Acronyms Flashcards
(260 cards)
3DES
Triple Digital Encryption Standard. Typically used on hardware that doesn’t support AES. Most secure mode of operation of 3DES requires 3 keys. Using a single key is insecure, using 2 keys is somewhat secure.
802.1X
Port based authentication protocol used in VPNs for wired and wireless networks.
AAA
Authentication, Authorization, and Accounting.
Used in remote access systems.
ABAC
Attribute-based access control
Grants access to resources based on attributes assigned to the objects and to the users too. Think Unclassified, CUI, Secret, Top Secret.
ACE
Access Control Entry
Identifies a user or group that is granted permission to a resource.
ACK
Acknowledge.
Part of the TCP handshake.
ACL
Access Control List
List of rules used by routers and stateless firewalls to determine what traffic to allow access.
AES
Advanced Encryption Standard
Symmetric key block cipher
AH
Authentication Header
ALE
Annualized Loss Expectancy
AP
Access Point
also called Wireless Access Point (WAP)
API
Application programming interface
APT
Advanced Persistent Threat
usually sponsored by a nation state, has both capability and intent to launch sophisticated and targeted attacks.
ARO
Annual rate of occurrence
Number of times a loss is expected to occur in a year. used to measure risk with ALE and SLE
SLE * ARO = ALE
ARP
Address Resolution Protocol
Usually in the context of ARP Poisoning, which sends false MAC address updates so that traffic is redirected through an attacker’s system.
ASCII
American Standard Code for Information Interchange
AUP
Acceptable Use Policy
BCP
Business continuity plan
includes disaster recovery elements used to return critical functions to operation after an outage
BIA
Business impact analysis
Helps an organization identify critical systems and components, max downtime limits, potential losses from an incident.
BIND
Berkeley Internet Name Domain
DNS software
BIOS
Basic Input/Output System
Computer’s firmware for the settings such as boot drive and other things outside the operating system. Designated replacement is UEFI.
BPDU guard
Bridge Protocol Data Unit guard
Detects false BPDU messages, because those can indicate a switching loop problem. This guard blocks against BPDU attacks.
BYOD
Bring Your Own Device
Employees are allowed to connect to the corporate network using their own mobile devices. This has several problems both with security and with IT support.
CA
Certificate Authority