Acronyms + Description Flashcards
(323 cards)
3DES
Triple Digital Encryption Standard
Symmetric block cipher encrypts 64-bit blocks
A/A
Active/Active
A type of server load balancing where all the servers are active simultaneously. If one server fails, all others can pick up the load.
AAA
Authentication, Authorization, Accounting
- Authentication has 2 components: Identification (Username or email address) and the authentication factor (Something you know, Something you have, Something you are, Somewhere you are or are not, Something you do)
- Authorization: the rights and privileges assigned to a user to be able to perform their job.
- Accounting or Auditing: Accounting is the process of recording system activities and resource access. Auditing is part of accounting where an administrator examines logs of what was recorded.
ABAC
Attribute-based Access Control:
Access control based on different attributes: group membership, OS being used, IP address, the presence of up-to-date patches and anti-malware, geographic location. Typically used in an SDN (Software Defined Network).
ACE
Access Control Entry
Within an ACL, a record of subjects and the permissions they hold on the resource
ACI
Adjacent Channel Interference
If access points are physically close, then they should not share frequencies, otherwise they channels may interfere with each other.
ACL
Access Control List:
A list of objects and what subjects can access them. For example; A user accesses a directory but only has read access to the documents inside.
Routers and firewalls both employ ACLs, either allowing or denying access to different parts of the network.
ADS
Alternate Data Streams
AEAD
Authenticated Encryption with Additional Data
AES
Advanced Encryption Standard:
A symmetric block cipher. Three different block sizes; 128, 192, & 256 bit. Used in BitLocker
AES256
Advanced Encryption Standards 256-bit
AFF
Advanced Forensic Format
AH
Authentication Header:
An IPSec protocol that provides authentication as well as integrity & protection from replay attacks. Uses protocol # 51.
Authentication Header:
An IPSec protocol that provides authentication as well as integrity & protection from replay attacks. Uses protocol # 51.
Artificial Intelligence
AIS
Automated Indicator Sharing
Threat intelligence data feed operated by the DHS
ALE
Annual Loss Expectancy:
The amount of money an organization would lose over the course of a year. The formula is the SLE (Single Loss Expectancy) times the ARO (Annual Rate of Occurrence). SLE x ARO = ALE.
ANN
Artificial Neural Network
AP
Access Point:
Sometimes referred to as a WAP (Wireless Access Point). An AP is a bridge between wireless and wired networks.
A/P
Active/Passive
A type of server load balancer configuration where some of the servers are actively in use and others are on “standby” mode.
API
Application Programming Interface
A software module or component that identifies inputs and outputs for an application
APT
Advanced Persistent Threat:
An attack that uses multiple attack vectors, attempt to remain hidden as to maintain a connection to compromised systems. You can normally tie this to nation-states (foreign countries)
ARO
Annual Rate of Occurrence:
The number of times a year that a particular loss occurs. It is used to measure risk with ALE and SLE in a quantitative risk assessment.
ARP
Address Resolution Protocol:
Matches the MAC address to a known IP address. Easily spoofed, used in MITM (Man-in-the-Middle) attack.
ASLR
Address Space Layout Randomization
(ASLR) is a memory-protection process for operating systems (OSes) that guards against buffer-overflow attacks by randomizing the location where system executables are loaded into memory