Loading...
2025 © Ty Qualters. Built with .
2025 © Ty Qualters. Built with .
(Generated by ChatGPT)
This is a categorized reference of ways to describe a threat or vulnerability.
Describes the origin or agent of the threat.
Term | Meaning |
---|---|
Threat Actor | Entity (person, group, nation-state, automated bot) carrying out or intending an attack. |
Adversary | Synonym for threat actor, often in military/cyber warfare contexts. |
Attacker | More general; could be malicious or simply a penetration tester. |
Insider Threat | Threat actor with authorized access misusing it (malicious or negligent). |
Script Kiddie | Unskilled attacker using existing tools/exploits without deep understanding. |
Advanced Persistent Threat (APT) | Highly skilled, resource-rich actor (often state-sponsored) with long-term goals. |
Malicious Insider | Authorized individual intentionally causing harm. |
Competitor Threat | Business or organization trying to gain advantage via espionage. |
Describes locations or exposure points.
Term | Meaning |
---|---|
Attack Surface | The total set of possible points an attacker can attempt to exploit. |
Exposure Point | Specific location (e.g., an open API endpoint, login page). |
Entry Point | The actual first foothold used to get into a system. |
Weak Link | Informal term for the most vulnerable element in the chain. |
Access Vector | Pathway for gaining access (can overlap with attack vector). |
Trust Boundary | Where different trust levels in systems interact (e.g., user ↔ application server). |
Chokepoint | Strategic network point that can be defended or exploited. |
Describes methods or paths of exploitation.
Term | Meaning |
---|---|
Attack Vector | The specific method or route used to exploit a vulnerability (e.g., phishing email, SQL injection). |
Delivery Mechanism | How malicious content is delivered (USB drop, email attachment, watering hole site). |
Kill Chain | Step-by-step process of an attack from reconnaissance to impact. |
TTPs (Tactics, Techniques, and Procedures) | Behavioral patterns of an attacker (used in threat intel). |
Initial Access | The first point of compromise in an intrusion. |
Pivoting | Moving laterally in a network after initial compromise. |
Evasion Technique | Methods for avoiding detection (e.g., obfuscation, encryption). |
Describes the actual flaw or weakness.
Term | Meaning |
---|---|
Vulnerability | A flaw or weakness that can be exploited. |
Exploit | Code or technique used to take advantage of a vulnerability. |
Zero-Day | Vulnerability not yet known to the vendor or public. |
Misconfiguration | Insecure system setup that opens a hole for attacks. |
Weakness | General term for any security gap. |
Common Weakness Enumeration (CWE) | Standardized list of software weakness types. |
Software Bug | Coding error that may or may not be exploitable. |
Design Flaw | Architectural weakness baked into the system design. |
Insecure Dependency | Third-party library or component with vulnerabilities. |
Describes how we talk about severity and context.
Term | Meaning |
---|---|
Threat | Potential cause of an unwanted impact. |
Risk | The combination of likelihood and impact of a threat exploiting a vulnerability. |
Likelihood | Probability of a threat successfully exploiting a vulnerability. |
Impact | Consequence or damage caused if a threat is realized. |
Threat Landscape | Overall view of active and emerging threats in a given environment. |
CVSS (Common Vulnerability Scoring System) | Standard for rating vulnerability severity. |
CVE (Common Vulnerabilities and Exposures) | Catalog of publicly known vulnerabilities. |
ATT&CK Framework | MITRE’s structured knowledge base of attacker behavior. |
Describes conditions and surroundings.
Term | Meaning |
---|---|
Attack Window | Period when a vulnerability is exploitable. |
Threat Environment | The set of active threats relevant to a given system or organization. |
Exposure | The state of being open to attack (e.g., unpatched service on internet). |
Security Posture | The organization’s overall defensive readiness. |
Residual Risk | Risk that remains after controls are applied. |
Control Gap | Missing or insufficient security measure. |