Offensive Technology Data – checksums, signatures, file names; vulnerability and associated exploits.
One-way encryption – or one-way hash function is designed in a manner that it is hard to reverse the process, that is, to find a string that hashes to a given value (hence the name one-way). A good hash function makes it hard to find two strings that would produce the same hash value.
open source – an application, other computer program or software building block where the software code is made publicly available for expansion, use or modification by anybody. This makes it very cheap to use but also opens up higher potential for malicious subversion, especially if subverted versions of the work are incorporated into systems that are intended to be secure.
openSSL – an open source version of the Secure Sockets Layer protocol used to help provide authentication and cryptographic security between two parties. This protocol is used widely on internet web servers and web sites to help prevent interception, intrusion and falsification as communications are passed between a legitimate host and the intended recipient of the data.
Open Web Application Security Project (OWASP) – the Open Web Application Security Project is an online community that aims to create free, public resources to help improve the security of software. For example, they maintain lists of the leading vulnerabilities and security controls.
Operational Threat Intelligence – Information about specific impending attacks against the organization and is initially consumed by higher-level security staff, such as security managers or heads of incident response.
OPSEC – operations security – process by which organizations protect unclassified information that can hurt them.
OSINT – open source threat intelligence is data collected from publicly available Web sources such as social media, blogs, news publications, and forums. With an estimated 90% of required intelligence available in open source, it is imperative intelligence analysts become adept at mining open sources.
outsider threat — The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization. An outsider must often gain logical or physical access to the target before launching malicious attacks.
Overload – defined as the limitation of system operation by excessive burden on the performance capabilities of a system component.