Skip to main content

Glossary

A

Asset Any component (system, data, service, capability) that has value and requires protection.

Attack Vector Path or method used by a threat source to exploit a vulnerability.


C

Control A technical, organizational, or procedural measure implemented to reduce risk.

Critical Asset Asset whose compromise has severe impact on confidentiality, integrity, or availability.


H

Heaven External VPS environment hosting internet-facing services (documentation, Git, ERP).


I

Impact Severity of consequences if a risk materializes.

Identity System Infrastructure responsible for authentication and authorization (e.g. LDAP/AD).


L

Likelihood Estimated probability of a threat scenario occurring.


R

Risk Combination of likelihood and impact associated with a threat scenario affecting an asset.

Risk Register Canonical list of all identified risks in the system, uniquely identified (R-001 → R-010).


S

Scenario (Threat Scenario) Structured description of how a threat source could exploit vulnerabilities to impact an asset.


T

Trust Boundary Logical or network separation where trust level changes between systems or environments.


V

Vulnerability Weakness in a system that can be exploited by a threat source.


W

Wazuh Security monitoring and SIEM platform used for log aggregation and detection in the lab.