Acronyms Flashcards
3DES
Triple Digital Encryption Standard
- Deprecated and considered insecure. Replaced by AES
- Symmetric
- Applies the DES cipher algorithm 3 times to each data block
AAA
-Authentication, Authorization, and Accounting)
- Often used to describe RADIUS, or some other form of networking protocol that provides Authentication, Authorization, and Accounting
ABAC
Attribute Based Access Control
Rights granted through policies that combine attributes together
Active Directory
Database and identity service used to provide identity management
ACL
Access Control List
- Set of rules that allow/permit or deny any traffic flow through routers
- Looks at the packet to determine whether it should be allowed or denied
- Works at layer 3 toprovide security by filtering & controlling the flow of trafficfrom one router to another
AES
Advanced Encryption Standard
- Industry-standard for data security
- 128-bit, 192-bit, or 256-bit (strongest) implementations
AES256
Advanced Encryption Standard 256 bits
AH
Authentication Header
- Used to authenticate origins of packets of data transmitted
- These headers don’t hide any data from attackers, but they do provide proof that the data packets are from a trusted source and that the data hasn’t been tampered with
- Helps protect against replay attacks
AIS
Automated Indicator Sharing
- DHS and CISA free program
- Enables organizations to share and receive machine-readable cyber threat indicators (CTIs) and defensive measures (DMs) in real-time
- Useful to monitor and defend networks against known threats
ALE
Annualized Loss Expectancy
ie: can expect x number of devices to fail per year
AP
Access Point
Networking hardware device that provides Wi-Fi access, typically then connected via wire to the router, or directly integrated in the router itself
APT
Advanced Persistent Threat
Stealthy threat actor (usually nation-state or state-sponsored group) that gains unauthorized access to a system and remains undetected for a period of time
ARO
Annualized Rate of Occurrence
The calculated probability that a risk will occur in a given year
ARP
Address Resolution Protocol
Connects IP address with MAC address
ASLR
Address Space Layout Randomization
Prevent exploitation of memory corruption vulnerabilities
ASP
Active Server Page
- Microsoft server-side scripting language and engine to create dynamic web pages
- Superseded by ASP.NET in 2002
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge
Knowledge base framework of adversary tactics and techniques based on real-world observations
AUP
Acceptable Use Policy
Terms that users must accept in order to use a network, system, website, etc…
AV
Antivirus
- Antivirus software
- Typically uses signature-based detection
- Not effective against zero-days or polymorphic malware
BASH
Born Again Shell
Powerful UNIX shell and command language
BCP
Business Continuity Planning
- Plan used to create processes and systems of both prevention and recovery to deal with threats that a company faces
- This plan outlines how a business can continue delivering products and services if crap hits the fan
BIA
Business Impact Analysis
Used to predict the consequences a business would face if there were to be a disruption
BGP
Border Gateway Protocol
- “The postal service of the Internet”
- BGP finds the best route for data to travel to reach its destination
BIOS
Basic Input Output System
- Firmware that performs hardware initialization when systems are booting up, and to provide runtime services for the OS and programs
- First software to run when you power on a device