Acronyms Flashcards

(172 cards)

1
Q

FDE

A

Full-Disk Encryption - fully encrypts the hard drive on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TPM

A

Trusted Platform Module - used for boot integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SDN

A

Software-Defined Networking - virtualized networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DMZ

A

Demilitarized Zone - used to segment a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CSR

A

Certificate Signing Request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CN

A

Common Name for a certificate for a system - typically the Fully Qualified Domain Name for a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FQDN

A

Fully Qualified Domain Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RFID

A

Radio Frequency Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CSO

A

Chief Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MDM

A

Mobile Device Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DHCP

A

Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SSH

A

Secure Shell -secure protocol used to connect to command-line shells, and can be used to tunnel other protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TLS

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RBAC

A

Role-based Access Control - based on user’s position in the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MAC

A

Mandatory Access Control - permissions granted by security classifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DAC

A

Discretionary Access Control - allows data owners to set permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ABAC

A

Attribute-based access control - considers various attributes such as location, time, computer, username, password, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SED

A

Self-encrypting drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SIEM

A

Security Information and Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

XSS

A

Cross-site Scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

UEM

A

Universal Endpoint Management - A universal endpoint management (UEM) tool can manage desktops, laptops, mobile devices, printers, and other devices. UEM tools often use applications deployed to mobile devices to configure and manage them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CASB

A

Cloud Access Security Broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IPS

A

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IDS

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
NIPS
Network Intrusion Prevention System
26
NIDS
Network Intrusion Detection System
27
NTLM
New Technology LAN Manager - an older Windows authentication protocol
28
DMZ
De-militarized zone - provides limited access to public-facing servers for outside users, but blocks outside users from accessing systems inside the LAN.
29
VPC
Virtual datacenter?
30
CCMP
Counter Mode Block Chaining Message Authentication (CBC-MAC) Protocol, is AES-based, used by WPA2 to encapsulate traffic. Is the minimum acceptable encryption used by WPA3
31
CYOD
Choose Your Own Device - allows users to choose a device that is corporate-owned and paid for. Choices may be limited to a set of devices, or users may be allowed to choose essentially any device depending on the organization’s deployment decisions
32
BYOD
Bring Your Own Device
33
COPE
Corporate-Owned, Personally Enabled - provides devices to users that they can then use for personal use.
34
VDI
Virtual Desktop Infrastructure - used as an access layer for any security model where specialized needs or security requirements may require access to remote desktop or application services
35
WPS
Wi-fi Protected Setup
36
SSO
Single Sign-On
37
SAML
Security Assertion Markup Language - used by many identity providers to exchange authorization and authentication data with service providers
38
LDAP
Lightweight Directory Access Protocol
39
SSID
Service Set Identifier
40
RADIUS
Remote Authentication Dial-In User Service
41
VLAN
Virtual local area network - most often used to segment the internal network
42
TPM
Trusted Platform Module - a secure cryptoprocessor used to provide a hardware root of trust for systems. They enable secure boot and boot attestation capabilities and include a random number generator, the ability to generate cryptographic keys for specific uses, and the ability to bind and seal data used for processes the TPM supports.
43
NAC
Network Access Control
44
OTA
Over-the-air updates are used by cellular carriers as well as phone manufacturers to provide firmware updates and updated phone configuration data
45
MDM
Mobile Device Management
46
SAE
Simultaneous Authentication of Equals - used in WPA3 (wi-fi protocol) to improve on previous models - WPA3’s Personal mode replaces the pre-shared key mode found in WPA2 with simultaneous authentication of equals
47
ARP
Address Resolution Protocol
48
HIPS
host-based intrusion prevention system - can monitor network traffic to identify attacks, suspicious behavior, and known bad patterns using signatures
49
DLP
Data loss prevention - these tools allow sensitive data to be tagged and monitored so that if a user attempts to send it, they will be notified, administrators will be informed, and if necessary, the data can be protected using encryption or other protection methods before it is sent -designed to protect data from being exposed or leaking from a network using a variety of techniques and technology
50
FTP
File Transfer Protocol
51
PSK
Pre-shared Key
52
SNMP
Simple Network Management Protocol - can provide information about the status and configuration of her network devices
53
SRTP
Secure version of the Real-Time Transport Protocol, used primarily for voice over IP (VoIP) and multimedia streaming or broadcast
54
ABAC
Attribute-based access control
55
UEFI
Unified Extensible Firmware Interface
56
BIOS
Basic input/output system
57
CHAP
Challenge Handshake Authentication Protocol - periodically has the client re-authenticate. This is transparent to the user but is done specifically to prevent session hijacking
58
PAP
Password Authentication Protocol - actually quite old
59
HSM
Hardware Security Module -provide many cryptographic functions, but they are not used for boot attestation (TPM). A physical device that safeguards and manages digital keys
60
OAuth
Open Authorization
61
TOTP
Time-based one-time passwords
62
HOTP
HMAC (hash-based message authentication code)-based one-time passwords
63
HMAC
Hash-based message authentication code
64
Xaas
Anything as a service
65
SCADA
Supervisory Control and Data Acquisition
66
TLS
Transport Layer Security - a reliable method of encrypting web traffic. It supports mutual authentication and is considered secure. Created in 1999 as the successor to SSL (secure sockets layer)
67
ECC
Elliptical-curve cryptography - faster than RSA-based cryptography because it can use a smaller key length to achieve levels of security similar to a longer RSA key (a 228-bit elliptical curve key is roughly equivalent to a 2,380-bit RSA key)
68
SAN
Storage Area Network
69
RAID
Redundant Array of Independent Drives (disks). RAID 0, 1, 3, 5, 10
70
IaaS
Infrastructure as a Service - provides the components of an entire network and systems infrastructure
71
PaaS
Platform as a Service provides the framework and underlying tools to build applications and services - In the platform-as-a-service (PaaS) model, the consumer has access to the infrastructure to create applications and host them
72
SaaS
Software as a Service - the consumer has the ability to use applications provided by the cloud provider over the Internet. SaaS is a subscription service where software is licensed on a subscription basis
73
RFC
Request for Comment - how Internet protocols are defined and documented
74
PFS
Perfect Forward Secrecy - used to change keys used to encrypt and decrypt data, ensuring that even if a compromise occurs, only a very small amount of data will be exposed
75
DLL
Dynamic Linked Library
76
DBA
Database Administrator
77
CER
Crossover error rate - The crossover error rate (CER) is the point where the FAR (false acceptance rate) and the FRR (false rejection rate) cross over. CER provides a means of comparing biometric systems based on their efficiency, with a lower CER being more desirable
78
FAR
False acceptance rate in a biometric system
79
FRR
False rejection rate in a biometric system
80
MSSR
Managed Security Service Provider - an outside company that handles security tasks. Some or even all security tasks can be outsourced, including intrusion detection and prevention (IDS/IPS) management, security information and event management (SIEM) integration, and other security controls
81
UPS
Uninterruptible Power Supply
82
MTR
Maximum Time to Restore
83
API
Application Programming Interface
84
OWASP
Open Web Application Security Project - the de-facto standard for web application security
85
WAF
Web Application Firewall
86
BIA
Business Impact Analysis
87
DRP
Disaster Recovery Plan
88
PDU
Power distribution Unit
89
SED
Self-Encrypting Disk - automatic Full Disk Encryption
90
SDK
Software development kit
91
TOTP
Time-based One Time Password
92
NIC
Network Interface Card
93
RTOS
Realtime Operating System
94
IaC
Infrastructure as Code - the process of managing and provisioning computer data centers through machine-readable definition files, rather than physical hardware configuration or interactive configuration tools
95
API
Application programming interface
96
CTR
Counter mode -makes a block cipher into a stream cipher by generating a keystream block using a non-repeating sequence to fill in the blocks. This allows data to be streamed instead of waiting for blocks to be ready to send
97
SAN
Subject Alternate Name - SAN, or Subject Alternate Name, certificate allows multiple hostnames to be protected by the same certificate
98
VIP
Virtual IP Address
99
UEFI
Unified Extensible Firmware Interface
100
NAT
Network Address Translation - NAT gateways allow internal IP addresses to be hidden from the outside, preventing direct connections to systems behind them. This effectively firewalls inbound traffic unless the gateway is set to pass traffic to an internal host when a specific IP, port, and protocol is used
101
Secure HTTP
Port 443
102
UTM
Unified Threat Management
103
DLP
Data Loss Prevention
104
HIPS
Host-based intrusion prevention system
105
IdP
identity provider
106
PEAP
Protected Extensible Authentication Protocol - relies on server-side certificates and relies on tunneling to ensure communications security
107
LEAP
Lightweight Extensible Authentication Protocol - uses WEP keys for its encryption and is not recommended due to security issues
108
EAP-TLS
EAP Transport Layer Security - requires certificates on both the client and server, consuming more management overhead
109
DNSSEC
Domain Name System Security Extensions - provides the ability to validate DNS data and denial of existence and provides data integrity for DNS
110
VDI
Virtual Desktop Infrastructure
111
PAM
Privileged Access Management (PAM) system
112
EDR
Endpoint detection and response
113
PEM
Privacy Enhanced Mail - the most common format issued by certificate authorities
114
DER
Distinguished Encoding Rules - a binary form of the ASCII text PEM format
115
NTP
Network Time Protocol
116
EV
Extended Validation certificates prove that the X.509 certificate has been issued to the correct legal entity. Additionally, only specific certificate authorities (CAs) can issue EV certificates
117
NG SWG
Next-generation (NG) secure web gateways (SWG) add additional features beyond those found in cloud access security brokers and next generation firewalls. While features can vary, they may include web filtering, TLS decryption to allow traffic analysis and advanced threat protection, cloud access security broker (CASB) features, data loss prevention (DLP), and other advanced capabilities
118
OCSP
Online Certificate Status Protocol
119
CRL
Certificate Revocation List
120
OCSP
Online Certificate Status Protocol
121
RA
registration authority - receives requests for new certificates as well as renewal requests for existing certificates
122
SRTP
Secure Real-Time Transport Protocol - used primarily for Voice over IP (VoIP) and multimedia streaming or broadcast. does not fully protect packets, leaving RTP headers exposed, potentially exposing information that might provide attackers with information about the data being transferred
123
AH
Authentication Header, protocol from IPSec - IPSec’s Authentication Header (AH) protocol does not provide data confidentiality because it secures only the header, not the payload. That means that AH can provide integrity and replay protection but leaves the rest of the data at risk
124
COOP
Continuity of Operations Planning
125
FEMA
Federal Emergency Management Agency
126
SIP
Session Initiation Protocol
127
CAM
Content-Addressable Memory - The Content-Addressable Memory (CAM) tables on switches contain a list of all the devices they have talked to and will give Naomi the best chance of identifying the devices on the network
128
SLA
Service level agreement - defines the level of service the customer expects from the service provider. The level of service definitions should be specific and measurable in each area
129
MOU
memorandum of understanding - a legal document that describes a mutual agreement between parties
130
ISA
interconnection security agreement - an agreement that specifies the technical and security requirements of the interconnection security requirements of the interconnection between organizations.
131
BPA
business partnership agreement - a legal agreement between partners. It establishes the terms, conditions, and expectations of the relationship between the partners
132
DPO
Data protection officer - required by the GDPR. They oversee the organization’s data protection strategy and implementation, and make sure that the organization complies with the GDPR
133
GDPR
General Data Protection Regulation - a standard for data privacy and security in the European Union (EU)
134
SPOF
Single Point of Failure
135
RTO
Recovery time objectives
136
RPO
Recovery point objective - specifies the allowable data loss. It is the amount of time that can pass during an interruption before the quantity of data lost during that period surpasses business continuity planning’s maximum acceptable threshold
137
MTBF
mean time between failures - the rating on a device or component that predicts the expected time between failures.
138
MTTR
Mean time to repair - the average time it takes for a failed device or component to be repaired or replaced
139
ARO
annual rate of occurrence - is the ratio of an estimated possibility that a threat will take place within a one-year time frame.
140
AUP
acceptable use policy - describes the limits and guidelines for users to make use of an organization’s physical and intellectual resources. This includes allowing or limiting the use of personal email during work hours.
141
BIA
Business Impact Analysis - helps to identify critical systems by determining which systems will create the largest impact if they are not available.
142
CIS
The Center for Internet Security - benchmarks provide recommendations for how to secure an operating system, application, or other covered technology
143
PCI-DSS
Payment Card Industry Data Security Standard - a security standard that is mandated by credit card vendors. The Payment Card Industry Security Standards Council is responsible for updates and changes to the standard
144
COPPA
Children’s Online Privacy Protection Act - a U.S. federal law
145
NDA
Nondisclosure agreements - are signed by an employee at the time of hiring, and they impose a contractual obligation on employees to maintain the confidentiality of information. Disclosure of information can lead to legal ramifications and penalties. NDAs cannot ensure a decrease in security breaches
146
SSAE
Standard for Attestation Engagements
147
MSA
master services agreement - establishes a business relationship under which additional work orders or other documentation describe the actual work that is done
148
TCP
Transmission Control Protocol - connection based protocol, slower but more reliable than UDP
149
UDP
User Datagram Protocol - connectionless protocol, faster than TCP, less reliable
150
IMAP4
Internet Message Access Protocol version 4
151
POP3
Post Office Protocol version 3
152
HTTP
Hypertext Transfer Protocol
153
HTTPS
Hypertext Transfer Protocol over SSL/TLS
154
SSL
Secure Sockets Layer
155
TLS
Transport Layer Security
156
DNS
Domain Name System
157
DNSSEC
Domain Name System Security Extensions
158
SMTP
Simple Mail Transfer Protocol
159
RC4
Rivest Cipher version 4
160
WEP
Wired Equivalent Privacy
161
WPA
Wi-fi Protected Access
162
WPA2
Wi-Fi Protected Access 2
163
AES
Advanced Encryption Standard
164
CCMP
Counter Mode/CBC-MAC Protocol - uses a 128-bit key, 128-bit block size, 48-bit initialization vectors
165
WPA3
Wi-Fi Protected Access Version 3
166
WPS
Wi-Fi Protected Setup
167
EAP
Extensible Authentication Protocol
168
EAP-TLS
Extensible Authentication Protocol Transport Layer Security
169
EAP-TTLS
Extensible Authentication Protocol Tunneled Transport Layer Security
170
PEAP
Protected Extensible Authentication Protocol
171
LEAP
Lightweight Extensible Authentication Protocol
172
EAP-FAST
Extensible Authentication Protocol - Flexible Authentication via Secure Tunneling