Skip to content
SynAc
Discovery

Recently updated

Published entries ordered by most recent updates.

  1. fill deviceJan 06, 2026

    A device used to transfer or store keying material in electronic form or to insert keying material into cryptographic equipment.

  2. Adversaries may exploit remote services of enterprise servers, workstations, or other resources to gain unauthorized access to internal systems once inside of a network. Adversaries may exploit remote services by taking advantage of a mobile device’s access to an internal enterprise network through local connectivity or through a Virtual Private Network (VPN). Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary controlled code. A common goal for post compromise exploitation of remote services is for lateral movement to enable access to a remote system.

  3. BCIJan 06, 2026

    See: brand CRL identifier.

  4. Adversaries may search local system sources, such as file systems or local databases, to find files of interest and sensitive data prior to exfiltration.

  5. invalidity dateJan 06, 2026

    An X.509 CRL entry extension that "indicates the date at which it is known or suspected that the [revoked certificate's private key] was compromised or that the certificate should otherwise be considered invalid." [X509].

  6. Synonym for "digital certificate".

  7. COIJan 06, 2026

    See: community of interest.

  8. MD4Jan 06, 2026

    A cryptographic hash [R1320] that produces a 128 bit hash result and was designed by Ron Rivest. (See: Derivation under "MD2", SHA 1.)

  9. A precise description of the (intended) behavior of a system, usually written in a mathematical language, sometimes for the

  10. Refers to handling keying material in large quantities, e.g., as a dataset that contains many items of keying material. (See: type 0. Compare: bulk key, bulk encryption.)

  11. A CA that issues attribute certificates.

  12. electronic walletJan 06, 2026

    A secure container to hold, in digitized form, some sensitive data objects that belong to the owner, such as electronic money, authentication material, and various types of personal information. (See: IOTP.)

  13. A term used to specify or characterize design, implementation, installation, or operating practices for an information system, when a more explicit specification is not possible. Generally understood to refer to the state of the engineering art for commercial systems that have problems and solutions equivalent to the system in question.

  14. A type of key center that implements a key distribution protocol (based on symmetric cryptography) to convey keys between two (or more) parties who wish to communicate securely. (Compare: key distribution center.)

  15. Device LockoutJan 06, 2026

    An adversary may seek to inhibit user interaction by locking the legitimate user out of the device. This is typically accomplished by requesting device administrator permissions and then locking the screen using . Other novel techniques for locking the user out of the device have been observed, such as showing a persistent overlay, using carefully crafted “call” notification screens, and locking HTML pages in the foreground. These techniques can be very difficult to get around, and typically require booting the device into safe mode to uninstall the malware.(Citation: Microsoft MalLockerB)(Citation: Talos GPlayed)(Citation: securelist rotexy 2018)

  16. Internet StandardJan 06, 2026

    A specification, approved by the IESG and published as an RFC, that is stable and well understood, is technically competent, has multiple, independent, and interoperable implementations with substantial operational experience, enjoys significant public support, and is recognizably useful in some or all parts of the Internet. (RFC 2026) (Compare: RFC.)

  17. Adversaries may modify the tasking of a controller to allow for the execution of their own programs. This can allow an adversary to manipulate the execution flow and behavior of a controller.

  18. e-cashJan 06, 2026

    Electronic cash; money that is in the form of data and can be used as a payment mechanism on the Internet. (See: IOTP.)

  19. ATISJan 06, 2026

    See: "Alliance for Telecommunications Industry Solutions" under "ANSI".

  20. In a SET certification hierarchy, an optional level that is certified by a BCA and that may certify cardholder CAs, merchant CAs, and payment gateway CAs. Using GCAs enables a brand to distribute responsibility for managing certificates to geographic or political regions, so that brand policies can vary between regions as needed.

  21. A cryptanalysis technique in which the analyst tries to determine the key from knowledge of plain text that corresponds to cipher text selected (i.e., dictated) by the analyst.

  22. outsiderJan 06, 2026

    A user (usually a person) that accesses a system from a position that is outside the system's security perimeter. (Compare: authorized user, insider, unauthorized user.)

  23. attack potentialJan 06, 2026

    The perceived likelihood of success should an attack be launched, expressed in terms of the attacker's ability (i.e., expertise and resources) and motivation. (Compare: threat, risk.)

  24. anomaly detectionJan 06, 2026

    An intrusion detection method that searches for activity that is different from the normal behavior of system entities and system resources. (See: IDS. Compare: misuse detection.)

  25. daemonJan 06, 2026

    A computer program that is not invoked explicitly but waits until a specified condition occurs, and then runs with no associated user (principal), usually for an administrative purpose. (See: zombie.)

  26. Adversaries may disable security tools to avoid potential detection of their tools and activities. This can take the form of disabling security software, modifying SELinux configuration, or other methods to interfere with security tools scanning or reporting information. This is typically done by abusing device administrator permissions or using system exploits to gain root access to the device to modify protected system files.

  27. Internet-DraftJan 06, 2026

    A working document of the IETF, its areas, and its working groups. (RFC 2026) (Compare: RFC.)

  28. A platform independent system of syntax and semantics (RFC 1866) for adding characters to data files (particularly text files) to represent the data's structure and to point to related data, thus creating hypertext for use in the World Wide Web and other applications. (Compare: XML.)

  29. Adversaries may attempt to infect project files with malicious code. These project files may consist of objects, program organization units, variables such as tags, documentation, and other configurations needed for PLC programs to function. (Citation: Beckhoff) Using built in functions of the engineering software, adversaries may be able to download an infected program to a PLC in the operating environment enabling further Execution and Persistence techniques. (Citation: PLCdev)

  30. An international consortium of CSIRTs (e.g., CIAC) that work together to handle computer security incidents and promote preventive activities. (See: CSIRT, security incident.)

  31. Adversaries may perform network connection enumeration to discover information about device communication patterns. If an adversary can inspect the state of a network connection with tools, such as Netstat(Citation: Netstat), in conjunction with System Firmware, then they can determine the role of certain devices on the network (Citation: MITRE). The adversary can also use Network Sniffing to watch network traffic for details about the source, destination, protocol, and content.

  32. KeyloggingJan 06, 2026

    Adversaries may log user keystrokes to intercept credentials as the user types them. Keylogging is likely to be used to acquire credentials for new access opportunities when OS Credential Dumping efforts are not effective, and may require an adversary to intercept keystrokes on a system for a substantial period of time before credentials can be successfully captured. In order to increase the likelihood of capturing credentials quickly, an adversary may also perform actions such as clearing browser cookies to force users to reauthenticate to systems.(Citation: Talos Kimsuky Nov 2021)

  33. disaster planJan 06, 2026

    Synonym for "contingency plan".

  34. Adversaries may steal data by exfiltrating it over a different protocol than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server.

  35. correctionJan 06, 2026

    A system change made to eliminate or reduce the risk of reoccurrence of a security violation or threat consequence. (See: secondary definition under "security".)

  36. FOUOJan 06, 2026

    See: For Official Use Only.

  37. Adversaries may attempt to position themselves between two or more networked devices using an adversary in the middle (AiTM) technique to support follow on behaviors such as Network Sniffing, Transmitted Data Manipulation, or replay attacks (Exploitation for Credential Access). By abusing features of common networking protocols that can determine the flow of network traffic (e.g. ARP, DNS, LLMNR, etc.), adversaries may force a device to communicate through an adversary controlled system so they can collect information or perform additional actions.(Citation: Rapid7 MiTM Basics)

  38. BLACKJan 06, 2026

    Designation for data that consists only of cipher text, and for information system equipment items or facilities that handle only cipher text. Example: "BLACK key". (See: BCR, color change, RED/BLACK separation. Compare: RED.)

  39. A malicious application could suppress its icon from being displayed to the user in the application launcher. This hides the fact that it is installed, and can make it more difficult for the user to uninstall the application. Hiding the application's icon programmatically does not require any special permissions.

  40. corruptionJan 06, 2026

    A type of threat action that undesirably alters system operation by adversely modifying system functions or data. (See: disruption.)

  41. categoryJan 06, 2026

    A grouping of sensitive information items to which a non hierarchical restrictive security label is applied to increase protection of the data. (See: formal access approval. Compare: compartment, classification.)

  42. IPRAJan 06, 2026

    See: Internet Policy Registration Authority.

  43. Any Government operated information system for which the function, operation, or use (a) involves intelligence activities; (b) involves cryptologic activities related to national security; (c) involves command and control of military forces; (d) involves equipment that is an integral part of a weapon or weapon system; or (e) is critical to the direct fulfillment of military or intelligence missions and does not include a system that is to be used for routine administrative and business applications (including payroll, finance, logistics, and personnel management applications). [Title 40 U.S.C. Section 1552, Information Technology Management Reform Act of 1996.] (See: type 2 product.)

  44. An access control service that enforces a security policy based on comparing (a) security labels, which indicate how sensitive or critical system resources are, with (b) security clearances, which indicate that system entities are eligible to access certain resources. (See: discretionary access control, MAC, rule based security policy.)

  45. "A security policy based on the identities and/or attributes of users, a group of users, or entities acting on behalf of the users and the resources/objects being accessed." [I7498 2] (See: rule based security policy.)

  46. MalwareJan 06, 2026

    Malware is malicious software designed to disrupt, damage, or gain unauthorized access to systems and data.

  47. access levelJan 06, 2026

    A category within a given security classification limiting entry or system connectivity to only authorized persons.

  48. key generationJan 06, 2026

    A process that creates the sequence of symbols that comprise a cryptographic key. (See: key management.)

  49. A standard for evaluating information technology (IT) products and systems. It states requirements for security functions and for assurance measures. [CCIB] (See: CLEF, EAL, packages, protection profile, security target, TOE. Compare: CMM.)

  50. A version of Standard Generalized Markup Language (ISO 8879) that separately represents a document's content and its structure. XML was designed by W3C for use on the World Wide Web.