.509 certificates to indicate "how to access CA information and services for the issuer of the certificate in which the extension appears. Information and services may include on line validation services and CA policy data." [R3280] (See: private extension.)

  16. hypertextJan 06, 2026

    A computer document, or part of a document, that contains hyperlinks to other documents; i.e., text that contains active pointers to other text. Usually written in HTML and accessed using a web browser. (See: hypermedia.)

  17. A key establishment method by which a secret key is generated by a system entity in a communication association and securely sent to another entity in the association. (Compare: key agreement.)

  18. "The corroboration that the source of data received is as claimed." [I7498 2] (See: authentication.)

  19. Property of a system whereby a subject has write access to an object only if the classification of the object dominates the clearance of the subject. (See: property, Bell LaPadula model.)

  20. A private, not for profit association that administers U.S. private sector voluntary standards.

  21. missionJan 06, 2026

    A statement of a (relatively long term) duty or (relatively short term) task that is assigned to an organization or system, indicates the purpose and objectives of the duty or task, and may indicate the actions to be taken to achieve it.

  22. IPsecJan 06, 2026

    See: IP Security Protocol.

  23. OIDJan 06, 2026

    See: object identifier.

  24. output feedbackJan 06, 2026

    A block cipher mode that modifies ECB mode to operate on plaintext segments of variable length less than or equal to the block length. [FP081] (See: block cipher, [SP38A].)

  25. CMACJan 06, 2026

    A message authentication code [SP38B] that is based on a symmetric block cipher. (See: block cipher.)

  26. bridge CAJan 06, 2026

    A PKI consisting of only a CA that cross certifies with CAs of some other PKIs. (See: cross certification. Compare: bridge.)

  27. buffer zoneJan 06, 2026

    A neutral internetwork segment used to connect other segments that each operate under a different security policy.

  28. Adversaries may modify system software binaries to establish persistent access to devices. System software binaries are used by the underlying operating system and users over adb or terminal emulators.

  29. Valid AccountsJan 06, 2026

    Adversaries may steal the credentials of a specific user or service account using credential access techniques. In some cases, default credentials for control system devices may be publicly available. Compromised credentials may be used to bypass access controls placed on various resources on hosts and within the network, and may even be used for persistent access to remote systems. Compromised and default credentials may also grant an adversary increased privilege to specific systems and devices or access to restricted areas of the network. Adversaries may choose not to use malware or tools, in conjunction with the legitimate access those credentials provide, to make it harder to detect their presence or to control devices and send legitimate commands in an unintended way.

  30. Measures that implement and assure security services in a communication system, particularly those that provide data confidentiality and data integrity and that authenticate communicating entities.

  31. managerJan 06, 2026

    A person who controls the service configuration of a system or the functional privileges of operators and other users. (See: administrative security. Compare: operator, SSO, user.)

  32. identityJan 06, 2026

    The collective aspect of a set of attribute values (i.e., a set of characteristics) by which a system user or other system entity is recognizable or known. (See: authenticate, registration. Compare: identifier.)

  33. An organization that has official approval to evaluate the security of products and systems under the Common Criteria, ITSEC, or some other standard. (Compare: KLIF.)

  34. Adversaries may spoof reporting messages in control system environments for evasion and to impair process control. In control systems, reporting messages contain telemetry data (e.g., I/O values) pertaining to the current state of equipment and the industrial process. Reporting messages are important for monitoring the normal operation of a system or identifying important events such as deviations from expected values.

  35. Network SniffingJan 06, 2026

    Network sniffing is the practice of using a network interface on a computer system to monitor or capture information (Citation: Enterprise ATT&CK January 2018) regardless of whether it is the specified destination for the information.

  36. See: Internet Protocol Suite.

  37. LDAPJan 06, 2026

    See: Lightweight Directory Access Protocol.

  38. KAKJan 06, 2026

    See: key auto key. (Compare: KEK.)

  39. anonymityJan 06, 2026

    The condition of an identity being unknown or concealed. (See: alias, anonymizer, anonymous credential, anonymous login, identity, onion routing, persona certificate. Compare: privacy.)

  40. ohnosecondJan 06, 2026

    That minuscule fraction of time in which you realize that your private key has been compromised.

  41. mission criticalJan 06, 2026

    A condition of a system service or other system resource such that denial of access to, or lack of availability of, the resource would jeopardize a system user's ability to perform a primary mission function or would result in other serious consequences. (See: Critical. Compare: mission essential.)

  42. Web ServiceJan 06, 2026

    Adversaries may use an existing, legitimate external Web service as a means for relaying data to/from a compromised system. Popular websites and social media, acting as a mechanism for C2, may give a significant amount of cover. This is due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection.

  43. CANEWAREJan 06, 2026

    An end to end encryption system for computer data networks that was developed by the U.S. DoD in the 1980s to provide host to host data confidentiality service for datagrams in OSIRM Layer 3. [Roge] (Compare: BLACKER, IPsec.)

  44. declassificationJan 06, 2026

    An authorized process by which information is declassified. (Compare: classification.)

  45. IEEEJan 06, 2026

    See: Institute of Electrical and Electronics Engineers, Inc.

  46. formal modelJan 06, 2026

    A security model that is formal. Example: Bell LaPadula model. [Land] (See: formal, security model.)

  47. AHJan 06, 2026

    See: Authentication Header

  48. L2TPJan 06, 2026

    See: Layer 2 Tunneling Protocol.

  49. Those systems that are so vital to a nation that their incapacity or destruction would have a debilitating effect on national security, the economy, or public health and safety.

  50. A branch of cryptography in which a cryptographic system or algorithms use the same secret key (a shared secret key).