-
Notifications
You must be signed in to change notification settings - Fork 2
/
security word vectors
376 lines (376 loc) · 5.93 KB
/
security word vectors
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
internet
botnet
software
stuxnet
operating system
computer worm
smartphone
threat
backdoor
data
authentication
eavesdropping
phishing
internet of things
trusted platform module
federal bureau of investigation
social engineering
cyberwarfare
power grid
formal verification
data breach
target corporation
bluetooth
exploit
cryptosystem
wi-fi
security breaches
fbi
tampering
malware
hacker
nsa
superuser
computer network
anonymous
computer system
computer hardware
secure by design
denial-of-service attack
wireless network
military
smart devices
passport
common vulnerabilities and exposures
rfid
automated threat
electronics
sensor
denial of service attacks
zombie computer
equifax
pacemaker
distributed reflection denial of service
hacktivism
keystroke logging
covert listening device
disk encryption
national security agency
internet service provider
vandalism
kgb
email spoofing
instant messaging
privilege escalation
bank
milwaukee bucks
form w-2
vulnerability
spoofing attack
attack
ip address
artifact
evil maid attack
u.s. securities and exchange commission
credit card number
ransomware
bank account
black market
automated teller machine
unix
personal identification number
linux
kernel
nuclear power plant
cybersecurity
computer emergency readiness team
department of homeland security
smart meter
pan-european network service
air navigation service provider
air traffic control
firmware
tablet computer
smart watch
mobile devices
quantified self
activity tracker
home automation
nest thermostat
backup
staples inc.
insurance
hbgary federal
sony pictures
sony pictures entertainment hack
cruise control
anti-lock brakes
advanced driver-assistance systems
connected car
self-driving car
compact disc
correctness
controller area network
algorithms
tesla motors
united states department of transportation
traffic light
id card
phone cloning
sel4
sysgo
embedded system
pikeos
internet access
medical devices
dongle
insulin pump
cheque
windows xp
chat
cyberpunk
spam
medical device manufacturing
suspect
scam
room
secure
advice
secret
scan
registration
program
official
network
lock
laptop
classify
isn
board
intelligence
hacking
confidential
hack
break
censor
censoring
gateway
firewall
unclassified
embargo
document
declassified
csis
spy
cryptography
sensitive
cracker
counterintelligence
cert
classified
archive
audience
archived
arda
arraign
actuary
actual
advocate
advocacy
air
abstraction
advertising
assembly
airs
artificial
amortization
advertisement
announcement
advertise
administrator
integrity-178b
computer virus
nist
gordon-loeb model
expected value
russia
security breach
ukraine
physical security
markus hess
clifford stoll
the cuckoo's egg
nation state
threat modelling
personal computer
classified information
information technology architecture
assurance services
exit procedure
cyberspace
network stack
cyber-terrorist
china
ipsec
secretively
d-notice
top-secret
keiretsu
declassify
animatronics
afisr
administrate
ahpcrc
big data
apache hadoop
machine learning
advanced persistent threat
packet capture appliance
software vulnerability
self-checkout
network security
vulnerability scanner
open port
penetration test
cybercrime
cyber-attacks
two factor authentication
inoculation theory
cyberattack
united states department of defense
trusted computer system evaluation criteria
blockchain
common criteria
bitcoin
evaluation assurance level
infragard
uscybercom
cyberterrorism
airbus a380
secure coding
cryptographic protocol
computer security model
access control list
capability-based security
confused deputy problem
e programming language
cornell university
robert tappan morris, jr.
rome laboratory
trojan horse
national aeronautics and space administration
tjx companies
credit card
debit card
nuclear centrifuge
programmable logic controller
edward snowden
the washington post
field press censorship
canadian security intelligence service
data encryption
back up
identity theft
alan turing
antivirus software
united states office of personnel management
personally identifiable information
social security number
computer viruses
dynamic dns
fast flux
bulletproof hosting
cyber-security regulation
virtual space
chinese language
xi jinping
chinese government
national cyberdefence centre
federal office for information security
federal criminal police office
rsa conference
indian computer emergency response team
nist cybersecurity framework
general services administration
risk management
national cyber security division
national white collar crime center
bureau of justice assistance
internet crime complaint center
european parliament
united states department of justice criminal division
united states department of justice
computer crime and intellectual property section
computer crime
intellectual property
digital evidence
council of the european union
federal communications commission
national highway traffic safety administration
government accountability office
federal aviation administration
aircraft communications addressing and reporting system
next generation air transportation system
computer emergency response team
christian science monitor
general data protection regulation
united states cyber command
information technology
information security
united kingdom
uk cyber security forum
executive order
adware
antivirus
kaspersky
avast
avira
backdoor
botnet
changeware
crack
cracking
crimeware
crypter
cve
cyberweapon
ddos
downloader
dropper
exploit
firewall
hacking
hijack
infect
injection
keylogger
logic bomb
mirai
malware
monitizer
password
payload
ransomware
reverse shell
riskware
rootkit
scanner
security
sql
shell code
shell
spam
spoof
spyware
stealware
trace
tools
tutorials
trojan
0day
virus
vulnerability
worm
wannacry
zero-day
zeus