Key Term | Meaning |
ASN | An Autonomous System Number (ASN) consists of blocks of IP addresses that are administered by a single organization but may be made up of several operators.
ASN Examples:
|
Associations | In scoutPRIME, associations are the relationships between risks and elements.
(Search for the definition of "risk" and "element" on this table).
|
CIDRv4 or v6 | Blocks of IP (v4 and v6) addresses assigned to networks.
Examples:
|
Collections | A collection is a set of elements that defines the attack surface of an organization, entity, or system, along with any additional information that may be available.
|
Common Vulnerabilities and Exposures (CVE) | A CVE is a known vulnerability or security flaw that has been assigned a number by a CVE Numbering Authority (CAN) such as Red Hat, IBM, Cisco, Oracle, Microsoft or MITRE.
The master list of CVEs is maintained by MITRE corporation at the following URL: https://cve.mitre.org/cve/.
Examples:
|
Domain | A website address.
Examples:
|
Element | An element is an online asset owned or registered to an "Owner" (see definition on this page). In scoutPRIME, threats and vulnerabilities are not elements, but can be viewed in the Element Details page.
Element Examples:
|
FQDN | A fully qualified domain name (FQDN) is the complete domain name for a specific computer, or host, on the internet. The FQDN consists of two parts: the hostname (e.g., "www") and the domain name (e.g., google.com).
Examples:
|
IPv4 or v6 | A unique address that is used to identify computers or nodes on the internet.
IPv4 Examples:
IPv6 Examples:
|
Owners | Owners or registrants of one or more domains, ASNs, CIDRs, FQDNs, or IP address blocks.
Examples:
|
Ownership | An automated process of discovery that uncovers ASNs, CIDRs, FQDNs and IP addresses belonging to a specified owner.
|
Risks | In scoutPRIME, a risk is a threat and/or vulnerability.
(Search for the definition of "threat" and "vulnerability" on this table).
|
Threat | A circumstance, individual(s), or event that adversely impacts network operations and assets.
Examples:
|
The Threat Indicator Confidence score (TIC) indicates the potential risk of a given threat. TIC is calculated via a complex proprietary algorithm. TICs are calculated in the background, usually taking a few minutes to an hour.
| |
Vulnerability | Software library outdated or compromised. A vulnerability is listed by its CVE number.
(Search for the definition of "CVE" on this table).
|