Terms
Alphabetical index of published term entries with tag filters and quick sort.
- TERMaccess authorityUpdated Jan 05, 2026
An entity responsible for monitoring and granting access privileges for other authorized entities.
- TERMActivitiesUpdated Jan 05, 2026
An assessment object that includes specific protection related pursuits or actions supporting an information system that involve people (e.g., conducting system backup operations, monitoring network traffic).
- Updated Jan 06, 2026
Adversaries may attempt to position themselves between two or more networked devices using an adversary in the middle (AiTM) technique to support follow on behaviors such as Network Sniffing, Transmitted Data Manipulation, or replay attacks (Exploitation for Credential Access). By abusing features of common networking protocols that can determine the flow of network traffic (e.g. ARP, DNS, LLMNR, etc.), adversaries may force a device to communicate through an adversary controlled system so they can collect information or perform additional actions.(Citation: Rapid7 MiTM Basics)