Recently updated
Published entries ordered by most recent updates.
- CA certificateJan 06, 2026
"A [digital] certificate for one CA issued by another CA." [X509]
- Exfiltration Over C2 ChannelJan 06, 2026
Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control communications.
- CCMJan 06, 2026
See: Counter with Cipher Block Chaining Message Authentication Code.
- obstructionJan 06, 2026
A type of threat action that interrupts delivery of system services by hindering system operations. (See: disruption.)
- adversaryJan 06, 2026
An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
- Cryptographic Message SyntaxJan 06, 2026
An encapsulation syntax (RFC 3852) for digital signatures, hashes, and encryption of arbitrary messages.
- Compromise Hardware Supply ChainJan 06, 2026
Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degree of control over the system.
- SIM Card SwapJan 06, 2026
Adversaries may gain access to mobile devices through transfers or swaps from victims’ phone numbers to adversary controlled SIM cards and mobile devices.(Citation: ATT SIM Swap Scams)(Citation: Verizon SIM Swapping)
- bastion hostJan 06, 2026
A strongly protected computer that is in a network protected by a firewall (or is part of a firewall) and is the only host (or one of only a few) in the network that can be directly accessed from networks on the other side of the firewall. (See: firewall.)
- GeldKarteJan 06, 2026
A smartcard based, electronic money system that is maintained by the German banking industry, incorporates cryptography, and can be used to make payments via the Internet. (See: IOTP.)
- formal top-level specificationJan 06, 2026
"A top level specification that is written in a formal mathematical language to allow theorems showing the correspondence of the system specification to its formal requirements to be hypothesized and formally proven." [NCS04] (See: formal specification.)
- Data Encrypted for ImpactJan 06, 2026
An adversary may encrypt files stored on a mobile device to prevent the user from accessing them. This may be done in order to extract monetary compensation from a victim in exchange for decryption or a decryption key (ransomware) or to render data permanently inaccessible in cases where the key is not saved or transmitted.
- endorsed-for-unclassified cryptographic itemJan 06, 2026
"Unclassified cryptographic equipment that embodies a U.S. Government classified cryptographic logic and is endorsed by NSA for the protection of national security information." [C4009] (Compare: CCI, type 2 product.)
- certificate serial numberJan 06, 2026
An integer value that (a) is associated with, and may be carried in, a digital certificate; (b) is assigned to the certificate by the certificate's issuer; and (c) is unique among all the certificates produced by that issuer.
- IETFJan 06, 2026
See: Internet Engineering Task Force.
- Online Certificate Status ProtocolJan 06, 2026
An Internet protocol [R2560] used by a client to obtain from a server the validity status and other information about a digital certificate. (Mentioned in [X509] but not specified there.)
- cipher block chainingJan 06, 2026
A block cipher mode that enhances ECB mode by chaining together blocks of cipher text it produces. [FP081] (See: block cipher, [R1829], [R2405], [R2451], [SP38A].)
- CCIJan 06, 2026
See: Controlled Cryptographic Item.
- high-assurance guardJan 06, 2026
"An oxymoron," said Lt. Gen. William H. Campbell, former U.S. Army chief information officer, speaking at an Armed Forces Communications and Electronics Association conference.
- compromise recoveryJan 06, 2026
The process of regaining a secure state for a system after detecting that the system has experienced a security compromise.
- Formal Development MethodologyJan 06, 2026
See: Ina Jo.
- One-Way CommunicationJan 06, 2026
Adversaries may use an existing, legitimate external Web service channel as a means for sending commands to a compromised system without receiving return output. Compromised systems may leverage popular websites and social media to host command and control (C2) instructions. Those infected systems may opt to send the output from those commands back over a different C2 channel, including to another distinct Web service. Alternatively, compromised systems may return no output at all in cases where adversaries want to send instructions to systems and do not want a response.
- cold startJan 06, 2026
A procedure for initially keying cryptographic equipment. [C4009]
- IMAP4 AUTHENTICATEJan 06, 2026
An IMAP4 command (better described as a transaction type, or subprotocol) by which an IMAP4 client optionally proposes a mechanism to an IMAP4 server to authenticate the client to the server and provide other security services. (See: POP3.)
- System FirmwareJan 06, 2026
Adversaries may modify system firmware to persist on systems.The BIOS (Basic Input/Output System) and The Unified Extensible Firmware Interface (UEFI) or Extensible Firmware Interface (EFI) are examples of system firmware that operate as the software interface between the operating system and hardware of a computer.(Citation: Wikipedia BIOS)(Citation: Wikipedia UEFI)(Citation: About UEFI)
- KLIFJan 06, 2026
See: key loading and initialization facility.
- compartmented security modeJan 06, 2026
A mode of system operation wherein all users having access to the system have the necessary security clearance for the single, hierarchical classification level of all data handled by the system, but some users do not have the clearance for a non hierarchical category of some data handled by the system. (See: category, /system operation/ under "mode", protection level, security clearance.)
- intruderJan 06, 2026
An entity that gains or attempts to gain access to a system or system resource without having authorization to do so. (See: intrusion. Compare: adversary, cracker, hacker.)
- cryptonetJan 06, 2026
A network (i.e., a communicating set) of system entities that share a secret cryptographic key for a symmetric algorithm. (See: controlling authority.)
- guest loginJan 06, 2026
See: anonymous login.
- Clipboard DataJan 06, 2026
Adversaries may abuse clipboard manager APIs to obtain sensitive information copied to the device clipboard. For example, passwords being copied and pasted from a password manager application could be captured by a malicious application installed on the device.(Citation: Fahl Clipboard)
- OPSECJan 06, 2026
Abbreviation for "operations security".
- Device Restart/ShutdownJan 06, 2026
Adversaries may forcibly restart or shutdown a device in an ICS environment to disrupt and potentially negatively impact physical processes. Methods of device restart and shutdown exist in some devices as built in, standard functionalities. These functionalities can be executed using interactive device web interfaces, CLIs, and network protocol commands.
- digital watermarkingJan 06, 2026
Computing techniques for inseparably embedding unobtrusive marks or labels as bits in digital data text, graphics, images, video, or audio and for detecting or extracting the marks later.
- FIRSTJan 06, 2026
See: Forum of Incident Response and Security Teams.
- GCAJan 06, 2026
See: geopolitical certificate authority.
- Language of Temporal Ordering SpecificationJan 06, 2026
A language (ISO 8807 1990) for formal specification of computer network protocols; describes the order in which events occur.
- Hypertext Transfer ProtocolJan 06, 2026
A TCP based, Application Layer, client server, Internet protocol (RFC 2616) that is used to carry data requests and responses in the World Wide Web. (See: hypertext.)
- Automated CollectionJan 06, 2026
Adversaries may automate collection of industrial environment information using tools or scripts. This automated collection may leverage native control protocols and tools available in the control systems environment. For example, the OPC protocol may be used to enumerate and gather information. Access to a system or interface with these native protocols may allow collection and enumeration of other attached, communicating servers and devices.
- System ChecksJan 06, 2026
Adversaries may employ various system checks to detect and avoid virtualization and analysis environments. This may include changing behavior after checking for the presence of artifacts indicative of a virtual environment or sandbox. If the adversary detects a virtual environment, they may alter their malware’s behavior to disengage from the victim or conceal the core functions of the implant. They may also search for virtualization artifacts before dropping secondary or additional payloads.
- SteganographyJan 06, 2026
Adversaries may use steganography techniques in order to prevent the detection of hidden information. Steganographic techniques can be used to hide data in digital media such as images, audio tracks, video clips, or text files.
- hybrid encryptionJan 06, 2026
An application of cryptography that combines two or more encryption algorithms, particularly a combination of symmetric and asymmetric encryption. Examples: digital envelope, MSP, PEM, PGP. (Compare: superencryption.)
- brandJan 06, 2026
A distinctive mark or name that identifies a product or business entity.
- bit stringJan 06, 2026
A sequence of bits, each of which is either "0" or "1".
- Internet SocietyJan 06, 2026
A professional society concerned with Internet development (including technical Internet Standards); with how the Internet is and can be used; and with social, political, and technical issues that result. The ISOC Board of Trustees approves appointments to the IAB from among nominees submitted by the IETF nominating committee. (RFC 2026)
Adversaries may manipulate software dependencies and development tools prior to receipt by a final consumer for the purpose of data or system compromise. Applications often depend on external software to function properly. Popular open source projects that are used as dependencies in many applications, such as pip and NPM packages, may be targeted as a means to add malicious code to users of the dependency.(Citation: Trendmicro NPM Compromise)(Citation: Bitdefender NPM Repositories Compromised 2021)(Citation: MANDVI Malicious npm and PyPI Packages Disguised) This may also include abandoned packages, which in some cases could be re registered by threat actors after being removed by adversaries.(Citation: The Hacker News PyPi Revival Hijack 2024) Adversaries may also employ "typosquatting" or name confusion by choosing names similar to existing popular libraries or packages in order to deceive a user.(Citation: Ahmed Backdoors in Python and NPM Packages)(Citation: Meyer PyPI Supply Chain Attack Uncovered)(Citation: Checkmarx oss seo)
- certification requestJan 06, 2026
An algorithm independent transaction format (e.g., PKCS 10, RFC 4211) that contains a DN, and a public key or, optionally, a set of attributes, collectively signed by the entity requesting certification, and sent to a CA, which transforms the request to an X.509 public key certificate or another type of certificate.
- hypermediaJan 06, 2026
A generalization of hypertext; any media that contain hyperlinks that point to material in the same or another data object.
- CBCJan 06, 2026
See: cipher block chaining.
- Abstract Syntax Notation OneJan 06, 2026
A standard for describing data objects. [Larm, X680] (See: CMS.)