Recently updated
Published entries ordered by most recent updates.
- fill deviceJan 06, 2026
A device used to transfer or store keying material in electronic form or to insert keying material into cryptographic equipment.
- Exploitation of Remote ServicesJan 06, 2026
Adversaries may exploit remote services of enterprise servers, workstations, or other resources to gain unauthorized access to internal systems once inside of a network. Adversaries may exploit remote services by taking advantage of a mobile device’s access to an internal enterprise network through local connectivity or through a Virtual Private Network (VPN). Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary controlled code. A common goal for post compromise exploitation of remote services is for lateral movement to enable access to a remote system.
- BCIJan 06, 2026
See: brand CRL identifier.
- Data from Local SystemJan 06, 2026
Adversaries may search local system sources, such as file systems or local databases, to find files of interest and sensitive data prior to exfiltration.
- invalidity dateJan 06, 2026
An X.509 CRL entry extension that "indicates the date at which it is known or suspected that the [revoked certificate's private key] was compromised or that the certificate should otherwise be considered invalid." [X509].
- Digital ID(service mark)Jan 06, 2026
Synonym for "digital certificate".
- COIJan 06, 2026
See: community of interest.
- MD4Jan 06, 2026
A cryptographic hash [R1320] that produces a 128 bit hash result and was designed by Ron Rivest. (See: Derivation under "MD2", SHA 1.)
- formal specificationJan 06, 2026
A precise description of the (intended) behavior of a system, usually written in a mathematical language, sometimes for the
- bulk keying materialJan 06, 2026
Refers to handling keying material in large quantities, e.g., as a dataset that contains many items of keying material. (See: type 0. Compare: bulk key, bulk encryption.)
- attribute authorityJan 06, 2026
A CA that issues attribute certificates.
- electronic walletJan 06, 2026
A secure container to hold, in digitized form, some sensitive data objects that belong to the owner, such as electronic money, authentication material, and various types of personal information. (See: IOTP.)
- good engineering practice(s)Jan 06, 2026
A term used to specify or characterize design, implementation, installation, or operating practices for an information system, when a more explicit specification is not possible. Generally understood to refer to the state of the engineering art for commercial systems that have problems and solutions equivalent to the system in question.
- key translation centerJan 06, 2026
A type of key center that implements a key distribution protocol (based on symmetric cryptography) to convey keys between two (or more) parties who wish to communicate securely. (Compare: key distribution center.)
- Device LockoutJan 06, 2026
An adversary may seek to inhibit user interaction by locking the legitimate user out of the device. This is typically accomplished by requesting device administrator permissions and then locking the screen using . Other novel techniques for locking the user out of the device have been observed, such as showing a persistent overlay, using carefully crafted “call” notification screens, and locking HTML pages in the foreground. These techniques can be very difficult to get around, and typically require booting the device into safe mode to uninstall the malware.(Citation: Microsoft MalLockerB)(Citation: Talos GPlayed)(Citation: securelist rotexy 2018)
- Internet StandardJan 06, 2026
A specification, approved by the IESG and published as an RFC, that is stable and well understood, is technically competent, has multiple, independent, and interoperable implementations with substantial operational experience, enjoys significant public support, and is recognizably useful in some or all parts of the Internet. (RFC 2026) (Compare: RFC.)
- Modify Controller TaskingJan 06, 2026
Adversaries may modify the tasking of a controller to allow for the execution of their own programs. This can allow an adversary to manipulate the execution flow and behavior of a controller.
- e-cashJan 06, 2026
Electronic cash; money that is in the form of data and can be used as a payment mechanism on the Internet. (See: IOTP.)
- ATISJan 06, 2026
See: "Alliance for Telecommunications Industry Solutions" under "ANSI".
- geopolitical certificate authorityJan 06, 2026
In a SET certification hierarchy, an optional level that is certified by a BCA and that may certify cardholder CAs, merchant CAs, and payment gateway CAs. Using GCAs enables a brand to distribute responsibility for managing certificates to geographic or political regions, so that brand policies can vary between regions as needed.
- chosen-ciphertext attackJan 06, 2026
A cryptanalysis technique in which the analyst tries to determine the key from knowledge of plain text that corresponds to cipher text selected (i.e., dictated) by the analyst.
- outsiderJan 06, 2026
A user (usually a person) that accesses a system from a position that is outside the system's security perimeter. (Compare: authorized user, insider, unauthorized user.)
- attack potentialJan 06, 2026
The perceived likelihood of success should an attack be launched, expressed in terms of the attacker's ability (i.e., expertise and resources) and motivation. (Compare: threat, risk.)
- anomaly detectionJan 06, 2026
An intrusion detection method that searches for activity that is different from the normal behavior of system entities and system resources. (See: IDS. Compare: misuse detection.)
- daemonJan 06, 2026
A computer program that is not invoked explicitly but waits until a specified condition occurs, and then runs with no associated user (principal), usually for an administrative purpose. (See: zombie.)
- Disable or Modify ToolsJan 06, 2026
Adversaries may disable security tools to avoid potential detection of their tools and activities. This can take the form of disabling security software, modifying SELinux configuration, or other methods to interfere with security tools scanning or reporting information. This is typically done by abusing device administrator permissions or using system exploits to gain root access to the device to modify protected system files.
- Internet-DraftJan 06, 2026
A working document of the IETF, its areas, and its working groups. (RFC 2026) (Compare: RFC.)
- Hypertext Markup LanguageJan 06, 2026
A platform independent system of syntax and semantics (RFC 1866) for adding characters to data files (particularly text files) to represent the data's structure and to point to related data, thus creating hypertext for use in the World Wide Web and other applications. (Compare: XML.)
- Project File InfectionJan 06, 2026
Adversaries may attempt to infect project files with malicious code. These project files may consist of objects, program organization units, variables such as tags, documentation, and other configurations needed for PLC programs to function. (Citation: Beckhoff) Using built in functions of the engineering software, adversaries may be able to download an infected program to a PLC in the operating environment enabling further Execution and Persistence techniques. (Citation: PLCdev)
- Forum of Incident Response and Security TeamsJan 06, 2026
An international consortium of CSIRTs (e.g., CIAC) that work together to handle computer security incidents and promote preventive activities. (See: CSIRT, security incident.)
- Network Connection EnumerationJan 06, 2026
Adversaries may perform network connection enumeration to discover information about device communication patterns. If an adversary can inspect the state of a network connection with tools, such as Netstat(Citation: Netstat), in conjunction with System Firmware, then they can determine the role of certain devices on the network (Citation: MITRE). The adversary can also use Network Sniffing to watch network traffic for details about the source, destination, protocol, and content.
- KeyloggingJan 06, 2026
Adversaries may log user keystrokes to intercept credentials as the user types them. Keylogging is likely to be used to acquire credentials for new access opportunities when OS Credential Dumping efforts are not effective, and may require an adversary to intercept keystrokes on a system for a substantial period of time before credentials can be successfully captured. In order to increase the likelihood of capturing credentials quickly, an adversary may also perform actions such as clearing browser cookies to force users to reauthenticate to systems.(Citation: Talos Kimsuky Nov 2021)
- disaster planJan 06, 2026
Synonym for "contingency plan".
- Exfiltration Over Alternative ProtocolJan 06, 2026
Adversaries may steal data by exfiltrating it over a different protocol than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server.
- correctionJan 06, 2026
A system change made to eliminate or reduce the risk of reoccurrence of a security violation or threat consequence. (See: secondary definition under "security".)
- FOUOJan 06, 2026
See: For Official Use Only.
- Adversary-in-the-MiddleJan 06, 2026
Adversaries may attempt to position themselves between two or more networked devices using an adversary in the middle (AiTM) technique to support follow on behaviors such as Network Sniffing, Transmitted Data Manipulation, or replay attacks (Exploitation for Credential Access). By abusing features of common networking protocols that can determine the flow of network traffic (e.g. ARP, DNS, LLMNR, etc.), adversaries may force a device to communicate through an adversary controlled system so they can collect information or perform additional actions.(Citation: Rapid7 MiTM Basics)
- BLACKJan 06, 2026
Designation for data that consists only of cipher text, and for information system equipment items or facilities that handle only cipher text. Example: "BLACK key". (See: BCR, color change, RED/BLACK separation. Compare: RED.)
- Suppress Application IconJan 06, 2026
A malicious application could suppress its icon from being displayed to the user in the application launcher. This hides the fact that it is installed, and can make it more difficult for the user to uninstall the application. Hiding the application's icon programmatically does not require any special permissions.
- corruptionJan 06, 2026
A type of threat action that undesirably alters system operation by adversely modifying system functions or data. (See: disruption.)
- categoryJan 06, 2026
A grouping of sensitive information items to which a non hierarchical restrictive security label is applied to increase protection of the data. (See: formal access approval. Compare: compartment, classification.)
- IPRAJan 06, 2026
See: Internet Policy Registration Authority.
- national security systemJan 06, 2026
Any Government operated information system for which the function, operation, or use (a) involves intelligence activities; (b) involves cryptologic activities related to national security; (c) involves command and control of military forces; (d) involves equipment that is an integral part of a weapon or weapon system; or (e) is critical to the direct fulfillment of military or intelligence missions and does not include a system that is to be used for routine administrative and business applications (including payroll, finance, logistics, and personnel management applications). [Title 40 U.S.C. Section 1552, Information Technology Management Reform Act of 1996.] (See: type 2 product.)
- mandatory access controlJan 06, 2026
An access control service that enforces a security policy based on comparing (a) security labels, which indicate how sensitive or critical system resources are, with (b) security clearances, which indicate that system entities are eligible to access certain resources. (See: discretionary access control, MAC, rule based security policy.)
- identity-based security policyJan 06, 2026
"A security policy based on the identities and/or attributes of users, a group of users, or entities acting on behalf of the users and the resources/objects being accessed." [I7498 2] (See: rule based security policy.)
- MalwareJan 06, 2026
Malware is malicious software designed to disrupt, damage, or gain unauthorized access to systems and data.
- access levelJan 06, 2026
A category within a given security classification limiting entry or system connectivity to only authorized persons.
- key generationJan 06, 2026
A process that creates the sequence of symbols that comprise a cryptographic key. (See: key management.)
A standard for evaluating information technology (IT) products and systems. It states requirements for security functions and for assurance measures. [CCIB] (See: CLEF, EAL, packages, protection profile, security target, TOE. Compare: CMM.)
- Extensible Markup LanguageJan 06, 2026
A version of Standard Generalized Markup Language (ISO 8879) that separately represents a document's content and its structure. XML was designed by W3C for use on the World Wide Web.