Terms
Alphabetical index of published term entries. Use the letter rail to jump.
- attack sensing, warning, and responseUpdated Jan 06, 2026
A set of security services that cooperate with audit service to detect and react to indications of threat actions, including both inside and outside attacks. (See: indicator.)
- attack signatureUpdated Jan 06, 2026
A characteristic or distinctive pattern that can be searched for or that can be used in matching to previously identified attacks.
- attack surfaceUpdated Jan 06, 2026
The set of ways in which an adversary can enter a system and potentially cause damage.
- attack treeUpdated Jan 06, 2026
A branching, hierarchical data structure that represents a set of potential approaches to achieving an event in which system security is penetrated or compromised in a specified way. [Moor]
- attributeUpdated Jan 06, 2026
Information of a particular type concerning an identifiable system entity or object. An "attribute type" is the component of an attribute that indicates the class of information given by the attribute; and an "attribute value" is a particular instance of the class of information indicated by an attribute type. (See: attribute certificate.)
- attribute authorityUpdated Jan 06, 2026
A CA that issues attribute certificates.
- attribute certificateUpdated Jan 06, 2026
A digital certificate that binds a set of descriptive data items, other than a public key, either directly to a subject name or to the identifier of another certificate that is a public key certificate. (See: capability token.)
- Audio CaptureUpdated Jan 06, 2026
An adversary can leverage a computer's peripheral devices (e.g., microphones and webcams) or applications (e.g., voice and video call services) to capture audio recordings for the purpose of listening into sensitive conversations to gather information.(Citation: ESET Attor Oct 2019)
- audit logUpdated Jan 06, 2026
Synonym for "security audit trail".
- audit serviceUpdated Jan 06, 2026
A security service that records information needed to establish accountability for system events and for the actions of system entities that cause them. (See: security audit.)
- audit trailUpdated Jan 06, 2026
See: security audit trail.
- authenticateUpdated Jan 06, 2026
Verify (i.e., establish the truth of) an attribute value claimed by or for a system entity or system resource. (See: authentication, validate vs. verify, "relationship between data integrity service and authentication services" under "data integrity service".)
- AuthenticationUpdated Jan 06, 2026
Authentication is the process of verifying the identity of a user, device, or system before granting access.
- authentication codeUpdated Jan 06, 2026
Synonym for a checksum based on cryptography. (Compare: Data Authentication Code, Message Authentication Code.)
- authentication exchangeUpdated Jan 06, 2026
A mechanism to verify the identity of an entity by means of information exchange.
- Authentication HeaderUpdated Jan 06, 2026
An Internet protocol [R2402, R4302] designed to provide connectionless data integrity service and connectionless data origin authentication service for IP datagrams, and (optionally) to provide partial sequence integrity and protection against replay attacks. (See: IPsec. Compare: ESP.)
- authentication informationUpdated Jan 06, 2026
Information used to verify an identity claimed by or for an entity. (See: authentication, credential, user. Compare: identification information.)
- authentication serviceUpdated Jan 06, 2026
A security service that verifies an identity claimed by or for an entity. (See: authentication.)
- authenticityUpdated Jan 06, 2026
A property achieved through cryptographic methods of being genuine and being able to be verified and trusted, resulting in confidence in the validity of a transmission, information or a message, or sender of information or a message.
- authorityUpdated Jan 06, 2026
"An entity [that is] responsible for the issuance of certificates." [X509]
- authority certificateUpdated Jan 06, 2026
"A certificate issued to an authority (e.g. either to a certification authority or to an attribute authority)." [X509] (See: authority.)
- Authority Information Access extensionUpdated Jan 06, 2026
The private extension defined by PKIX for X.509 certificates to indicate "how to access CA information and services for the issuer of the certificate in which the extension appears. Information and services may include on line validation services and CA policy data." [R3280] (See: private extension.)
- AuthorizationUpdated Jan 06, 2026
Authorization is the process of determining what an authenticated principal is permitted to do.
- authorization credentialUpdated Jan 06, 2026
See: /access control/ under "credential".
- authorizeUpdated Jan 06, 2026
Grant an authorization to a system entity.
- authorized userUpdated Jan 06, 2026
A system entity that accesses a system resource for which the entity has received an authorization. (Compare: insider, outsider, unauthorized user.)
- Automated CollectionUpdated Jan 06, 2026
Adversaries may automate collection of industrial environment information using tools or scripts. This automated collection may leverage native control protocols and tools available in the control systems environment. For example, the OPC protocol may be used to enumerate and gather information. Access to a system or interface with these native protocols may allow collection and enumeration of other attached, communicating servers and devices.
- Autorun ImageUpdated Jan 06, 2026
Adversaries may leverage AutoRun functionality or scripts to execute malicious code. Devices configured to enable AutoRun functionality or legacy operating systems may be susceptible to abuse of these features to run malicious code stored on various forms of removeable media (i.e., USB, Disk Images [.ISO]). Commonly, AutoRun or AutoPlay are disabled in many operating systems configurations to mitigate against this technique. If a device is configured to enable AutoRun or AutoPlay, adversaries may execute code on the device by mounting the removable media to the device, either through physical or virtual means. This may be especially relevant for virtual machine environments where disk images may be dynamically mapped to a guest system on a hypervisor.
- AvailabilityUpdated Jan 06, 2026
Availability is the property that systems and data are accessible and usable when needed.
- availability serviceUpdated Jan 06, 2026
A security service that protects a system to ensure its availability.
- avoidanceUpdated Jan 06, 2026
See: secondary definition under "security".
- a | xUpdated Jan 05, 2026
a divides x.