Acronyms Flashcards

(98 cards)

1
Q

PFI

A

payment card industry forensic investigators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FISMA

A

federal information security modernization act, for federally employed/contracted infosec workers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

GLBA

A

Gramm Leach Bliley Act, US federal law for financial information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

GDPR

A

general data protection regulation, EU security and privacy requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FERPA

A

family educational rights and privacy act, security/privacy requirements for US student records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SOX

A

sarbanes oxley act, US federal law for corporate financial reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

STIX

A

structured threat information eXpression, XML language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TAXII

A

trusted automated exchange of intelligence information protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OASIS

A

organization for the advancement of structured information standards, manages STIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NPSA

A

national protective security agency, UK security agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SCAP

A

security content automation protocol, NIST standardized approach for communicating security related information i.e. CVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CCE

A

common configuration enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CPE

A

common platform enumeration i.e. hardware, software, OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CVE

A

common vulnerabilities and exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CVSS

A

common vulnerability scoring system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

XCCDF

A

extensible configuration checklist description format, defines security checklists, benchmarks, and configuration rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

OVAL

A

open vulnerability and assessment language, specifies low level testing procedures used by checklists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

COBIT

A

control objectives for information and related technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ISACA

A

information systems audit and control association, organization that developed COBIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SSAE

A

statement on standards for attestation engagements, standards for audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ROT13

A

rotate 13 substitution cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SHS

A

secure hash standard aka FIPS 180

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

FIPS

A

federal information processing standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

HMAC

A

hash based authentication code, algorithm for partial digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
DER
distinguished encoding rules, binary format for certificates stored in .der .crt or .cer
26
PEM
privacy enhanced mail, binary format for certificates stored in .pem or .crt
27
PFX
personal information exchange, windows binary certificate format stored in .pfx or .p12
28
P7B
windows certificates stored in ASCII
29
EAP
extensible authentication protocol, commonly used for wireless networks
30
802.1X
IEEE standard for NAC used for authenticating devices trying to connect to a network
31
RADIUS
remote authentication dial in user service, AAA system that can operate in TCP or UDP and uses md5 hash for sending passwords
32
TACACS+
terminal access controller access control system plus, uses TCP traffic to provide AAA services and full packet encryption
33
LDAP
lightweight directory access protocol, used for IAM to make directories of contact information
34
SAML
security assertion markup language, xml standard for exchanging authentication/authorization information
35
FIDO
fast identity online, protocol used for passwordless authentication
36
PAM
privileged access management
37
FRR
false rejection rate
38
FAR
false acceptance rate
39
ROC
receiver operating characteristic
40
JIT
just in time, permissions granted and revoked as needed
41
PDU
power distribution unit, provides power management remotely for server racks and other environments
42
SAN
storage area network
43
NAS
network attached storage
44
CSA
cloud security alliance
45
CCM
cloud controls matrix
46
YAML
YAML ain't markup language, human readable format for data like configuration files
47
SWG
secure web gateways, monitor rules to block/allow traffic
48
CASB
cloud access security broker, software tools that are intermediaries between users and service providers. Can be inline or API based.
49
SCT
security compliance toolkit, microsoft tools that work with Windows security baseline
50
SED
self encrypting drive
51
SCADA
supervisory control and data acquisition, large systems that run power and water distribution
52
ICS
industrial controls system, industrial automation
53
RTU
remote telemetry units, collect data from sensors and programmable logic controllers
54
PLC
programmable logic controller, control and collect data from industrial devices
55
MPLS
multiprotocol label switching, uses data labels rather than network addresses to establish paths between endpoints
56
SASE
secure access service edge, combines multiple security tools into one cloud service such as vpns, SDWAN, firewalls, SWGs, zero trust networks
57
CAM
content addressable memory, used to lookup data by content rather than addresses used by switches and routers
58
MAC
media access control, unique identifier assigned to a network access card
59
STP
spanning tree protocol, prevents loops in ethernet networks
60
BPDU
bridge protocol data unit guard, protects STP by preventing ports that shouldn't send BPDUs from sending them
61
DHCP
dynamic host configuration protocol, assigns IPs and other network configuration settings to devices on a network
62
DKIM
DomainKeys Identified Mail, signs messages with a private key to verify sender identity
63
SPF
sender policy framework, specifies which email servers can be used for a domain
64
DMARC
domain based message authentication reporting and conformance, uses SPF and DKIM to determine if an email is authentic
65
ICMP
internet control message protocol, network layer protocol used to send error messages and operational information between network devices
66
NAT
network address translation, assigns devices a public IP address that can be shared with other devices on the network
67
SNMP
simple network management protocol, used to monitor and manage network devices
68
MIB
management information base, stores information about network devices
69
SIP
session initiation protocol, used to initiate/terminate real time communication such as voice/video calls and IMs
70
RTP
realtime transport protocol, delivers audio and video over IP networks in real time
71
NTP
network time protocol, synchronizes clocks on devices across a network
72
BGP
border gateway protocol, manages how packets are routed across the internet by exchanging routing information between networks
73
S/MIME
secure/multipurpose internet mail extensions, provides the ability to encrypt and sign MIME data for email attachments. Requires a certificate to send and receive.
74
IPSec
internet protocol security, includes AH and ESP
75
AH
authentication header, authenticates IP packets with hashing and a shared secret key
76
ESP
encapsulating security protocol, provides integrity and authentication for packets
77
SSP
security simple pairing, bluetooth pairing method wherein a device generates a number which must be confirmed on the other device
78
SAE
simultaneous authentication of equals, password authentication paired with shared secret key exchange
79
CCMP
counter mode with cipher block chaining message authentication protocol, encryption used in WPA2
80
UEM
unified endpoint management for mobile, IoT, desktop devices and more
81
MAM
mobile application management
82
MMS
multimedia messaging service
83
Netflow
cisco protocol that monitors network traffic and captures metadata
84
EXIF
exchangeable image file format, photo metadata
85
RCA
root cause analysis
86
EDRM
electronic discovery reference model, nine stage model describing the discovery process for digital forensics
87
CFReDS
computer forensic data sets by NIST used for testing, evaluating, training
88
MSA
master service agreements, umbrella contract between a vendor and organization
89
SLA
service level agreement, written contract specifying conditions of service provided and remediations if expectations aren't met
90
MOU
memorandum of understanding, informal letter documenting aspects of a business relationship
91
MOA
memorandum of agreement, formal document outlining terms and details of an agreement between parties
92
BPA
business partners agreements, specifies responsibilities and profit shares of a partnership
93
CBT
computer based training in relation to cybersecurity for employees
94
ERM
enterprise risk management
95
KRI
key risk indicator
96
BIA (2 meanings)
bluetooth impersonation attack, business impact analysis
97
MTBTF
mean time between failures
98
MTTR
mean time to repair