Acronyms Flashcards

(73 cards)

1
Q

FRR

A

False Rejection Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FAR

A

False Acceptance Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TGS

A

Ticket Granting Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TGT

A

Ticket Granting Ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TGT

A

Ticket Granting Ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

STIX

A

Structured Threat Information Expression
- a standardized XML programming language for conveying data about cybersecurity threats in a common language that can be easily understood by humans and security technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MSSP

A

Managed Security Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CAC

A

Common Access Cards
- Used by military personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PIV

A

Personal Identification Verification
- Used by US Federal Employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ISA

A

Interconnection Security Agreement
- How the systems of each party will be connected
- How data will be shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MSA

A

Measure System Analysis
- Sates measurements to be used to determine the quality and effectiveness of provided services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SIEM

A

Security Information & Event Management
- collects event log data from a range of sources, identifies activity that deviates from the norm with real-time analysis, and takes appropriate action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MOU

A

Memorandum of Understanding
- Provides a summary of which party is responsible for specific tasks
- Who is going to do what, when

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BPO

A

Blanket Purchase Order
- agreement w/ 3rd party vendor to provide services on an ongoing basis
- typically negotiated to take advantage of a preset discounted pricing structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SLA

A

Service Level Agreement
- Specifies services provided by 3rd party & what level of performance is guranteed
- may also define how disputes will be managed, warranties provided, specific disaster recovery procedures, and when agreement will be terminated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OCSP

A

Online Certificate Status Protocol
- used for obtaining the revocation status of an X.509 digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CSR

A

Certificate Signing Requests
- one of the first steps towards getting your own SSL/TLS certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

PEM

A

Privacy Enhanced Mail
- used to store SSL certificates and their associated private keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

P7B

A

A format for sharing and achieving certificates without the private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DER

A

Distinguished Encoding Rules
- digital certificate file that is created and stored in binary format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

.cer

A

certificate files stored using a base-64 encoded X.509 certificate format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

PFX

A

Personal Information Exchange
- used to signify a file carrying just a single certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

RIPEMD

A

RACE Integrity Primitives Evaluation Message Digest
- group of hash functions
- most popular is 160 bit
- also offers 128, 256, and 320 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

MD5

A

Message Digest 5
- 128 bit hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
SHA-2
Secure Hashing Algorithm 2 - set of cryptographic hash functions - variable length input into fixed-length hashes - 224, 256, 384, 512 bit hashes
26
SHA-1
Secure Hashing Algorithm 1 - produces only 160 bit hash
27
RC4
Rivest Cypher 4 - Stream cipher
28
ECC
Elliptical Curve Cryptography - Newer, complex mathematical approach to create relative short but very secure and high-performance keys - used when device is low powered
29
OSINT
Open-source Intelligence - collection and analysis of data gathered from open sources to produce actionable intelligence
30
HMAC
Hash-Based Message Authentication Code - Allows user to verify that a file or message is legitimate
31
DPR
Disaster Recovery Plan - describes how an organization can quickly resume work after an unplanned incident
32
BCP
Business Continuity Plan - consists of the critical information an organization needs to continue operating during an unplanned event
33
ASA
Adaptive Security Appliance - security device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN)
34
CSA
Cloud Security Alliance - best practices for providing security assurance within cloud computing
35
ISO
International Organization for Standardization - develop and publish International Standards
36
eHI
Electronic Health Information
37
IDS
Intrusion Detection System - identifies threats but does nothing to prevent issues
38
IPS
Intrusion Prevention System - identifies threats and tries to stop issue
39
DLP
Data Loss Prevention
40
FACTA
Fair and Accurate Credit Transactions Act - intended to prevent credit card theft and fraud
41
FISMA
Federal Information Security Management Act - defines an information security framework for government agencies and their contractors
42
COD
Certificate of Destruction - document that states receipt and destruction of confidential data
43
PTZ
Pan Tilt Zoom camera
44
TACACS+
Terminal Access Controller Access Control Server - Provides 3 protocols - authentication - authorization - accounting Uses - TCP 49 Encrypts entire data packet contents
45
RBAC
Role-based Access Control
46
DAC
Discretionary Access Control - Access assigned directly to subjected based on the discretion of the data owner
47
MAC (access control)
Mandatory Access Control - labels both users who need access (subjects) and resources w/ controlled access (objects)
48
DACL
Discretionary Access Control - Objects have a discretionary access control list w/ entries for each subject
49
SOAR
Security Orchestration, Automation, Response - assess, detect, intervene, or search through incidents and processes without the consistent need for human interaction
50
ALE
Annualized Loss Expectancy -Formula: Asset value * exposure factor *ARO (annualized rate of occurrence)
51
PAP
Password Authentication Protocol - Transmits passwords in clear text
52
DRM
Digital Rights Management
53
IRM
Information Rights Mangement
54
HSM
Hardware Security Module - Physical security device - manages and safe guards digital keys and performs encryptions and decryption
55
APT
Advanced Persistent Threat - threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period
56
TAXII
Trusted Automated eXchange of Intelligence of Information - enables exchange of threat intelligence
57
SED
Self-encrypting Drive
58
IP
Intellectual Property
59
ANT
Advanced and Adaptive Network Technology - similar to bluetooth - designed for more specialized devices
60
iPaaS
Integration Platform as a Service - set of automated tools that integrate software applications that are deployed in different environments
61
MaaS
Monitoring as a Service
62
AaaS
Analytics as a Service
63
FWaaS
Firewall as a Service
64
EBS
Enterprise Service Bus - Set of rules and principles for integrating numerous applications together
65
PDS
Protected Distribution System - Protects classified network data by using physical security - best way to protect data in transit when strong cryptography is not feasible - keeps cabling secure while also preventing electronic emissions
66
COOP
Continuity of operations plan - same as BCP (Business continuity plan) - term favored by public and government entities
67
BIA
Business Impact Analysis -predicts the consequences of disruption of a business function
68
PFS
Perfect Forward Secrecy - Requires more computer power - Browser must support it - Uses ECDHE (Elliptical Curve or Diffie-Helman Ephemeral) - Every sessions uses a different private key
69
ECB
Electronic Codebook - Simplest encryption mode - Each block is encrypted w/ same key
70
CBC
Cipher Block Chaining - Each plaintext block is XORed w/ previous cypher block - Uses an initial vector block
71
CTR
Counter - Uses incremental counter
72
GCM
Galois/Counter Mode - Encryption w/ authentication - Commonly used in networks (SSH, TLS)
73
VFA
Virtual Firewall Appliance - provides packet filtering and monitoring