Skip to content
SynAc
Browse

Terms

Alphabetical index of published term entries with tag filters and quick sort.

  1. Updated Jan 06, 2026

    The ability of two or more systems or components to exchange information and to use the information that has been exchanged.

  2. Updated Jan 06, 2026

    Not encrypted. (See: clear text.)

  3. Updated Jan 06, 2026

    A computer network, especially one based on Internet technology, that an organization uses for its own internal (and usually private) purposes and that is closed to outsiders. (See: extranet, VPN.)

  4. Updated Jan 06, 2026

    An entity that gains or attempts to gain access to a system or system resource without having authorization to do so. (See: intrusion. Compare: adversary, cracker, hacker.)

  5. Updated Jan 06, 2026

    An unauthorized act of bypassing the security mechanisms of a network or information system.

  6. Updated Jan 06, 2026

    The process and methods for analyzing information from networks and information systems to determine if a security breach or security violation has occurred.

  7. Updated Jan 06, 2026

    A process or subsystem, implemented in software or hardware, that automates the tasks of (a) monitoring events that occur in a computer network and (b) analyzing them for signs of security problems. [SP31] (See: intrusion detection.)

  8. Updated Jan 06, 2026

    An X.509 CRL entry extension that "indicates the date at which it is known or suspected that the [revoked certificate's private key] was compromised or that the certificate should otherwise be considered invalid." [X509].

  9. Updated Jan 06, 2026

    a NICE Framework category consisting of specialty areas responsible for the investigation of cyber events and/or crimes of IT systems, networks, and digital evidence

  10. Updated Jan 06, 2026

    A systematic and formal inquiry into a qualified threat or incident using digital forensics and perhaps other traditional criminal inquiry techniques to determine the events that transpired and to collect evidence.

  11. Updated Jan 06, 2026

    Adversaries may seek to capture process values related to the inputs and outputs of a PLC. During the scan cycle, a PLC reads the status of all inputs and stores them in an image table. (Citation: Nanjundaiah, Vaidyanath) The image table is the PLCs internal storage location where values of inputs/outputs for one scan are stored while it executes the user program. After the PLC has solved the entire logic program, it updates the output image table. The contents of this output image table are written to the corresponding output points in I/O Modules.

  12. Updated Jan 06, 2026

    A computer's internetwork address that is assigned for use by IP and other protocols.

  13. Updated Jan 03, 2026

    Adversaries may gather the victim's IP addresses that can be used during targeting. Public IP addresses may be allocated to organizations by block, or a range of sequential addresses. Information about assigned IP addresses may include a variety of details, such as which IP addresses are in use. IP addresses may also enable an adversary to derive other details about a victim, such as organizational size, physical location(s), Internet service provider, and or where/how their publicly facing infrastructure is hosted.

  14. TERMIPsec
    Updated Jan 06, 2026

    See: IP Security Protocol.

  15. Updated Jan 06, 2026

    See: Internet Protocol Security Option.

  16. Updated Jan 06, 2026

    The name of the IETF working group that is specifying an architecture [R2401, R4301] and set of protocols to provide security services for IP traffic. (See: AH, ESP, IKE, SAD, SPD. Compare: IPSO.)

  17. Updated Jan 06, 2026

    An International Standard that is a code of practice, derived from Part 1 of British Standard 7799, for managing the security of information systems in an organization. This standard does not provide definitive or specific material on any security topic. It provides general guidance on a wide variety of topics, but typically does not go into depth. (See: IATF, [SP14].)

  18. TERMissue
    Updated Jan 06, 2026

    Generate and sign a digital certificate (or a CRL) and, usually, distribute it and make it available to potential certificate users (or CRL users). (See: certificate creation.)

  19. TERMissuer
    Updated Jan 06, 2026

    The CA that signs a digital certificate or CRL.