Skip to content
SynAc
Tag

Fundamentals

Core security properties and building blocks (CIA, crypto basics).

  1. administrative incident (COMSEC)/term/administrative-incident-comsec

    A violation of procedures or practices dangerous to security that is not serious enough to jeopardize the integrity of a controlled cryptographic item (CCI), but requires corrective action to ensure the violation does not recur or possibly lead to a reportable COMSEC incident.

  2. AES/acronym/aes

    AES stands for Advanced Encryption Standard, a widely used symmetric key block cipher standardized by NIST.

  3. Application Exhaustion Flood/term/application-exhaustion-flood

    Adversaries may target resource intensive features of applications to cause a denial of service (DoS), denying availability to those applications. For example, specific features in web applications may be highly resource intensive. Repeated requests to those features may be able to exhaust system resources and deny access to the application or the server itself.(Citation: Arbor AnnualDoSreport Jan 2018)

  4. Availability/term/availability

    Availability is the property that systems and data are accessible and usable when needed.

  5. Bypass User Account Control/term/bypass-user-account-control

    Adversaries may bypass UAC mechanisms to elevate process privileges on system. Windows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator level permissions, possibly by prompting the user for confirmation. The impact to the user ranges from denying the operation under high enforcement to allowing the user to perform the action if they are in the local administrators group and click through the prompt or allowing them to enter an administrator password to complete the action.(Citation: TechNet How UAC Works)

  6. Confidentiality/term/confidentiality

    Confidentiality is the property that information is not disclosed to unauthorized parties.

  7. Direct Network Flood/term/direct-network-flood

    Adversaries may attempt to cause a denial of service (DoS) by directly sending a high volume of network traffic to a target. This DoS attack may also reduce the availability and functionality of the targeted system(s) and network. Direct Network Floods are when one or more systems are used to send a high volume of network packets towards the targeted service's network. Almost any network protocol may be used for flooding. Stateless protocols such as UDP or ICMP are commonly used but stateful protocols such as TCP can be used as well.

  8. Disk Structure Wipe/term/disk-structure-wipe

    Adversaries may corrupt or wipe the disk data structures on a hard drive necessary to boot a system; targeting specific critical systems or in large numbers in a network to interrupt availability to system and network resources.

  9. Disk Wipe/term/disk-wipe

    Adversaries may wipe or corrupt raw disk data on specific systems or in large numbers in a network to interrupt availability to system and network resources. With direct write access to a disk, adversaries may attempt to overwrite portions of disk data. Adversaries may opt to wipe arbitrary portions of disk data and/or wipe disk structures like the master boot record (MBR). A complete wipe of all disk sectors may be attempted.

  10. Distributed Denial of Service/term/distributed-denial-of-service

    A distributed denial of service (DDoS) attack uses many systems to overwhelm a target and degrade availability.

  11. DoS/acronym/dos

    DoS stands for Denial of Service, an attack targeting system availability.

  12. Encryption/term/encryption

    Encryption is the process of transforming information so it is unintelligible without the appropriate key.

  13. External Defacement/term/external-defacement

    An adversary may deface systems external to an organization in an attempt to deliver messaging, intimidate, or otherwise mislead an organization or users. External Defacement may ultimately cause users to distrust the systems and to question/discredit the system’s integrity. Externally facing websites are a common victim of defacement; often targeted by adversary and hacktivist groups in order to push a political message or spread propaganda.(Citation: FireEye Cyber Threats to Media Industries)(Citation: Kevin Mandia Statement to US Senate Committee on Intelligence)(Citation: Anonymous Hackers Deface Russian Govt Site) External Defacement may be used as a catalyst to trigger events, or as a response to actions taken by an organization or government. Similarly, website defacement may also be used as setup, or a precursor, for future attacks such as Drive by Compromise.(Citation: Trend Micro Deep Dive Into Defacement)

  14. Hash Function/term/hash-function

    A hash function maps input data to a fixed size output (digest) and is commonly used for integrity checks.

  15. Integrity/term/integrity

    Integrity is the property that data is accurate and has not been improperly modified or destroyed.

  16. SMS Pumping/term/sms-pumping

    Adversaries may leverage messaging services for SMS pumping, which may impact system and/or hosted service availability.(Citation: Twilio SMS Pumping) SMS pumping is a type of telecommunications fraud whereby a threat actor first obtains a set of phone numbers from a telecommunications provider, then leverages a victim’s messaging infrastructure to send large amounts of SMS messages to numbers in that set. By generating SMS traffic to their phone number set, a threat actor may earn payments from the telecommunications provider.(Citation: Twilio SMS Pumping Fraud)

  17. Stored Data Manipulation/term/stored-data-manipulation

    Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating stored data, adversaries may attempt to affect a business process, organizational understanding, and decision making.

  18. Weaken Encryption/term/weaken-encryption

    Adversaries may compromise a network device’s encryption capability in order to bypass encryption that would otherwise protect data communications. (Citation: Cisco Synful Knock Evolution)