Terms
Alphabetical index of published term entries. Use the letter rail to jump.
- Stored Application DataUpdated Jan 06, 2026
Adversaries may try to access and collect application data resident on the device. Adversaries often target popular applications, such as Facebook, WeChat, and Gmail.(Citation: SWB Exodus March 2019)
- Stored Data ManipulationUpdated Jan 03, 2026
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating stored data, adversaries may attempt to affect a business process, organizational understanding, and decision making.
- strategic planning and policy developmentUpdated Jan 06, 2026
In the NICE Framework, cybersecurity work where a person: Applies knowledge of priorities to define an entity.
- subjectUpdated Jan 06, 2026
An individual, process, or device causing information to flow among objects or a change to the system state.
- Subvert Trust ControlsUpdated Jan 06, 2026
Adversaries may undermine security controls that will either warn users of untrusted activity or prevent execution of untrusted applications. Operating systems and security products may contain mechanisms to identify programs or websites as possessing some level of trust. Examples of such features include: an app being allowed to run because it is signed by a valid code signing certificate; an OS prompt alerting the user that an app came from an untrusted source; or getting an indication that you are about to connect to an untrusted site. The method adversaries use will depend on the specific mechanism they seek to subvert.
- Sudo and Sudo CachingUpdated Jan 03, 2026
Adversaries may perform sudo caching and/or use the sudoers file to elevate privileges. Adversaries may do this to execute commands as other users or spawn processes with higher privileges.
- supervisory control and data acquisitionUpdated Jan 06, 2026
A generic name for a computerized system that is capable of gathering and processing data and applying operational controls to geographically dispersed assets over long distances.
- supply chainUpdated Jan 06, 2026
A system of organizations, people, activities, information and resources, for creating and moving products including product components and/or services from suppliers through to their customers.
- Supply Chain CompromiseUpdated Jan 06, 2026
Adversaries may perform supply chain compromise to gain control systems environment access by means of infected products, software, and workflows. Supply chain compromise is the manipulation of products, such as devices or software, or their delivery mechanisms before receipt by the end consumer. Adversary compromise of these products and mechanisms is done for the goal of data or system compromise, once infected products are introduced to the target environment.
- supply chain risk managementUpdated Jan 06, 2026
The process of identifying, analyzing, and assessing supply chain risk and accepting, avoiding, transferring or controlling it to an acceptable level considering associated costs and benefits of any actions taken.
- Suppress Application IconUpdated Jan 06, 2026
A malicious application could suppress its icon from being displayed to the user in the application launcher. This hides the fact that it is installed, and can make it more difficult for the user to uninstall the application. Hiding the application's icon programmatically does not require any special permissions.
- SurveillingUpdated Jan 06, 2026
the practice of monitoring computer networks and systems for threats, while surveillance is the act of observing them. In the context of cybersecurity, "surveillance" refers to the continuous monitoring of a network to detect and respond to cyberattacks
- switchportUpdated Jan 06, 2026
the physical opening where a data cable can be plugged in
- SymlinkUpdated Jan 06, 2026
a symbolic is a Linux/UNIX link that points to another file or folder on your computer, or a connected file system. Windows has a similar functionality called Shortcut
- symmetric cryptographyUpdated Jan 06, 2026
A branch of cryptography in which a cryptographic system or algorithms use the same secret key (a shared secret key).
- Symmetric KeyUpdated Jan 06, 2026
A symmetric key is a secret key shared between parties and used for both encryption and decryption.
- system administrationUpdated Jan 06, 2026
In the NICE Framework, cybersecurity work where a person: Installs, configures, troubleshoots, and maintains server configurations (hardware and software) to ensure their confidentiality, integrity, and availability; also manages accounts, firewalls, and patches; responsible for access control, passwords, and account creation and administration.
- System Binary Proxy ExecutionUpdated Jan 06, 2026
Adversaries may bypass process and/or signature based defenses by proxying execution of malicious content with signed, or otherwise trusted, binaries. Binaries used in this technique are often Microsoft signed files, indicating that they have been either downloaded from Microsoft or are already native in the operating system. (Citation: LOLBAS Project) Binaries signed with trusted digital certificates can typically execute on Windows systems protected by digital signature validation. Several Microsoft signed binaries that are default on Windows installations can be used to proxy execution of other files or commands. Similarly, on Linux systems adversaries may abuse trusted binaries such as split to proxy execution of malicious commands. (Citation: split man page)(Citation: GTFO split)
- System ChecksUpdated Jan 06, 2026
Adversaries may employ various system checks to detect and avoid virtualization and analysis environments. This may include changing behavior after checking for the presence of artifacts indicative of a virtual environment or sandbox. If the adversary detects a virtual environment, they may alter their malware’s behavior to disengage from the victim or conceal the core functions of the implant. They may also search for virtualization artifacts before dropping secondary or additional payloads.
- System FirmwareUpdated Jan 06, 2026
Adversaries may modify system firmware to persist on systems.The BIOS (Basic Input/Output System) and The Unified Extensible Firmware Interface (UEFI) or Extensible Firmware Interface (EFI) are examples of system firmware that operate as the software interface between the operating system and hardware of a computer.(Citation: Wikipedia BIOS)(Citation: Wikipedia UEFI)(Citation: About UEFI)
- System Information DiscoveryUpdated Jan 06, 2026
Adversaries may attempt to get detailed information about a device’s operating system and hardware, including versions, patches, and architecture. Adversaries may use the information from System Information Discovery during automated discovery to shape follow on behaviors, including whether or not to fully infects the target and/or attempts specific actions.
- system integrityUpdated Jan 06, 2026
The attribute of an information system when it performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.
- System Network Configuration DiscoveryUpdated Jan 06, 2026
Adversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of devices they access or through information discovery of remote systems.
- System Network Connections DiscoveryUpdated Jan 06, 2026
Adversaries may attempt to get a listing of network connections to or from the compromised device they are currently accessing or from remote systems by querying for information over the network.
- System Owner/User DiscoveryUpdated Jan 03, 2026
Adversaries may attempt to identify the primary user, currently logged in user, set of users that commonly uses a system, or whether a user is actively using the system. They may do this, for example, by retrieving account usernames or by using OS Credential Dumping. The information may be collected in a number of different ways using other Discovery techniques, because user and username details are prevalent throughout a system and include running process ownership, file/directory ownership, session information, and system logs. Adversaries may use the information from System Owner/User Discovery during automated discovery to shape follow on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
- System Runtime API HijackingUpdated Jan 06, 2026
Adversaries may execute their own malicious payloads by hijacking the way an operating system runs applications. Hijacking execution flow can be for the purposes of persistence since this hijacked execution may reoccur at later points in time.
- systems developmentUpdated Jan 06, 2026
In the NICE Framework, cybersecurity work where a person: Works on the development phases of the systems development lifecycle.
- systems requirements planningUpdated Jan 06, 2026
In the NICE Framework, cybersecurity work where a person: Consults with customers to gather and evaluate functional requirements and translates these requirements into technical solutions; provides guidance to customers about applicability of information systems to meet business needs.
- systems security analysisUpdated Jan 06, 2026
In the NICE Framework, cybersecurity work where a person: Conducts the integration/testing, operations, and maintenance of systems security.
- systems security architectureUpdated Jan 06, 2026
In the NICE Framework, cybersecurity work where a person: Develops system concepts and works on the capabilities phases of the systems development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into system and security designs and processes.