-
Threat Actors
Threat Actors Threat actors are individuals, groups, or organizations that intentionally or unintentionally exploit vulnerabilities in systems, networks, or people to achieve a specific goal. These actors vary widely in terms of motivation, skill level, sophistication, and targets. Understanding threat actors is critical for designing effective cybersecurity defenses, as each type employs different tactics, techniques,…
-
Indication of Pivot
Indication of Pivot (IoP) An Indication of Pivot, also known as a Lateral Movement Indicator, refers to signs that an attacker is moving from one system to another within a network after gaining initial access. This indicates that the attacker is expanding their control by utilizing compromised accounts, remote administration tools, shared resources, or internal…
-
Indicators of Attack
Indicators of Attack (IoA) Indicators of Attack (IoAs) are behavioral signs that suggest an attack is either in progress or being attempted. Unlike Indicators of Compromise (IoCs), which provide evidence after a breach has occurred, IoAs concentrate on detecting suspicious behaviors, tactics, and techniques used by attackers in real-time. IoAs assist security teams in identifying…
-
Indicators of Compromise
Indicators of Compromise (IoC) Indicators of Compromise (IoCs) are pieces of forensic evidence or observable data that suggest a system, network, or account has been compromised by malicious activity. IoCs are typically discovered during or after a cybersecurity incident and are used by security teams to identify, investigate, and contain attacks. IoCs are considered reactive…
-
Diffie Hellman
Diffie Hellman A cryptographic method that allows two parties to securely establish a shared secret key over an insecure communication channel, such as the internet, without ever directly transmitting the key itself. This shared secret can then be used to encrypt subsequent communications using symmetric encryption algorithms.Developed by Whitfield Diffie and Martin Hellman in 1976,…
-
Rivest Shamir Adleman
Rivest Shamir Adleman (RSA) A public-key cryptosystem that uses a pair of mathematically related keys: a public key for encryption and a private key for decryption. It was developed in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman and remains one of the most widely used asymmetric encryption algorithms in the world.RSA relies on…
-
Advanced Encryption Standard
Advanced Encryption Standard (AES) A symmetric block cipher selected by the U.S. National Institute of Standards and Technology (NIST) in 2001 to replace the older Data Encryption Standard (DES). AES is widely used to protect sensitive and classified information in both government and commercial applications.AES encrypts data in fixed-size blocks of 128 bits and supports…
-
Rivest Cipher 4
Rivest Cipher 4 (RC4) A stream cipher designed by Ronald Rivest in 1987. Unlike block ciphers, which encrypt fixed-size blocks of data, RC4 encrypts data one byte at a time. This makes it well-suited for applications where data arrives in variable-length streams, such as network communications.RC4 generates a pseudorandom key stream based on an initial…
-
Data Encryption Standard
Data Encryption Standard (DES) A symmetric key block cipher that was widely used for securing electronic data. DES operates by encrypting 64-bit blocks of data using a 56-bit key, producing a corresponding 64-bit ciphertext block.DES follows the Feistel structure, which means it divides the data block into two halves and applies multiple rounds of substitution…