Acronyms Flashcards
(350 cards)
Triple Digital Encryption Standard
(Symmetric Encryption)
3DES
Authentication, Authorization, and Accounting
(RADIUS)
AAA
Attribute-based Access Control
Access Control technique that evaluates a set of attributes that each subject possesses to determine if access should be granted.
ABAC
Access Control List
Collection of Access Control Entries.
ACL
Advanced Encryption Standard
Symmetric Block Cipher
AES
Advanced Encryption Standards 256bit
Symmetric Block Cipher
AES256
Authentication Header
IPSec protocol that provides authentication, integrity and protection against replay attacks.
AH
Artificial Intelligence
Science of creating machines with the ability to develop problem solving and analysis without significant human direction or intervention.
AI
Automated Indicator Sharing
Threat intelligence data feed operated by the DHS.
AIS
Annualized Loss Expectancy
Expected cost of a realized threat over a given year.
SLE (Single Loss Expectancy) x
ARO (Annual Rate of Occurrence)
ALE
Access Point
AP
Application Programming Interface
Library of programming utilities used to enable software developers to access functions of another application.
API
Advanced Persistent Threat
An attacker’s ability to obtain, maintain, and diversify access to network systems using exploits and malware.
APT
Annualized Rate of Occurrence
In risk calculation, the percentage of an asset’s value that would be lost during a security incident or disaster.
ARO
Address Resolution Protocol
The broadcast mechanism by which individual hardware MAC addresses are matched to an IP address on a local network segment.
ARP
Optional security feature of a switch that prevents excessive ARP replies from flooding a network segment.
ARP inspection
A network-based attack where an attacker with access to target local network segment redirects an IP address to the MAC address of a computer that is not the intended recipient.
ARP poisoning
Address Space Layout Randomization
Method used by programmers to randomly arrange the different address spaces used by a program or process to prevent buffer overflow exploits.
ASLR
Active Server Page
ASP
Adversarial Tactics, Techniques, and Common Knowledge.
A knowledge base maintained by the MITRE Corporation for listing and explaining specific adversary tactics, and procedures.
ATT&CK
Acceptable Use Policy
AUP
Antivirus
Software capable of detecting and removing virus infections and other types of malware.
A-V
Bourne Again Shell
BASH
Business Continuity Planning
Disaster Recovery Planning - How business processes should deal with minor/disaster level disruption by ensuring that there is a processing redundancy supporting the workflow.
BCP