Cyber Kill Chain & Acronyms Flashcards
Reconnaissance
The attacker gathers information about the target.
Weaponization
The attacker creates malware or tools to exploit the target.
Delivery
The attacker delivers the weaponized payload to the target.
Exploration
The attacker exploits a vulnerability to execute the payload.
Installation
The attacker installs malware on the target system.
Command and control (C2)
The attacker establishes a command channel to control the malware.
Actions on objectives
The attacker achieves their goals, such as data exfiltration or disruption.
CRL
Certification revocation list (list of certificates that have been revoked before they expired, maintained by certificate authority) (not up to date)
CSR
Certificate signing request (block of encoded test submitted to CA to apply for a digital certificate)
OCSP
Online certification status protocol (internet protocol to obtain the revocation status of an X.509 certificate (alternative to CRL)
TTPs
Tactics, techniques, procedures (behavior and methods use by threat actors to execute cyberattacks)
SCAP
Security content automation protocol (suite of open standards that enable automated vulnerability management, measurement, and policy evaluation.
CASB
Cloud access security broker (security solution sites between an organizations users and CSP)
CVE
Common vulnerabilities and exposure (list of publicly disclosed computer security flaws) (standardized approach)
BASTIONS
Special purpose computer designed to withstand attacks (placed outside network)