Acronyms 1 Flashcards
(223 cards)
What is Two-Factor Authentication (2FA)?
Requires two verification methods
2FA enhances security by requiring a second form of verification beyond just a password.
What does the IEEE standard 802.1X pertain to?
Secure access to networks
802.1X provides a framework for authenticating devices on a network.
What is Automated Account Management (AAM)?
Automates the management of user accounts
AAM streamlines user account provisioning and de-provisioning.
Define After-Action Report (AAR).
Document detailing actions after an event
AARs are used to analyze the effectiveness of responses to incidents.
What is Access Control (AC)?
Restricts access to resources
AC is crucial for protecting sensitive information and resources.
What does Access Control List (ACL) specify?
Specifies permissions attached to resources
ACLs are used to define who can access or modify a resource.
What is an Application Delivery Controller (ADC)?
Manages traffic for applications
ADCs optimize application performance and security.
What does Alternate Data Stream (ADS) refer to?
Secondary data attached to a file
ADS can be used to store metadata or hidden information.
What is Application Execution Prevention (AEP)?
Prevents unauthorized code execution
AEP is a security measure to protect systems from malware.
What does Advanced Encryption Standard (AES) refer to?
A widely used encryption standard
AES is a symmetric encryption algorithm used globally for secure data encryption.
Define Attack Graph (AG).
Maps out potential attack paths
AGs help in understanding vulnerabilities and potential attack strategies.
What is the role of Artificial Intelligence (AI)?
Technology enabling machines to learn and adapt
AI is used in various applications, including cybersecurity.
What is an Access Point (AP)?
Device connecting Wi-Fi devices to a network
APs facilitate wireless communication within a network.
What does Application Programming Interface (API) do?
Allows communication between systems
APIs enable different software applications to interact with each other.
Define Advanced Persistent Threat (APT).
Prolonged and targeted cyberattack
APTs often involve stealthy and continuous hacking processes.
What is Address Space Layout Randomization (ASLR)?
Memory protection process
ASLR helps prevent attacks by randomizing memory addresses.
What does Anti-Virus (AV) software do?
Protects against malware
AV software detects and removes malicious software from devices.
What is a Business Continuity Plan (BCP)?
Ensures operations continue after disruptions
BCPs outline procedures for maintaining business functions during crises.
What does Border Gateway Protocol (BGP) manage?
Routing on the internet
BGP is essential for exchanging routing information between autonomous systems.
What is BGP Security (BGPSEC)?
Secures Border Gateway Protocol for network routing
BGPSEC enhances the integrity of routing information.
What is a Business Impact Analysis (BIA)?
Identifies critical business functions
BIA assesses the potential impact of disruptions on business operations.
What does Basic Input Output System (BIOS) do?
Initial hardware boot instructions
BIOS initializes the hardware during the booting process.
What is a Block List (BL)?
List of blocked IP addresses or domains
BLs are used in network security to prevent access from malicious sources.
What is a Business Partnership Agreement (BPA)?
Defines terms between business partners
BPAs outline the roles, responsibilities, and expectations of partners.