Comprehensive glossary of cybersecurity, threat intelligence, and quantum computing terms used in the Quantum Cybersecurity Threat Intelligence Platform.
Threat Intelligence
Advanced Persistent Threat (APT)
Prolonged and targeted cyberattack where an intruder gains access to a network and remains undetected for an extended period. Often state-sponsored or highly organized.
Example: APT28 (Fancy Bear) targeting government networks
Learn more: MITRE ATT&CK Framework
Indicator of Compromise (IOC)
Forensic data that identifies potentially malicious activity on a system or network. Includes IP addresses, URLs, file hashes, and domain names.
Example: Known malware file hash SHA256:abc123...
Learn more: CISA Threat Intelligence
Zero-Day Exploit
Attack that targets a previously unknown vulnerability in software or hardware. Zero days refers to the time developers have had to fix the vulnerability (zero days notice).
Example: Log4Shell (CVE-2021-44228) Apache Log4j vulnerability
Tactics, Techniques, and Procedures (TTP)
Patterns of activities or methods associated with specific threat actors. Used for attribution and prediction of future attacks.
Example: Phishing emails with malicious macros (technique) used for initial access (tactic)
Learn more: ATT&CK Tactics
Attack Vectors
Ransomware
Malware that encrypts victim's files and demands payment (ransom) for decryption key. Modern variants include data exfiltration threats (double extortion).
Example: REvil, DarkSide, LockBit ransomware families
Distributed Denial of Service (DDoS)
Attack that overwhelms a system, service, or network with traffic from multiple sources, making it unavailable to legitimate users.
Example: Volumetric attack using UDP amplification via DNS servers
Phishing
Social engineering attack using deceptive emails, messages, or websites to trick victims into revealing sensitive information or installing malware.
Example: Spear phishing email impersonating CEO requesting wire transfer
Data Exfiltration
Unauthorized copying, transfer, or retrieval of data from a computer or server. Often performed slowly to evade detection (low and slow attack).
Example: DNS tunneling to extract data via DNS queries
Cryptojacking
Unauthorized use of computer resources to mine cryptocurrency. Malware or malicious scripts run mining operations without user consent.
Example: Browser-based Monero mining via compromised website
Detection & Response
User and Entity Behavior Analytics (UEBA)
Cybersecurity process that uses machine learning and statistical analysis to detect anomalous behavior by users, devices, and applications.
Example: Detecting compromised account by unusual login times and locations
Security Information and Event Management (SIEM)
Platform that provides real-time analysis of security alerts generated by network hardware and applications. Centralizes log collection and correlation.
Example: Splunk, Elastic Security, IBM QRadar
Endpoint Detection and Response (EDR)
Security solution that continuously monitors end-user devices to detect and respond to cyber threats like ransomware and malware.
Example: CrowdStrike Falcon, Microsoft Defender for Endpoint
Network Detection and Response (NDR)
Security solution that analyzes network traffic to detect malicious activity, anomalies, and threats that bypass perimeter defenses.
Example: Detecting lateral movement via anomalous SMB traffic
Mean Time to Detect (MTTD)
Average time it takes to identify a security incident after it occurs. Industry average is 207 days; quantum platforms target sub-hour detection.
Example: QCTIP MTTD: 4.1 hours vs industry average 207 hours
False Positive Rate
Percentage of benign activities incorrectly flagged as malicious. High false positive rates overwhelm security teams and mask real threats.
Example: Traditional SIEM: 75% FP vs QCTIP: 6% FP
Quantum Computing
Grover's Algorithm
Quantum algorithm providing quadratic speedup for unstructured search. Used in QCTIP for searching IOC databases with O(√N) complexity instead of O(N).
Example: Searching 10,000 threat signatures in 100 quantum steps vs 10,000 classical steps
Learn more: Qiskit Grover's Tutorial
Quantum Walk
Quantum analogue of random walk used for network graph analysis. Enables faster detection of anomalous paths and lateral movement in network topology.
Example: Detecting unauthorized server-to-server communication paths
Quantum Approximate Optimization Algorithm (QAOA)
Hybrid quantum-classical algorithm for solving combinatorial optimization problems. Used in QCTIP for optimal incident response resource allocation.
Example: Minimizing containment cost while maximizing threat isolation
Amplitude Estimation
Quantum algorithm for estimating probabilities quadratically faster than classical Monte Carlo methods. Used for risk assessment and threat probability calculation.
Example: Calculating probability of successful attack given observed indicators
Quantum Superposition
Ability of quantum systems to exist in multiple states simultaneously until measured. Enables parallel processing of multiple threat scenarios.
Example: Analyzing all possible attack vectors simultaneously in single quantum computation
Quantum Entanglement
Correlation between quantum bits that allows them to share information instantaneously. Used to correlate multiple threat indicators across different domains.
Example: Linking network anomalies with user behavior changes via entangled qubits
Compliance & Standards
NIST Cybersecurity Framework
Voluntary framework developed by NIST providing cybersecurity guidance based on existing standards. Five core functions: Identify, Protect, Detect, Respond, Recover.
Learn more: NIST CSF
ISO 27001
International standard for information security management systems (ISMS). Specifies requirements for establishing, implementing, and maintaining security controls.
Example: Risk assessment, access control, incident management procedures
SOC 2 (Service Organization Control)
Audit report demonstrating how a service organization safeguards customer data. Based on trust service criteria: security, availability, confidentiality, privacy, processing integrity.
GDPR (General Data Protection Regulation)
EU regulation governing data protection and privacy. Requires breach notification within 72 hours and implements right to erasure (right to be forgotten).
MITRE ATT&CK Framework
Globally accessible knowledge base of adversary tactics and techniques based on real-world observations. Used for threat modeling and detection engineering.
Learn more: ATT&CK Navigator
Threat Intelligence Sources
STIX/TAXII
Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Intelligence Information (TAXII). Standards for sharing cyber threat intelligence.
Learn more: OASIS CTI
MISP (Malware Information Sharing Platform)
Open source threat intelligence platform for storing, sharing, and correlating IOCs and threat information from multiple sources.
Learn more: MISP Project
OSINT (Open Source Intelligence)
Publicly available information collected from open sources like websites, social media, public records, and forums used for threat intelligence.
Example: Monitoring dark web forums for leaked credentials or exploit sales
ISAC (Information Sharing and Analysis Center)
Sector-specific organization providing threat intelligence sharing among member organizations. Exists for finance (FS-ISAC), healthcare (H-ISAC), etc.