Skip to content
SynAc
Browse

Terms

Alphabetical index of published term entries with tag filters and quick sort.

  1. Updated Jan 06, 2026

    "Logistics and accounting system through which COMSEC material marked 'CRYPTO' is distributed, controlled, and safeguarded." [C4009] (See: COMSEC account, COMSEC custodian.)

  2. Updated Jan 06, 2026

    "A method of achieving confidentiality in which sensitive information is hidden by embedding it in irrelevant data." [NCS04] (Compare: steganography.)

  3. Updated Jan 06, 2026

    Adversaries may attempt to hide multimedia files from the user. By doing so, adversaries may conceal captured files, such as pictures, videos and/or screenshots, then later exfiltrate those files.

  4. Updated Jan 06, 2026

    Confidentiality is the property that information is not disclosed to unauthorized parties.

  5. Updated Jan 06, 2026

    The process of regulating changes to hardware, firmware, software, and documentation throughout the development and operational life of a system. (See: administrative security, harden, trusted distribution.)

  6. Updated Jan 06, 2026

    Property of a system whereby a subject has write access to an object only if the classification of the object dominates the clearance of the subject. (See: property, Bell LaPadula model.)

  7. Updated Jan 06, 2026

    Adversaries may use a connection proxy to direct network traffic between systems or act as an intermediary for network communications.

  8. Updated Jan 06, 2026

    The effect of an event, incident, or occurrence.

  9. Updated Jan 06, 2026

    A limitation on the function of an identity, role, or privilege. (See: rule based access control.)

  10. Updated Jan 06, 2026

    Adversaries may utilize standard operating system APIs to gather contact list data. On Android, this can be accomplished using the Contacts Content Provider. On iOS, this can be accomplished using the framework.

  11. Updated Jan 03, 2026

    Adversaries may attempt to discover containers and other resources that are available within a containers environment. Other resources may include images, deployments, pods, nodes, and other information such as the status of a cluster.

  12. Updated Jan 03, 2026

    Adversaries may abuse task scheduling functionality provided by container orchestration tools such as Kubernetes to schedule deployment of containers configured to execute malicious code. Container orchestration jobs run these automated tasks at a specific date and time, similar to cron jobs on a Linux system. Deployments of this type can also be configured to maintain a quantity of containers over time, automating the process of maintaining persistence within a cluster.

  13. Updated Jan 06, 2026

    Application software used to prevent access to certain Web servers, such as by parents who do not want their children to access pornography. (See: filter, guard.)

  14. Updated Jan 06, 2026

    A plan for emergency response, backup operations, and post disaster recovery in a system as part of a security program to ensure availability of critical system resources and facilitate continuity of operations in a crisis. [NCS04] (See: availability.)

  15. Updated Jan 06, 2026

    A document that sets forth procedures for the continued performance of core capabilities and critical operations during any disruption or potential disruption.

  16. Updated Jan 06, 2026

    The level of evaluation criteria for a C2 computer system.

  17. Updated Jan 06, 2026

    "Secure telecommunications or information handling equipment, or associated cryptographic component, that is unclassified but governed by a special set of control requirements." [C4009] (Compare: EUCI.)

  18. Updated Jan 06, 2026

    A mechanism that facilitates the adjudication of the different security policies of interconnected systems. (See: domain, guard.)

  19. Updated Jan 06, 2026

    A mode of system operation wherein (a) two or more security levels of information are allowed to be handled concurrently within the same system when some users having access to the system have neither a security clearance nor need to know for some of the data handled by the system, but (b) separation of the users and the classified material on the basis, respectively, of clearance and classification level are not dependent only on operating system control (like they are in multilevel security mode). (See: /system operation/ under "mode", protection level.)

  20. Updated Jan 06, 2026

    "Official responsible for directing the operation of a cryptonet and for managing the operational use and control of keying material assigned to the cryptonet." [C4009, N4006]

  21. Updated Jan 06, 2026

    "The space, expressed in feet of radius, surrounding equipment processing sensitive information, that is under sufficient physical and technical control to preclude an unauthorized entry or compromise." [NCSSG] (Compare: inspectable space, TEMPEST zone.)

  22. TERMcookie
    Updated Jan 06, 2026

    Data exchanged between an HTTP server and a browser (a client of the server) to store state information on the client side and retrieve it later for server use.

  23. Updated Jan 06, 2026

    UTC is derived from International Atomic Time (TAI) by adding a number of leap seconds. The International Bureau of Weights and Measures computes TAI once each month by averaging data from many laboratories. (See: GeneralizedTime, UTCTime.)

  24. Updated Jan 06, 2026

    A system change made to eliminate or reduce the risk of reoccurrence of a security violation or threat consequence. (See: secondary definition under "security".)

  25. Updated Jan 06, 2026

    "The property of a system that is guaranteed as the result of formal verification activities." [Huff] (See: correctness proof, verification.)

  26. Updated Jan 06, 2026

    The property that the information represented by data is accurate and consistent. (Compare: data integrity, source integrity.)

  27. Updated Jan 06, 2026

    A mathematical proof of consistency between a specification for system security and the implementation of that specification. (See: correctness, formal specification.)

  28. Updated Jan 06, 2026

    A type of threat action that undesirably alters system operation by adversely modifying system functions or data. (See: disruption.)

  29. Updated Jan 06, 2026

    See: counter mode.

  30. Updated Jan 06, 2026

    refers to the methods used to bypass or spoof biometric security systems

  31. Updated Jan 06, 2026

    An action, device, procedure, or technique used by an attacker to offset a defensive countermeasure.

  32. Updated Jan 06, 2026

    An action, device, procedure, or technique that meets or opposes (i.e., counters) a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken.

  33. Updated Jan 06, 2026

    A block cipher mode that enhances ECB mode by ensuring that each encrypted block is different from every other block encrypted under the same key. [SP38A] (See: block cipher.)

  34. A block cipher mode [SP38C] that provides both data confidentiality and data origin authentication, by combining the techniques of CTR and a CBC based message authentication code. (See: block cipher.)

  35. Updated Jan 06, 2026

    An identifier that is defined for a nation by ISO. [I3166]

  36. Updated Jan 06, 2026

    Principles for managing system security that were stated by Robert H. Courtney, Jr.

  37. Updated Jan 06, 2026

    An operation that is planned and executed in a way that conceals the identity of the operator.

  38. Updated Jan 06, 2026

    An unintended or unauthorized intra system channel that enables two cooperating entities to transfer information in a way that violates the system's security policy but does not exceed the entities' access authorizations. (See: covert storage channel, covert timing channel, out of band, tunnel.)

  39. Updated Jan 06, 2026

    The existence of a covert storage channel in a communications channel may release information which can be of significant use to attackers.

  40. Updated Jan 06, 2026

    A system feature that enables one system entity to signal information to another by modulating its own use of a system resource in such a way as to affect system response time observed by the second entity. (See: covert channel.)

  41. Updated Jan 06, 2026

    Someone who tries to break the security of, and gain unauthorized access to, someone else's system, often with malicious intent. (See: adversary, intruder, packet monkey, script kiddy. Compare: hacker.)

  42. Updated Jan 03, 2026

    Adversaries may create or modify system level processes to repeatedly execute malicious payloads as part of persistence. When operating systems boot up, they can start processes that perform background system functions. On Windows and Linux, these system processes are referred to as services.(Citation: TechNet Services) On macOS, launchd processes known as Launch Daemon and Launch Agent are run to finish system initialization and load user specific parameters.(Citation: AppleDocs Launch Agent Daemons)

  43. Updated Jan 06, 2026

    "identifier credential": A data object that is a portable representation of the association between an identifier and a unit of authentication information, and that can be presented for use in verifying an identity claimed by an entity that attempts to access a system. Example: X.509 public key certificate. (See: anonymous credential.)

  44. Updated Jan 06, 2026

    Adversaries may search common password storage locations to obtain user credentials. Passwords can be stored in several places on a device, depending on the operating system or application holding the credentials. There are also specific applications that store passwords to make it easier for users to manage and maintain. Once credentials are obtained, they can be used to perform lateral movement and access restricted information.

  45. Updated Jan 06, 2026

    a class of malware designed specifically to automate cybercrime

  46. Updated Jan 06, 2026

    A condition of a system resource such that denial of access to, or lack of availability of, that resource would jeopardize a system user's ability to perform a primary function or would result in other serious consequences, such as human injury or loss of life. (See: availability, precedence. Compare: sensitive.)

  47. Updated Jan 06, 2026

    Those systems that are so vital to a nation that their incapacity or destruction would have a debilitating effect on national security, the economy, or public health and safety.

  48. Updated Jan 06, 2026

    The systems and assets, whether physical or virtual, so vital to society that the incapacity or destruction of such may have a debilitating impact on the security, economy, public health or safety, environment, or any combination of these matters.

  49. Updated Jan 06, 2026

    See: distribution point.

  50. Updated Jan 06, 2026

    See: extension.