Terms
Alphabetical index of published term entries with tag filters and quick sort.
- TERMdaemonUpdated Jan 06, 2026
A computer program that is not invoked explicitly but waits until a specified condition occurs, and then runs with no associated user (principal), usually for an administrative purpose. (See: zombie.)
- Updated Jan 06, 2026
Adversaries may cause damage and destruction of property to infrastructure, equipment, and the surrounding environment when attacking control systems. This technique may result in device and operational equipment breakdown, or represent tangential damage from other techniques used in an attack. Depending on the severity of physical damage and disruption caused to control processes and systems, this technique may result in Loss of Safety. Operations that result in Loss of Control may also cause damage to property, which may be directly or indirectly motivated by an adversary seeking to cause impact in the form of Loss of Productivity and Revenue.
- TERMdangling threatUpdated Jan 06, 2026
A threat to a system for which there is no corresponding vulnerability and, therefore, no implied risk.
- Updated Jan 06, 2026
A vulnerability of a system for which there is no corresponding threat and, therefore, no implied risk.
- TERMdataUpdated Jan 06, 2026
Information in a specific representation, usually as a sequence of symbols that have meaning.
- Updated Jan 06, 2026
In the NICE Framework, cybersecurity work where a person: Develops and administers databases and/or data management systems that allow for the storage, query, and utilization of data.
- TERMdata aggregationUpdated Jan 06, 2026
The process of gathering and combining data from different sources, so that the combined data reveals new information.
- Updated Jan 06, 2026
The ANSI standard for a keyed hash function that is equivalent to DES cipher block chaining with IV = 0. [A9009]
- Updated Jan 06, 2026
A specific U.S. Government standard [FP113] for a checksum that is computed by the Data Authentication Algorithm. Usage: a.k.a. Message Authentication Code [A9009].) (See: DAC.)
- TERMdata breachUpdated Jan 06, 2026
The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.
- TERMdata compromiseUpdated Jan 06, 2026
A security incident in which information is exposed to potential unauthorized access, such that unauthorized disclosure, alteration, or use of the information might have occurred. (Compare: security compromise, security incident.)
- Updated Jan 06, 2026
The property that data is not disclosed to system entities unless they have been authorized to know the data. (See: Bell LaPadula model, classification, data confidentiality service, secret. Compare: privacy.)
- Updated Jan 06, 2026
A security service that protects data against unauthorized disclosure. (See: access control, data confidentiality, datagram confidentiality service, flow control, inference control.)
- TERMData DestructionUpdated Jan 06, 2026
Adversaries may perform data destruction over the course of an operation. The adversary may drop or create malware, tools, or other non native files on a target system to accomplish this, potentially leaving behind traces of malicious activities. Such non native files and other data may be removed over the course of an intrusion to maintain a small footprint or as a standard part of the post intrusion cleanup process. (Citation: Enterprise ATT&CK January 2018)
- Updated Jan 06, 2026
An adversary may encrypt files stored on a mobile device to prevent the user from accessing them. This may be done in order to extract monetary compensation from a victim in exchange for decryption or a decryption key (ransomware) or to render data permanently inaccessible in cases where the key is not saved or transmitted.
- Updated Jan 06, 2026
A symmetric block cipher, defined in the U.S. Government's DES. DEA uses a 64 bit key, of which 56 bits are independently chosen and 8 are parity bits, and maps a 64 bit block into another 64 bit block. [FP046] (See: AES, symmetric cryptography.)
- Updated Jan 06, 2026
A cryptographic key that is used to encipher application data. (Compare: key encrypting key.)
- Updated Jan 06, 2026
A U.S. Government standard [FP046] that specifies the DEA and states policy for using the algorithm to protect unclassified, sensitive data. (See: AES.)
- Updated Jan 03, 2026
Adversaries may collect data related to managed devices from configuration repositories. Configuration repositories are used by management systems in order to configure, manage, and control data on remote systems. Configuration repositories may also facilitate remote access and administration of devices.
- Updated Jan 06, 2026
Adversaries may target and collect data from information repositories. This can include sensitive data such as specifications, schematics, or diagrams of control system layouts, devices, and processes. Examples of information repositories include reference databases in the process environment, as well as databases in the corporate network that might contain information about the ICS.(Citation: Cybersecurity & Infrastructure Security Agency March 2018)
- Updated Jan 06, 2026
Adversaries may search local system sources, such as file systems or local databases, to find files of interest and sensitive data prior to exfiltration.
- Updated Jan 03, 2026
Adversaries may search connected removable media on computers they have compromised to find files of interest. Sensitive data can be collected from any removable media (optical disk drive, USB memory, etc.) connected to the compromised system prior to Exfiltration. Interactive command shells may be in use, and common functionality within cmd may be used to gather information.
- TERMdatagramUpdated Jan 06, 2026
"A self contained, independent entity of data [i.e., a packet] carrying sufficient information to be routed from the source [computer] to the destination computer without reliance on earlier exchanges between this source and destination computer and the transporting network." [R1983] Example: A PDU of IP.
- Updated Jan 06, 2026
A data confidentiality service that preserves the confidentiality of data in a single, independent, packet; i.e., the service applies to datagrams one at a time. Example: ESP. (See: data confidentiality.)
- Updated Jan 06, 2026
A data integrity service that preserves the integrity of data in a single, independent, packet; i.e., the service applies to datagrams one at a time. (See: data integrity. Compare: stream integrity service.)
- TERMdata integrityUpdated Jan 06, 2026
The property that data is complete, intact, and trusted and has not been modified or destroyed in an unauthorized or accidental manner.
- Updated Jan 06, 2026
A security service that protects against unauthorized changes to data, including both intentional change or destruction and accidental change or loss, by ensuring that changes to data are detectable. (See: data integrity, checksum, datagram integrity service.)
- TERMdata lossUpdated Jan 06, 2026
The result of unintentionally or accidentally deleting data, forgetting where it is stored, or exposure to an unauthorized party.
- Updated Jan 06, 2026
A set of procedures and mechanisms to stop sensitive data from leaving a security boundary.
- Updated Jan 06, 2026
Adversaries may insert, delete, or alter data in order to manipulate external outcomes or hide activity. By manipulating data, adversaries may attempt to affect a business process, organizational understanding, or decision making.
- TERMdata miningUpdated Jan 06, 2026
The process or techniques used to analyze large sets of existing information to discover previously unrevealed patterns or correlations.
- TERMDataOpsUpdated Jan 06, 2026
a collaborative data management practice focused on improving the communication, integration and automation of data flows between data managers and data consumers across an organization
- Updated Jan 06, 2026
"The corroboration that the source of data received is as claimed." [I7498 2] (See: authentication.)
- Updated Jan 06, 2026
A security service that verifies the identity of a system entity that is claimed to be the original source of received data. (See: authentication, authentication service.)
- TERMdata ownerUpdated Jan 06, 2026
The organization that has the final statutory and operational authority for specified information.
- TERMdata privacyUpdated Jan 06, 2026
Synonym for "data confidentiality".
- TERMdata recoveryUpdated Jan 06, 2026
A process for learning, from some cipher text, the plain text that was previously encrypted to produce the cipher text. (See: recovery.)
- TERMdata securityUpdated Jan 06, 2026
The protection of data from disclosure, alteration, destruction, or loss that either is accidental or is intentional but unauthorized.
- TERMdata theftUpdated Jan 06, 2026
The deliberate or intentional act of stealing of information.
- Updated Jan 06, 2026
Adversaries may use an existing, legitimate external Web service to host information that points to additional command and control (C2) infrastructure. Adversaries may post content, known as a dead drop resolver, on Web services with embedded (and often obfuscated/encoded) domains or IP addresses. Once infected, victims will reach out to and be redirected by these resolvers.
- TERMdeauthenticationUpdated Jan 06, 2026
To revoke the authentication of; to cause no longer to be authenticated.
- TERMdeceptionUpdated Jan 06, 2026
A circumstance or event that may result in an authorized entity receiving false data and believing it to be true. (See: authentication.)
- TERMdecipherUpdated Jan 06, 2026
To convert enciphered text to plain text by means of a cryptographic system.
- TERMdeciphermentUpdated Jan 06, 2026
Synonym for "decryption".
- TERMdeclassificationUpdated Jan 06, 2026
An authorized process by which information is declassified. (Compare: classification.)
- TERMdeclassifyUpdated Jan 06, 2026
To officially remove the security level designation of a classified information item or information type, such that the information is no longer classified (i.e., becomes unclassified). (See: classified, classify, security level. Compare: downgrade.)
- TERMdecodeUpdated Jan 06, 2026
To convert encoded text to plain text by means of a code.
- TERMdecryptUpdated Jan 06, 2026
A generic term encompassing decode and decipher.
- TERMdecryptionUpdated Jan 06, 2026
The process of transforming ciphertext into its original plaintext.
- TERMDecryptorUpdated Jan 06, 2026
A tool, or set of tools, used to decrypt encrypted files. Either for recovery or anti ransomware purposes.