Acronyms M-R Flashcards

(41 cards)

1
Q

MAC

A

Media Access Control

A unique identifier assigned to a network interface controller (NIC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Mandatory Access Control (MAC)?

A

Limiting access to resources based on the sensitivity of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MCSP

A

Managed Cloud Service Provider

Provides managed cloud services to customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MFA

A

Multi-Factor Authentication. A security feature that requires multiple forms of authentication to access a resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MITB

A

Man In The Browser

An attack that injects malicious software into a victim’s web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MITM

A

Man-in-the-Middle. A type of cyber attack where an attacker intercepts communications between two parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MSSP

A

Managed Security Service Provider

Provides managed security services to customers, typically on a subscription basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MTBF

A

Mean Time Between Failures. Average amount of time between system failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MTTD

A

Mean Time To Detect

Average time it takes to detect a security incident or breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MTTR

A

Mean Time To Repair

Average time that it takes to fix a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NAC

A

Network Access Control. A system used to control access to a network based on the identity of the user or device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NAT

A

Network Address Translation. A technique used to map private IP addresses to public IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NDA

A

Non Disclosure Agreement

A contract that prevents any side from disclosing secrets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NFC

A

Near Field Communication. Short-range wireless communication technology for data exchange between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NIDS

A

Network Intrusion Detection System

A system used to detect unauthorized activity on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NIPS

A

Network Intrusion Prevention System

A security system that detects and prevents unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

NIST

A

National Institute of Standards and Technology. A U.S. government agency that develops standards for technology and engineering.

18
Q

NGFW

A

Next-Generation Firewall. A security appliance that processes network traffic and applies rules to block dangerous traffic.

19
Q

NTFS

A

New Technology File System

A file system used in Windows operating systems.

20
Q

OAuth

A

Open Authorization . An open standard protocol for authorization and authentication between applications.

21
Q

OCSP

A

Online Certificate Status Protocol

A protocol used to check the validity of a digital certificate.

22
Q

OSI model

A

A conceptual framework used to standardize and describe communication functions.

23
Q

PaaS

A

Platform as a Service

A cloud computing model offering a platform for developing applications.

24
Q

PAM

A

Privileged Access Management. A security solution that helps manage access to privileged accounts.

25
PCI DSS
Payment Card Industry Data Security Standard ## Footnote A set of security standards for protecting credit card data.
26
PEAP
Protected Extensible Authentication Protocol. A security protocol used to protect wireless networks.
27
PGP
Pretty Good Privacy ## Footnote An encryption program for cryptographic privacy and authentication.
28
PMF
Protected Management Frames. A security feature used in Wi-Fi networks to protect against attacks.
29
POP3
Post Office Protocol version 3 ## Footnote A protocol used to retrieve email messages from a mail server.
30
PPP
Point-to-Point Protocol. A protocol used to establish a direct connection between two devices.
31
RAID
Redundant Array of Inexpensive Disks. A technique used to increase reliability and performance of data storage.
32
RADIUS
Remote Authentication Dial-In User Service ## Footnote A protocol for centralized authentication, authorization, and accounting.
33
RAM
Random Access Memory. Computer's short-term memory for currently used data.
34
RAT
Remote Access Trojan ## Footnote A type of malware that allows remote control of a victim's computer.
35
RDP
Remote Desktop Protocol. A protocol used to remotely access and control a desktop computer.
36
REST
Representational State Transfer. A software architectural style that describes web architecture.
37
RFID
Radio Frequency Identification ## Footnote A technology for tracking and identifying objects using radio waves.
38
RIPEMD
RACE Integrity Primitives Evaluation Message Digest ## Footnote A cryptographic hash function.
39
RTO
Recovery Time Objective ## Footnote The maximum time to recover data after a disaster.
40
RTOS
Real Time Operating System. An operating system commonly found in Internet of Things devices.
41
RBAC
Rule Based Access Control ## Footnote High level rules that determine access to resources.