Skip to content
SynAc
Browse

Terms

Alphabetical index of published term entries. Use the letter rail to jump.

  1. gatewayUpdated Jan 06, 2026

    An intermediate system (interface, relay) that attaches to two (or more) computer networks that have similar functions but dissimilar implementations and that enables either one way or two way communication between the networks. (See: bridge, firewall, guard, internetwork, proxy server, router, and subnetwork.)

  2. Gather Victim Host InformationUpdated Jan 03, 2026

    Adversaries may gather information about the victim's hosts that can be used during targeting. Information about hosts may include a variety of details, including administrative data (ex: name, assigned IP, functionality, etc.) as well as specifics regarding its configuration (ex: operating system, language, etc.).

  3. GeldKarteUpdated Jan 06, 2026

    A smartcard based, electronic money system that is maintained by the German banking industry, incorporates cryptography, and can be used to make payments via the Internet. (See: IOTP.)

  4. GeneralizedTimeUpdated Jan 06, 2026

    The ASN.1 data type "GeneralizedTime" (ISO 8601) contains a calendar date (YYYYMMDD) and a time of day, which is either (a) the local time, (b) the Coordinated Universal Time, or (c) both the local time and an offset that enables Coordinated Universal Time to be calculated. (See: Coordinated Universal Time. Compare: UTCTime.)

  5. Generate Traffic from VictimUpdated Jan 06, 2026

    Adversaries may generate outbound traffic from devices. This is typically performed to manipulate external outcomes, such as to achieve carrier billing fraud or to manipulate app store rankings or ratings. Outbound traffic is typically generated as SMS messages or general web traffic, but may take other forms as well.

  6. An Internet Standard protocol [R2743] that specifies calling conventions by which an application (typically another communication protocol) can obtain authentication, integrity, and confidentiality security services independently of the underlying security mechanisms and technologies, thus enabling the application source code to be ported to different environments. (Compare: EAP, SASL.)

  7. GeofencingUpdated Jan 06, 2026

    to set up triggers so that when a device such as an internet connected smartphone enters a defined geographical boundary, the user gets an alert

  8. In a SET certification hierarchy, an optional level that is certified by a BCA and that may certify cardholder CAs, merchant CAs, and payment gateway CAs. Using GCAs enables a brand to distribute responsibility for managing certificates to geographic or political regions, so that brand policies can vary between regions as needed.

  9. georedundancyUpdated Jan 06, 2026

    the distribution of mission critical components or infrastructures across multiple geographic locations

  10. Global Information GridUpdated Jan 06, 2026

    The GIG is "a globally interconnected, end to end set of information capabilities, associated processes and personnel for collecting, processing, storing, disseminating, and managing information on demand to war fighters, policy makers, and support personnel." [IATF] Usage: Formerly referred to as the DII.

  11. good engineering practice(s)Updated Jan 06, 2026

    A term used to specify or characterize design, implementation, installation, or operating practices for an information system, when a more explicit specification is not possible. Generally understood to refer to the state of the engineering art for commercial systems that have problems and solutions equivalent to the system in question.

  12. granularityUpdated Jan 06, 2026

    Relative fineness to which an access control mechanism can be adjusted.

  13. Graphical User InterfaceUpdated Jan 06, 2026

    Adversaries may attempt to gain access to a machine via a Graphical User Interface (GUI) to enhance execution capabilities. Access to a GUI allows a user to interact with a computer in a more visual manner than a CLI. A GUI allows users to move a cursor and click on interface objects, with a mouse and keyboard as the main input devices, as opposed to just using the keyboard.

  14. Green BookUpdated Jan 06, 2026

    Synonym for "Defense Password Management Guideline" [CSC2].

  15. Group Domain of InterpretationUpdated Jan 06, 2026

    An ISAKMP/IKE domain of interpretation for group key management; i.e., a phase 2 protocol in ISAKMP. [R3547] (See: secure multicast.)

  16. group identityUpdated Jan 06, 2026

    See: secondary definition under "identity".

  17. Group Policy DiscoveryUpdated Jan 03, 2026

    Adversaries may gather information on Group Policy settings to identify paths for privilege escalation, security measures applied within a domain, and to discover patterns in domain objects that can be manipulated or used to blend in the environment. Group Policy allows for centralized management of user and computer settings in Active Directory (AD). Group policy objects (GPOs) are containers for group policy settings made up of files stored within a predictable network path .(Citation: TechNet Group Policy Basics)(Citation: ADSecurity GPO Persistence 2016)

  18. group security associationUpdated Jan 06, 2026

    "A bundling of [security associations] (SAs) that together define how a group communicates securely. The [group SA] may include a registration protocol SA, a rekey protocol SA, and one or more data security protocol SAs." [R3740]

  19. guardUpdated Jan 06, 2026

    A computer system that (a) acts as gateway between two information systems operating under different security policies and (b) is trusted to mediate information data transfers between the two. (See: controlled interface, cross domain solution, domain, filter. Compare: firewall.)

  20. guest loginUpdated Jan 06, 2026

    See: anonymous login.

  21. GUI Input CaptureUpdated Jan 06, 2026

    Adversaries may mimic common operating system GUI components to prompt users for sensitive information with a seemingly legitimate prompt. The operating system and installed applications often have legitimate needs to prompt the user for sensitive information such as account credentials, bank account information, or Personally Identifiable Information (PII). Compared to traditional PCs, the constrained display size of mobile devices may impair the ability to provide users with contextual information, making users more susceptible to this technique’s use.(Citation: Felt PhishingOnMobileDevices)

  22. Gypsy verification environmentUpdated Jan 06, 2026

    A methodology, language, and integrated set of software tools developed at the University of Texas for specifying, coding, and verifying software to produce correct and reliable programs. [Cheh]