250 Terms, SOC Analyst Should Know.
250 Terms, SOC Analyst Should Know.
250 Terms, SOC Analyst Should Know.
https://www.linkedin.com/in/ron-sharon/
200 Terms & 50 Windows Commend Shells Every SOC Analyst Should Know
Terms & commends Explanation
Identifies devices on a network; crucial for network traffic analysis
IP Address
and identifying sources of threats.
Divides networks into smaller parts; important for organizing and
Subnet
securing network segments.
Filters incoming and outgoing network traffic; essential for
Firewall
defending against unauthorized access.
Secures remote network access; critical for protecting data in
VPN (Virtual Private Network)
transit.
TCP/IP (Transmission Control Protocol/Internet Fundamental protocols for data transmission; understanding these
Protocol) is key to analyzing network traffic.
DNS (Domain Name System) Translates domain names to IP addresses; vital for understanding
web traffic and detecting malicious domains.
DHCP (Dynamic Host Configuration Protocol) Assigns IP addresses dynamically; important for managing network
resources.
SSL/TLS (Secure Sockets Layer/Transport Layer Protocols for secure communication; essential for ensuring data
Security) confidentiality and integrity.
Port Virtual communication endpoint; understanding ports is critical for
network traffic analysis and intrusion detection.
NAT (Network Address Translation) Maps private IP addresses to public ones; key for network security
and resource management.
Intrusion Detection System (IDS) Monitors network for suspicious activity; crucial for early threat
detection.
Intrusion Prevention System (IPS) Actively blocks threats; important for proactive network defense.
SIEM (Security Information and Event Management) Aggregates and analyzes security data; essential for SOC analysts to
monitor network health.
Packet Basic unit of data in networks; understanding packet structure is
fundamental for traffic analysis.
Protocol Set of rules for data transmission; knowledge of various protocols
(like HTTP, FTP) is crucial for understanding network
communications.
Encryption Secures data by encoding it; vital for protecting sensitive
information.
Decryption Converts encrypted data back to original form; necessary for data
analysis and forensics.
VLAN (Virtual Local Area Network) Segregates network logically; important for enhancing security and
reducing broadcast domains.
DMZ (Demilitarized Zone) Separates internal network from public internet; crucial for extra
security layer around external-facing services.
Phishing Deceptive attempt to obtain sensitive information; understanding
phishing is key to identifying and mitigating social engineering
attacks.
Malware Malicious software; identifying and understanding different malware
types (like viruses, worms) is crucial for defense.
DDoS (Distributed Denial of Service) Overwhelms a service with traffic; recognizing DDoS patterns is
essential for maintaining service availability.
Create by: Ron Sharon
https://www.linkedin.com/in/ron-sharon/
Cross-Site Scripting (XSS) Injecting malicious scripts into webpages; understanding XSS is
important for web application security.
SQL Injection Inserting malicious SQL queries; crucial for defending against
database attacks.
Zero-Day Exploit Attacking a previously unknown vulnerability; understanding this is
key for anticipating and mitigating unforeseen threats.
Cryptography The practice of secure communication; fundamental for data
protection.
Blockchain Distributed ledger technology; important for understanding
emerging security applications.
Incident Response Plan A predefined strategy for handling security incidents; essential for
effective and timely response.
Business Continuity Planning (BCP) Preparing for maintaining business functions during a crisis; crucial
for minimizing impact of disruptions.
Disaster Recovery (DR) Strategies for recovering from major failures; important for restoring
systems and data after a disaster.
Risk Management Process of identifying, assessing, and controlling threats; key for a
comprehensive security strategy.
Social Engineering Manipulating individuals to gain confidential information;
understanding this is critical for recognizing non-technical threats.
Man-in-the-Middle Attack (MitM) Intercepting communication between two parties; crucial for
understanding network-based attacks.
Session Hijacking Illegally taking over a user session; important for protecting user
credentials and sessions.
File Integrity Monitoring (FIM) Detects changes in files; vital for identifying unauthorized file
modifications.
Access Control List (ACL) Specifies who can access certain resources; essential for data and
resource protection.
Public Key Infrastructure (PKI) Framework for managing digital certificates; important for secure
electronic transactions.
Security Policy Formal set of rules on how to manage, protect, and distribute
sensitive information; crucial for maintaining organizational security
standards.
Blue Team Internal security team that defends against both real attackers and
Red Teams; key for maintaining strong defense mechanisms.
Red Team Group that simulates cyber attacks; important for testing the
effectiveness of security measures.
Purple Team Blend of Red and Blue Teams; crucial for enhancing security
defenses through collaborative testing.
White Hat Hacker Ethical hacker who helps improve security systems; understanding
their role is important for security improvement.
Black Hat Hacker Hacker with malicious intent; key for understanding the range of
cyber threats.
Grey Hat Hacker Hacker who operates without malicious intent but without
authorization; understanding their motivations is important for
security analysis.
Cyber Warfare Use of technology to attack a nation; crucial for understanding state-
level cyber threats.
Create by: Ron Sharon
https://www.linkedin.com/in/ron-sharon/