Sec+ Acronyms Flashcards

1
Q

Aup

A

Agreed-upon principal set forth by a company to go over and help and please of that company may use resources such as computers and Internet access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ALE

A

Annual Los expectancy calculation used we didn’t buy risks and calculate the expected loss each year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ARO

A

Annualized rate of occurrence – I calculation of how often he threat will occur. For example, the threat that occurs once every five years has an annualized rate of occurrence of 1/5, or 0.2 .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AV

A

Asset. Value – the assessed value of an item (server, property, and so on) associated with cash flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BIA

A

Business impact analysis dash study of the possible impact of a disruption to a businesses vital resources were to occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BPA

A

Business Partners agreement Dash an agreement between partners any business that outlines the responsibilities, obligation, and sharing of profits and losses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

EF

A

Exposure factor– The potential percentage of lost to an asset if a threat is realized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ISA

A

Interconnection security agreement – as defined by nist and publication 800 Dash 27, it is an agreement established with tween organizations that are not reconnected IT systems. The I SA also supports a memorandum of understanding or agreement between the mou /A between the organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MTD

A

Maximum Callabell downtown – the maximum period of time that a business process can be down for the survival of the organization is at risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MTBF

A

Mean Time between failures – the measurement of anticipated lifetime of a system or component.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MTTF

A

Mean Time to failure – the measurement of the average of how long it takes a system or component to fail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MTTR

A

Mean what time to restore that the measurement of how long it takes to repair a system or component want to feel your occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MOA

A

Memorandum of understanding am all you/memorandum of agreement MOE – most commonly known as an MOU rather than MOA, this is the document between two or more parties finding their respective responsibilities in accomplishing a particular goal and mission, such as security system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RPO

A

Recovery point objective – the point last known good data prior to an outage that is used to recover.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RTO

A

Recovery time objective – the maximum amount of time that a process or service is allowed to go down and still to be considered acceptable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RAID

A

Redundant array of independent disks that configuration of multiple hard disk used to provide fault tolerance should a disk feel. Different levels of our RAID exist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Risk

A

The probability that a particular thread will occur, either accidentally or intentionally, leaving a system Bonable and the impact of this occurring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Risk analysis

A

And I valuation of each risk that can be identified. Each of us should be outlined, describe, and evaluated on the likelihood of it occurring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Risk assessment

A

And a valuation of the possibility of a threat level and ability existing. And assessment must be performed before any other actions – such as how much to spend on a security system in terms of dollars and manpower – can be decided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Risk avoidance

A

Strategy of dealing with risk in which it is decided that the best approach is to avoid the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Risk calculation

A

The process of calculating the risks that exist in terms of cost, number, frequency, and so forth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Risk deterrence

A

It strategy of dealing with my skin which it is decided that the best approach is to discourage potential attackers from engaging in behavior that leads to the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Risk mitigation

A

A strategy of dealing with risking which it is decided that the best approach is to lessen the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Risk transference

A

Your strategy of dealing with risk in with you just decided that the best approach is to offload some of the risk through insurance, third-party contracts, and/or shared responsibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

SLA

A

Service – level agreement – an agreement that specifies performance requirements for the ender. This agreement may use meantime before failure and me time to repair as performance measures in the SLA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

SLE

A

Single life expectancy – the cost of single last one of occurs. This loss can be a critical value, but can be the result of the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

SPOF

A

Single point of failure – I think a weakness that is capable of bringing an entire system down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

vulnerability

A

If law or weakness in some part of the system security procedures, design, implementation, or internal controls that could expose it to danger (accidental or intentional) and result in violation of the security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Three types of control

A

Management operational and technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Management types of control

A

With assessment, planning, system and services acquisition, certification, accreditation, and security assessment

31
Q

Operational type of control

A

Personal security, physical and environmental protection, contingency planning, configuration management, maintenance, system and information integrity, Mia protection, incident response, awareness in training

32
Q

Technical types of control

A

Identification authentication, axis control, audit in accountability, system and communication protection

33
Q

Error types

A

Type one errors are those with false positive’s – that is, you think that evil is present when it is not

Type two errors are those with false negative, will you fail to notice a problem even though it is there – that is, you were looking directly at the evil and didn’t recognize it.

Type three errors are those in which you become to the right conclusion for all of the wrong reasons. You made that someone broke into your system is because users are having trouble logging in. Someone did indeed break into the system, but you should have noticed it because all of the valuable that is gone.

34
Q

Business continuity plans

A

Automation/scripting the days of relying on someone in the server room to see a problem and push a button to head it off or coming to a close. Thanks to sophisticated monitors and sensors, it is possible to use automation 4/scripting in a wide variety of scenarios to preplan automated course of action.

Frameworks in templates. Templates can be helpful in the risk assessment process by providing a means to summarize and document results of threats towards identification, characterization, Bonnaroo bill Ites, and in packs. Typical templates include skills of evaluating the threats in deciding the best responses to them.

Master image – most yours operating systems allow you to create a model use your system as a disk image on a server, the disk images downloaded and installed want to feel your occurs. This is a method that makes it easier for administrators to restore system and it would be to do it manually.

35
Q

Ninepersistence – persistent images are those that stay the same, while nonpersistent are those that are temporary. They can exist only in the ram or be changes that are over in on a reboot by a persistent/frozen image

Elasticity Dash left yesterday is a major feature of cloud computing meaning the ability to scale of resources as needed

Scalability – speaking of scaling both up and down, scalability is always a desired attribute of any system.

A

Distributive allocation – commonly known as load-balancing, just to be with allocation allows for distributing the load open print to see’s file request, dad about it, and so on) so that no device is overly burdensome. This can help with the redundancy, availability and fault tolerance

Hi availability – high avail. refers to the measures, such as redundancy, failover, mirroring, used to keep services in systems operational during an outage.

Planning for resiliency – is the capacity to recover quickly from difficulties.

36
Q

Redundancy – the first two systems that you didn’t repeated or fail over to other systems in the event of a malfunction. Fell over refers to the process of re-constructing a system with switching over to other systems want to feel your detected. In the case of a server when I thought is detected. This vanity allow Service to continue on and craft in until the primary server can be restored. In the case of a network, this means passing switches to another network path in the event of an ortho year in the primary path. Oh 33

A

Fail over Systems can be expensive to implement. In a large corporate network or e-commerce and environment. I feel over my entail switching our processing to a remote location until your primary facility is operational. The primary site and the remote sight Would you synchronize data to answer that information is as up-to-date as possible.

Clustering to appreciate the beauty of class III, the fact that this is the technology I would go who is built. Not only does questioning allow you to have a weekend and see but it also offers you scale as demand increases.

37
Q

Fault tolerance – is the ability of assistance in operations me vent. And continue operations even do a critical component, such as a disk drive, I feel. Capability involves over – engineering systems by adding redundant components and subsystems.

A

Cont

38
Q

DMZ

A

A network segment between two firewalls. When is that we’re facing, connected to the outside world other than wood, internal network. Public facing servers, such as Web servers are often placed in a Dmz.

39
Q

Honey pot

A

If existing design to divert attackers from your real systems it is often replete with logging and tracking to give evidence

40
Q

Honeynet

A

A network that functions in the same manner as a honeypot

41
Q

ISMS

A

Information security management system – never turn their place to hide range used to manage information security

42
Q

IDS

A

Intrusion detection system if system that monitors the network for possible intrusion from Loggs that activity

43
Q

IPS

A

Intrusion Prevention system – a system that monitors the network for possible intrusions and logs that activity and then blocks for traffic at a suspected of being an attack

44
Q

PII

A

Any information that could identify a particular individual

45
Q

SDN

A

Software defined network – the entire network, including of, is virtualized.

46
Q

SPI

A

Seat full packet inspection – a firewall that not only examine each packet but also remembers the recent previous packets.

47
Q

I SA/IEC – 62443

A

It’s a series of standards that define procedures for implementing electronically secure industrial automation and control systems (IACS).The guidance in this document is divided into four total category; general, policies, system, and component.

48
Q

PCI – DSS

A

Payment card industry data security standards – is the one used by Visa, MasterCard etc. Though there are in fact a great man parts to the standard, we were only briefly summarize general standard details of the penetration testing portion.

49
Q

PCI – DSS control objectives

A

One build and maintain a secure network

2 Protect Card holder data

  1. Maintain a vulnerability management program
  2. Regularly monitor and Test networks
  3. Maintain a vulnerability management program

Page 53

50
Q

SNa concepts

A

Zones – one of the most elementary aspects of network security is to segregate your network into zones

  • Security zone this is the most sensitive systems with mission-critical data
  • General work zone – these are standard workstations and servers with typical business data and functionality
  • Low security zone – is your computers and networks I went and systems that have no highly sensitive information and the breach of the systems would have minimal impact
51
Q

ACL

A

Access control list data table of data file that specifies the weather or user or group has access to a specific resource on a computer or network

52
Q

AP

A

AccessPoint – the point at which axis to a network is Publix. This term is often used in relation to a wireless access point

53
Q

AR

A

Active response – a response generating in real time

54
Q

Alarm

A

A notification that an usual condition existing should be investigated

55
Q

Alert

A

And indication that any new condition could exist and should be investigated

56
Q

All in one appliance

A

An appliance that performs multiple functions

57
Q

Analyzer

A

Component a process that analyzes the data collected by the sensor

58
Q

Anomalies

A

Variations from normal operations

59
Q

Anomaly detection IDS (AD – IPS)

A

And anomaly detection system works by looking for deviations from a pattern of normal network traffic

60
Q

Appliace

A

A freestanding device that freaking a self-contained manner

61
Q

Application level proxy

A

Advice or software that recognizes application-specific Commands and offers granular control over them

62
Q

AH

A

Authentication header and IPSec hasheader provide connection with integrity and got it working off Acacian for IP data Graham And to provide protection against replays

63
Q

Compensating controls

A

Gap controls that fill-in coverage between other types of honor ability medications taken in (where there are holes in coverage, wecompensate for them.

64
Q

DLP

A

Dallas prevention – any sisters that identify, Monitor, and protect data to be vented from, clarification, instruction,, or extrifilation from the location

65
Q

ESP

A

Encapsulation security payload – an IPS header used to provide a mix of security services in IPV four and IPv6. ESP can be used alone or in combination with the IP authentication header

66
Q

Encapsulation

A

The process of enclosing out in a packet

67
Q

False negative

A

And event that should be flag but is it

68
Q

False positive

A

The flag event It has been flagged and has been falsely triggered

69
Q

Firewall

A

A combination of hardware and software filters place between trusted and I’m twisted networks intended to protect a network from attacked by hackers who could gain access through public networks, including the Internet

70
Q

HOST BASED IDS (HIDS)

A

And intrusion detection system that is hostess. And alternative is an intrusion detection system that is network based

71
Q

HSM

A

Hardware security module – a software or appliance standalone used to enhance security in a commonly used with PKI systems

72
Q

Implicit deny

A

Implicit that a condition that states that unless otherwise given, the permission will be denied

73
Q

Ipsec

A

Internet protocol security Dash if there are protocols to enable encryption, I didn’t Acacian, and integrity over IP. Internet protocol security is commonly use with virtual private network‘s and operates at layer three