OAuth (Open Authorization standard)
- an open-standard authorization protocol or framework that provides applications the ability for secure designated accessOffSec (Offensive Security)
- the proactive approach to securing networks and systems from attacks by actively seeking out vulnerabilities and weaknessesOpenIOC (Open Indicators of Compromise)
- an extensible XML schema that enables you to describe the technical characteristics that identify a known threat, an attacker's methodology, or other evidence of compromiseoperate & maintain
- A NICE Framework category consisting of specialty areas responsible for providing the support, administration, and maintenance necessary to ensure effective and efficient IT system performance and security.operational exercise
- An action-based exercise where personnel rehearse reactions to an incident scenario, drawing on their understanding of plans and procedures, roles, and responsibilities.operations technology
- The hardware and software systems used to operate industrial control devices.outside( r) threat
- A person or group of persons external to an organization who are not authorized to access its assets and pose a potential risk to the organization and its assets.Overfitting
- an undesirable machine learning behavior that occurs when the machine learning model gives accurate predictions for training data but not for new dataoversight & development
- A NICE Framework category consisting of specialty areas providing leadership, management, direction, and/or development and advocacy so that all individuals and the organization may effectively conduct cybersecurity work.