Acronyms Flashcards

1
Q

3DES

A

Triple Digital Encryption Standard
- Deprecated and considered insecure. Replaced by AES
- Symmetric
- Applies the DES cipher algorithm 3 times to each data block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

-Authentication, Authorization, and Accounting)
- Often used to describe RADIUS, or some other form of networking protocol that provides Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute Based Access Control

Rights granted through policies that combine attributes together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Active Directory

A

Database and identity service used to provide identity management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ACL

A

Access Control List

  • Set of rules that allow/permit or deny any traffic flow through routers
  • Looks at the packet to determine whether it should be allowed or denied
  • Works at layer 3 toprovide security by filtering & controlling the flow of trafficfrom one router to another
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

Advanced Encryption Standard

  • Industry-standard for data security
  • 128-bit, 192-bit, or 256-bit (strongest) implementations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES256

A

Advanced Encryption Standard 256 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AH

A

Authentication Header

  • Used to authenticate origins of packets of data transmitted
  • These headers don’t hide any data from attackers, but they do provide proof that the data packets are from a trusted source and that the data hasn’t been tampered with
  • Helps protect against replay attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AIS

A

Automated Indicator Sharing

  • DHS and CISA free program
  • Enables organizations to share and receive machine-readable cyber threat indicators (CTIs) and defensive measures (DMs) in real-time
  • Useful to monitor and defend networks against known threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ALE

A

Annualized Loss Expectancy

ie: can expect x number of devices to fail per year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AP

A

Access Point

Networking hardware device that provides Wi-Fi access, typically then connected via wire to the router, or directly integrated in the router itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

APT

A

Advanced Persistent Threat

Stealthy threat actor (usually nation-state or state-sponsored group) that gains unauthorized access to a system and remains undetected for a period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARO

A

Annualized Rate of Occurrence

The calculated probability that a risk will occur in a given year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ARP

A

Address Resolution Protocol

Connects IP address with MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ASLR

A

Address Space Layout Randomization

Prevent exploitation of memory corruption vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ASP

A

Active Server Page

  • Microsoft server-side scripting language and engine to create dynamic web pages
  • Superseded by ASP.NET in 2002
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge

Knowledge base framework of adversary tactics and techniques based on real-world observations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AUP

A

Acceptable Use Policy

Terms that users must accept in order to use a network, system, website, etc…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AV

A

Antivirus

  • Antivirus software
  • Typically uses signature-based detection
  • Not effective against zero-days or polymorphic malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BASH

A

Born Again Shell

Powerful UNIX shell and command language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BCP

A

Business Continuity Planning

  • Plan used to create processes and systems of both prevention and recovery to deal with threats that a company faces
  • This plan outlines how a business can continue delivering products and services if crap hits the fan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BIA

A

Business Impact Analysis

Used to predict the consequences a business would face if there were to be a disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BGP

A

Border Gateway Protocol

  • “The postal service of the Internet”
  • BGP finds the best route for data to travel to reach its destination
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BIOS

A

Basic Input Output System

  • Firmware that performs hardware initialization when systems are booting up, and to provide runtime services for the OS and programs
  • First software to run when you power on a device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BPA
Business Partnership Agreement Defines a contract between two or more parties as to how a business should run
26
BPDU
Bridge Protocol Data Unit - Frames that have spanning tree protocol information - Switches send BPDUs with a unique source MAC address to a multicast address with a destination MAC
27
BYOD
Bring your own device
28
CA
Certificate Authority An organization that validates the identities of entities through cryptographic keys by issuing digital certificates
29
CAC
Common Access Card Smart card for active duty personnel
30
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
31
CAR
Corrective Action Report Lists defects that need to be rectified
32
CASB
Cloud Access Security Broker - Acts as an intermediary between the cloud and on-prem - Monitors all activity - Enforces security policies
33
CBC
Cipher Block Chaining - CBC is a mode of operation for block ciphers - Block ciphers (for encryption) by themselves would only work for a single block of data…a mode of operation like CBC can be used to give instructions on how to apply encryption to multiple blocks of data - CBC helps prevent issues of identical blocks, even if you have identical inputs. It does that by using an operation called XOR (exclusive-OR)
34
CBT
Computer Based Training
35
CCMP
Counter-Mode/CBC-Mac Protocol Encryption protocol designed for Wireless LAN products
36
CCTV
Closed Circuit Television
37
CERT
Computer Emergency Response Team
38
CIRT
Computer Incident Response Team
39
CFB
Cipher Feedback When a mode of operation uses the ciphertext from the previous block in the chain
40
CHAP
Challenge Handshake Authentication Protocol - Authenticates a user or network host to an authenticating entity - Provides protection against replay attacks - Requires that both the client and server know the plaintext of the secret, but it's never sent over the network
41
CIO
Chief Information Officer
42
CTO
Chief Technology Officer
43
CSO
Chief Security Officer
44
CIS
Center of Internet Security
45
CMS
Content Management System
46
COOP
Continuity of Operation Planning Effort for agencies to make sure they can continue operations during a wide range of emergencies
47
COPE
Corporate Owned Personal Enabled Organization provides its employees with mobile computing devices
48
CP
Contingency Planning
49
CRC
Cyclical Redundancy Check Used to detect accidental changes in digital networks and storage devices
50
CRL
Certificate Revocation List
51
CSP
Cloud Service Provider
52
CSR
Certificate Signing Request - Contains information that the Certificate Authority (CA) will use to create your certificate - Contains the public key for which the certificate should be issued, and other identifying information
53
CSRF
Cross Site Request Forgery Unauthorized actions are performed on behalf of a legitimate user
54
CSU
Channel Service Unit Device used for digital links to transfer data
55
CTM
Counter Mode - Converts a block cipher into a stream cipher
56
CVE
Common Vulnerabilities Exposure List of publicly disclosed computer security flaws These security flaws get assigned a CVE ID number which people can use to reference them
57
CVSS
Common Vulnerability Scoring System Public framework used to rate the severity of security vulnerabilities
58
CYOD
Choose your own device
59
DAC
Directory Access Control Restriction of access based upon the identity of subjects and the groups they belong to
60
DBA
Database Administrator
61
DEP
Data Exclusion Prevention - Microsoft security feature - Monitor and protects pages or regions of memory - Prevents data regions from executing (potentially malicious) code
62
DER
Distinguished Encoding Rules
63
DES
Digital Encryption Standard
64
DHE
Diffe Hellman Ephemeral Way of securely exchanging cryptographic keys over public channels
65
DKIM
Domain Key Identified Mail Email authentication technique - applies signatures by the mail server of the sender’s domain
66
DLL
Dynamic Link Library - Library that contains code and data that can be used by programs to function in Windows - DLL injections can run malicious code within an application by exploiting DLLs
67
DMARC
Domain Message Authentication Reporting and Conformance - Authenticates emails with SPF and DKIM - Used to prevent phishing and spoofing
68
DNAT
Destination Network Address Transcation
69
DPO
Data Privacy Officer
70
DRP
Disaster Recovery Plan
71
DSA
Digital Signature Algorithm
72
EAP
Extensible Authentication Protocol Authentication framework used in LAN's
73
ECB
Electronic Code Book Doesn't hide data patterns well, so it wouldn't work to encrypt images for example
74
ECC
Elliptic Curve Cryptography Good for mobile devices because it can use smaller keys
75
ECDHE
(Elliptic Curve Diffie-Hellman Ephemeral)
76
ECDSA
Elliptic Curve Digital Signature Algorithm
77
EDR
Endpoint Detection and Response Technology that continuously monitors endpoints to mitigate cyber threats
78
EFS
Encrypted File System
79
EOL
End of Life Date set where manufacturer will no longer create the product
80
EOS
End of Service Original manufacturer no longer offers updates, support, or service
81
ERP
Enterprise Resource Planning
82
ESN
Electronic Serial Number
83
ESP
Encapsulated Security Payload - Member of IPsec set of protocols - Encrypts and authenticates packets of data between computers using VPNs
84
FACL
File System Access Control List
85
FDE
Full Disk Encryption
86
FPGA
FPGA (Field Programmable Gate Array) Integrated circuit designed to be configured by a customer or designer after manufacturing
87
FRR
False Rejection Rate Likelihood that a biometric security system will incorrectly reject an access attempt by an authorized user
88
GCM
Galois Counter Mode - High speeds with low cost and low latency - Provides authenticated encryption
89
GPO
Group Policy Object - Contains two nodes: a user configuration and computer configuration - Collection of group policy settings
90
GRE
Generic Routing Encapsulation Tunneling Protocol
91
HA
High Availability
92
HIDS
Host-Based Intrusion Detection System
93
HIPS
Host-Based Prevention Detection System
94
HMAC
Hashed Message Authentication Code combines shared secret key with hashing
95
HOTP
HMAC based One Time Password - One-time password algorithm based on hash-based message authentication codes
96
HSM
Hardware Security Module
97
ICS
Industrial Control System
98
IDEA
International Data Encryption Algorithm
99
IDF
Intermediate Distribution Frame Cable rack in a central office that cross connects and manages IT or telecom cabling between a main distribution frame (MDF) and remote workstation devices
100
IdP
Identity Provider Service that stores and manages digital identities
101
IEEE
Institute of Electrical and Electronics Engineers
102
IKE
Internet Key Exchange
103
IoC
Indicators of Compromise
104
IR
Incident Response
105
IRP
Incident Response Plan
106
ISO
International Organization for Standardization
107
ISSO
Information Systems Security Officer
108
ITCP
IT Contingency Plan
109
IV
Initialization Vector - Used in cryptography is an input to a cryptographic primitive - Used to provide the initial state
110
KDC
Key Distribution Center - Used to reduce risks in exchanging keys - A user requests to use a service. The KDC will use cryptographic techniques to authenticate requesting users as themselves, and it will check whether a user has the right to access the service requested
111
KEK
Key Encryption Key
112
LEAP
Lightweight Extensible Authentication Protocol - Wireless LAN authentication method - Dynamic WEP keys and mutual authentication (b/t a wireless client and a RADIUS server)
113
MaaS
Monitoring as a Service
114
MAC
Mandatory Access Control
115
MAM
Mobile Application Management
116
MAN
Metropolitan Area Network
117
MBR
Master Boot Record - Special type of boot sector at the very beginning of partitioned storage - Holds information about how logical partitions are organized
118
MDM
Mobile Device Management
119
MFD
Multi Function Device
120
MFP
Multi Function Printer
121
MITM
Man in the Middle
122
MMS
Multimedia Message Service
123
MOA
Memorandum of Agreement Legally-binding agreement between two parties
124
MOU
Memorandum of Understanding - Non-legally binding agreement - Used to signal willingness between parties to move forward with a contract
125
MPLS
Multi-Protocol Label Switching Routing technique to direct data from one note to the next based on the short path labels
126
MSA
Measurement Systems Analysis Mathematical method of determining the amount of variation that exists within a measurement process
127
MSCHAP
Microsoft Challenge Handshake
128
MSP
Managed Service Provider
129
MSSP
Managed Security Service Provider
130
MTBF
Mean Time Between Failures
131
MTTF
Mean Time To Failure
132
MTTR
Mean Time To Recover
133
MTU
Maximum Transmission Unit Largest packet or frame size that can be sent in a packet or frame-based network such as the Internet
134
NAC
Network Access Control
135
NAS
Network Attached Storage
136
NAT
Network Address Translation
137
NFC
Near Filed Communication
138
NFV
Network Functions Virtualization Virtualizes entire classes of network node functions into building blocks
139
NIC
Network Interface Card
140
NIDS
Network Based Intrusion Detection System
141
NIPS
Network Based Intrusion Prevention System
142
NTFS
New Technology File System
143
NTLM
New Technology LAN Manager
144
NTP
Network Time Protocol port 123 udp
145
OAUTH
Open Authorization
146
OCSP
Online Certificate Status Protocol Used by CAs to check the revocation status of an X.509 digital certificate
147
OID
Object Identifier
148
OSI
Open Systems Interconnection
149
OSINT
Open Source Intelligence
150
OSPF
Open Shortest Path First
151
OT
Operational Technology
152
OTA
Over the air
153
OTG
On the go
154
OVAL
Open Vulnerability Assessment Language
155
OWASP
Open Web Application Security Project
156
P2P
peer to peer
157
PAC
Proxy Auto Configuration - Used to define how web browsers and other user agents can automatically choose the appropriate proxy server for fetching URLs - Contains a JavaScript function that returns a string with one or more access method specifications
158
PAM
Privileged Access Management
159
PAP
Password Authentication Protocol
160
PBKDF2
Password Based Key Derivative Function 2 - Key derivation functions with a sliding computation cost, which is used to reduce vulnerabilities of brute-force attacks - Applies a pseudorandom function (like HMAC) to the input password along with a salt value, and repeats this process multiple times to produce a derived key
161
PBX
Private Branch Exchange
162
PDU
Power Distribution Unit
163
PEAP
Protected Extensible Authentication Protocol
164
PED
Personal Electronic Device
165
PEM
Privacy enhance mail
166
PFS
Perfect Forward Security Feature of specific key agreement protocols that give assurances that session keys will not be compromised, even if long-term secrets used in the session key exchange are compromised
167
PHI
Personal Health Information
168
PII
Personal Identity Information
169
PKI
Public Key Infrastructure
170
PSK
Pre Shared Key
171
QoS
Quality of Service
172
PUP
Potentially Unwanted Program
173
RA
Recovery Agent
174
RAD
Rapid Application Development
175
RAS
Remote Access Server
176
RAT
Remote Access Trojan
177
RBAC
Role Based Access Control
178
RPO
Recovery Point Objective The maximum amount of data (measured by time) that can be lost after a recovery from a disaster or failure
179
RTBH
Remote Triggered Black Hole - Can be used to drop traffic before it enters a protected network - A common use is to mitigate DDoS
180
RTOS
Real Time Operating System
181
RTP
Real Time Transport Protocol
182
SAE
Simultaneous Authentication of Equals Secure password-based authentication and password-authenticated key agreement method
183
SAML
Security Assertions Markup Language - XML-based markup language for security assertions - Allows an IdP to authenticate users and then pass an auth token to another application (service provider)
184
SAN
Storage Area Network
185
SCADA
System Control and Data Acquisition
186
SCEP
Simple Certificate Enrollment Protocol Makes the request and issuing of digital certificates as simple as possible
187
SDN
Software Defined Networking Makes networking a bit more like cloud computing than traditional network management by defining network technology via software
188
SED
Self Encrypting Drives
189
SEH
Structured Exception Handler
190
SLE
Single Loss Expectancy
191
SOAP
Simple Object Access Protocol
192
SoC
System on a chip
193
STP
Shield Twisted Pair
194
TTP
tactics techniques procedures
195
UAT
user acceptance testing Last phase of the software testing process
196
UEFI
Unified Extensible Firmware Interface
197
UPS
uninterruptible power supply
198
URI
Uniform Resource Identifier
199
URL
Uniform Resource Locator
200
UTM
Unified Threat Management - When a single hardware or software provides multiple security functions - This is in contrast of having individual solutions for each security function
201
UTP
unshielded twisted pair
202
VDE
Virtual Desktop Environment
203
VDI
Virtual Desktop Infrastructure
204
VLSM
Variable Length Subnet Masking
205
VTC
Virtual Teleconferencing
206
WAF
Web Application Firewall
207
WAP
Wireless Access Point
208
WEP
Wired Equivalent Privacy
209
WIDS
Wireless Intrusion Detection System
210
WORM
write once read many Data storage device where information, once written, can't be modified
211
WPS
WiFi Protected Setup
212
XSRF
Cross site request forgery
213
X.509
Standard for defining the format of public key sharing