Acronyms F-L Flashcards

(37 cards)

1
Q

FAR

A

False Acceptance Rate

Metric used to measure the likelihood of granting access to an unauthorized user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FDE

A

Full Disk Encryption

Security technique that encrypts all data stored on a disk or storage device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FISMA

A

Develop, document, and implement an agency-wide program for information security

Covers information and systems that support the operations and assets of the agency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FRR

A

False Rejection Rate

Metric used to measure the likelihood of denying access to an authorized user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FTP

A

File Transfer Protocol

A protocol used to transfer files between computers over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

GDPR

A

Data protection and privacy for individuals within the EU and EEA

Regulation that came into effect on May 25, 2018.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

GPS

A

Global Positioning System

A system of satellites used to determine the location of a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

GRE

A

Generic Routing Encapsulation

A protocol used to encapsulate one type of packet within another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

GBAC

A

Group Based Access Control

Gives access to a group of individuals to the resources they need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HMAC

A

Hash-based Message Authentication Code

A cryptographic authentication technique that uses a hash function and a secret key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HIDS

A

Host Intrusion Detection System

Represents an application monitoring a computer or network for suspicious activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HIPAA

A

Health Insurance Portability And Accountability Act

Federal law enacted in 1996 to protect the privacy and security of patients’ personal health information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HOTP

A

HMAC-based One-Time Password

Algorithm used to generate one-time passwords for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HSM

A

Hardware Security Module

Specialized hardware device designed to securely store and manage digital keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HSTS

A

HTTP Strict Transport Security

Web security policy mechanism used to protect against protocol downgrade attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HTML

A

Hypertext Markup Language

The standard markup language for creating web pages.

17
Q

HTTP

A

Hypertext Transfer Protocol

Foundation of the World Wide Web used to load webpages.

18
Q

HTTPS

A

Secure version of HTTP

Uses encryption to protect data in transit.

19
Q

IaaS

A

Infrastructure as a Service

A cloud computing model providing infrastructure resources by a third-party provider.

20
Q

IAM

A

Identity and Access Management

Cybersecurity practice that restricts access to organizational resources.

21
Q

ICMP

A

Internet Control Message Protocol

Network layer protocol used to diagnose network communication issues.

22
Q

IDS

A

Intrusion Detection System

Monitoring system that detects suspicious activities and generates alerts.

23
Q

IPS

A

Intrusion Prevention System

Network security technology that actively prevents identified threats.

24
Q

IEEE

A

Institute of Electrical and Electronics Engineers

The world’s largest technical professional society.

25
IKE
Internet Key Exchange ## Footnote Standard protocol used to set up a secure communication channel via VPN.
26
IMAP
Internet Message Access Protocol ## Footnote Protocol used by email clients to retrieve email messages from a mail server.
27
IoT
Internet Of Things Devices ## Footnote Physical devices connected to the internet that can exchange data.
28
IP
Internet Protocol ## Footnote Protocol for routing and addressing packets of data across networks.
29
IPv4
Internet Protocol version 4 ## Footnote A 32-bit address usually represented in dotted decimal notation.
30
What does IPv6 provide?
Larger address space for the internet ## Footnote Uses 128-bit addresses, allowing for an almost unlimited number of unique addresses.
31
ISA
Interconnection Security Agreement ## Footnote Document regulating security aspects of a connection between an agency and an external system.
32
ISO
International Organization for Standardization ## Footnote An international standard-setting organization.
33
ISP
Internet Service Provider ## Footnote A company that provides Internet access to customers.
34
JSON
JavaScript Object Notation ## Footnote A lightweight data interchange format.
35
LDAP
Lightweight Directory Access Protocol ## Footnote Protocol for locating data about organizations, individuals, and resources in a network.
36
LEAP
Lightweight Extensible Authentication Protocol ## Footnote A network authentication mechanism for validating users' identity for Wi-Fi access.
37
HSM
Hardware Security Module - a specialized physical device designed to securely generate, store, and manage cryptographic keys used for encryption and decryption