Acronyms Flashcards
(330 cards)
ACL
Access Control List used for controlling permissions to a computer system or computer network. They are used to filter traffic in and out of a specific device.
AAA
Authentication, Authorization, and
Accounting
Authentication
As the first process, authentication provides a way of identifying a user, typically by having them enter a valid username and password before access is granted. Other user authentication processes can be used instead, such as biometrics or a smart card.
Authorization
Following authentication, the user must be authorized to perform certain tasks. After logging in to a system, for instance, they might try to issue commands. The authorization process determines whether the user has the authority to issue such commands. Simply put, authorization is the process of enforcing policies by determining what types or qualities of activities, resources or services the user is permitted. Authorization and user authentication work together in the AAA model; the user is authenticated first, and only then can they be authorized for different types of access or activity.
Accounting
Accounting measures the resources the user consumes during access. This can include the amount of system time or amount of data the user has sent and received during a session. Accounting logs session statistics and usage information and is used for authorization control, billing, trend analysis, resource utilization and capacity planning activities.
AES
Advanced Encryption Standard
AES-256
Advanced Encryption Standard (AES) 256 is a virtually impenetrable symmetric encryption algorithm that uses a 256-bit key to convert your plain text or data into a cipher.
AH
Authentication Header
An Authentication Header (AH) is a security protocol in IPSec that ensures the integrity of packet headers and data, provides user authentication, and offers optional replay protection and access protection. It does not encrypt any part of the packets
AI
Artificial Intelligence
refers to the capability of computational systems to perform tasks typically associated with human intelligence, such as learning, reasoning, problem-solving, perception, and decision-making.
AIS
Automated Indicator Sharing
(AIS) is a service the Cybersecurity and Infrastructure Security Agency (CISA) provides to enable real-time exchange of machine-readable cyber threat indicators and defensive measures between public and private-sector organizations
ALE
Annualized Loss Expectancy
ALE is a quantitative metric used to estimate the financial impact of a potential security investment over a particular period of time. This formula assesses and prioritizes security risks by providing a monetary value that represents the expected annual cost of specific security incidents.
AP
Access Point
A wireless access point (WAP) is a networking device that allows wireless-capable devices to connect to a wired network.
API
Application Programming Interface
An API is a set of rules or protocols that enables software applications to communicate with each other to exchange data, features and functionality.
APT
Advanced persistent threat
is a stealthy threat actor, typically a state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.[1][2] In recent times, the term may also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals
ARO
Annualized Rate of Occurrence
the frequency with which a loss event is expected to occur over a given period. The ARO is calculated by estimating the likelihood of a threat exploiting a vulnerability and causing a loss event.
ARP
Address Resolution Protocol
protocol or procedure that connects an ever-changing Internet Protocol (IP) address to a fixed physical machine address, also known as a media access control (MAC) address, in a local-area network (LAN).
ASLR
Address Space Layout Randomization
a memory-protection process for operating systems (OSes) that guards against buffer-overflow attacks by randomizing the location where system executables are loaded into memory.
ATT&CK
Adversarial Tactics, Techniques, and
Common Knowledge
MITRE ATT&CK a curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary’s attack lifecycle and the platforms they are known to target.
AUP
Acceptable Use Policy
An acceptable use policy is a set of rules applied by the owner, creator, possessor or administrator of a computer network, website, or service that restricts the ways in which the network, website or system may be used and sets guidelines as to how it should be used.
AV
Antivirus
software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name.
BASH
Bourne Again Shell
computing, Bash (short for “Bourne Again SHell is an interactive command interpreter and command programming language developed for UNIX-like operating systems.
BCP
Business Continuity Planning
establishing safeguards to protect the integrity of your data
It’s a multifaceted process that involves five stages:
1 Risk Analysis and Impact Assessment.
2 Strategy Design.
3 Implementation.
4 Testing and Validation.
5 Maintenance and Review.
BGP
Border Gateway Protocol
a gateway protocol that enables the internet to exchange routing information between autonomous systems (AS). As networks interact with each other, they need a way to communicate. This is accomplished through peering. BGP makes peering possible.
BIA
Business Impact Analysis
evaluates the potential risks and consequences of a breach.
BIOS
Basic Input/Output System
In computing, BIOS is a type of firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the booting process. The firmware comes pre-installed on the computer’s motherboard.
BPA
Business Partners Agreement
legal agreements between partners. This is a legal agreement that outlines the terms, conditions, and expectations between the partners.
BPDU
Bridge Protocol Data Unit
A spanning tree protocol (STP) message unit that describes the attributes of a switch port such as its MAC address, priority and cost to reach. BPDUs enable switches that participate in a spanning tree protocol to gather information about each other.