12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GLOSSARY311security by obscurity the practice of relying on little known, but discoverable pieces of information as a means ofsecuritySHAPE Supreme Headquarters Allied Powers EuropeSIGINT signals intelligence (i.e. radio intercepts)smart grid a general term referring <strong>to</strong> the upgrade of communication systems in a power grid with the goal ofobtaining improved moni<strong>to</strong>ring, protection, and efficiencysocial engineering attempting <strong>to</strong> manipulate a person <strong>to</strong> divulge certain information or perform a certain actionSEA Syrian Electronic ArmySMTP Simple Mail Transfer Pro<strong>to</strong>col, the standard pro<strong>to</strong>col used for e-mail on the InternetSOPA S<strong>to</strong>p Online Piracy Actspear phishing a phishing attack that targets specific users, often using information taken from CNE operations,social media, or open sources <strong>to</strong> appear legitimate and increase the likelihood of the user clicking on the maliciouslink or attachmentSQL structured query languageSQL injection an attack where an invalid SQL query is sent <strong>to</strong> a database with malicious executable code attached atthe end. The system then fails <strong>to</strong> execute the invalid query and crashes, leading <strong>to</strong> the system executing the maliciousexecutable codeTTECHINT technical intelligenceTF-A two-fac<strong>to</strong>r authenticationTGIE Tibetan Government-in-ExileTIA Total Information AwarenessTrojan see “Trojan Horse”Trojan Horse a piece of seemingly innocuous software (i.e., a game, a pirated piece of commercial software) that hascode that enables a hacker <strong>to</strong> obtain unauthorized access <strong>to</strong> the system that the software is running onTTPs tactics, techniques, and proceduresUUAV unmanned aerial vehicleUCAV unmanned combat air vehicleURL universal resource loca<strong>to</strong>rUSB Universal Serial BusVVOA Voice of AmericaVPN virtual private networkWWWW World Wide WebZzero-day exploits a vulnerability <strong>to</strong> a piece of software that is currently unknown <strong>to</strong> the wider community (includingmajor software vendors). All systems using that piece of software are generally regarded as being vulnerable <strong>to</strong>such an exploit

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!