A Flashcards
3DES
Triple Digital Encryption Standard
Performs encryption in 3 times of the same algorithm
802.1x
Switch authentication
Standard for controlling access to intranet infrastructure
AAA
Authentication, Authorization, and Accounting
The Principle of verifying identity, capability and use
ABAC
Attribute-based Access Control
The principle of verifying identity, capability and use.
ACL
Access Control List
Restricting entry, based upon the characteristic of the subject, such as clearance level
AES
Advanced Encryption Standard
Rijndael was approved by the US government and given this title
AES256
Advance Encryption Standard 256bit
The 26 bit version of this algorithm is its highest level and is deemed uncrackable by brute force methods.
AH
Authentication Header
The AH header transmit in clear text but authenticates and integrity checks each packet
AI
Artificial Intelligence
The simulation of human intelligence and thinking in a machine, including adaptive learning and problem solving
AIS
Automatic Indicator Sharing
Automated sharing of threat information between organizations to enhance detection and response.
ALE
Annualized Loss Expectancy
The single loss expectancy times the annualized rate of occurrence
ALG
Application Layer Gateway
This is a type of firewall able to inspect headers and payload in the upper protocol layers
AP
Access Point
Infrastructure connection point for most wireless networks
API
Application Programming Interface
These are developed tools used by programmers that have prebuilt functions with desired utility
APT
Advanced Persistent Threat
Applications with advanced targeting, zero days and
exfiltration techniques that are aimed at particular
organizations or industries.
ARO
Annualized Rate of Occurrence
Most risk assessments track threats and attacks on an
annualized basis.
ARP
Address Resolution Protocol
Given the IP address ARP will locate the MAC address.
ASLR
Address Space Layout Randomization
This randomizes the location of an application in
memory making it harder for attackers to successfully
perform the buffer overflow.
ASP
Application Service Provider
An organization provides access to its custom
developed software, such as accounting or customer
management.
ATT&CK
Adversarial Tactics,
Techniques, and Common
Knowledge
A database of adversarial tactics and techniques that
might be used to compromise systems organizations to
enhance threat management.
Asymmetric key
Public key/Private key
The use of complementary values to disguise and then
reveal information.
AUP
Acceptable Use Policy
This policy is legally required, if HR wants to fire
someone for misuse.
AV
Antivirus
Designed to identify malware, primarily based upon
known patterns.
AV
Asset Value
This can be the replacement cost or income derived
from something.