Acronyms "N, O, P" Flashcards

(61 cards)

1
Q

NAC

A

Network Access Control

  • Provides visibility, access control, and compliance
  • Can define and implement strict access management controls for networks
  • Centralized solution to end-point security
  • Uses IEEE 802.1X standard
  • Usually works with TACACS or RADIUS to verify authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NAS

A

Network Attached Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NAT

A

Network Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NDA

A

Non-Disclosure Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NFC

A

Near-Field Communications

  • Used for mobile payments, key cards, smart cards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NFV

A

Network Functions Virtualization

  • Virtualizes entire classes of network node functions into building blocks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NGFW

A

Next-Generation Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NG-SWG

A

Next-Generation Secure Web Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NIC

A

Network Interface Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NIDS

A

Network Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NIPS

A

Network Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NIST

A

National Institute of Standards & Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NOC

A

Network Operations Center

  • Ensures that an organization’s IT infrastructure continues to function properly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NTFS

A

New Technology File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NTLM

A

New Technology Lan Manager

  • Replaced by Kerberos
  • Used to authenticate user identity and protect the integrity and confidentiality of their activity
  • SSO tool
  • Relies on a challenge-response protocol to confirm the user without requiring them to submit a password
  • NTLM has known vulnerabilities and is typically only still used for legacy clients and server
  • NTLM relies on a three-way handshake between the client and server to authenticate a user, while Kerberos uses a two-part process that leverages a ticket granting service or key distribution center (KDC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OAUTH

A

Open Authentication

  • Token-based authentication
  • Lets organizations share info across third-party services without exposing their users’ usernames/passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

NTP

A

Network Time Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

OCSP

A

Online Certificate Status Protocol

  • Used by CAs to check the revocation status of an X.509 digital certificate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

OID

A

Object Identifier

  • Standard for naming any object, concept, or thing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

OS

A

Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

OSI

A

Open Systems Interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

OSPF

A

Open Shortest Path First

  • Distributes routing information between routers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

OSINT

A

Open Source Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

OT

A

Operational Technology

  • Hardware/software that detects or causes a change by directly monitoring and/or controlling industrial equipment, assets, processes, and events
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
OTG
On-The-Go
26
OTA
Over-The-Air - Pushing updates for software, configuration settings, or even encryption keys, on remote devices
27
OVAL
Open Vulnerable Assessment Language - Community standard to promote open and publicly available security content, and to standardize the transfer of this information
28
OWASP
Open Web Application Security Project
29
P12
PKCS#12 - Archive file format for storing cryptography objects as a single file - Used to bundle a private key with its X.509 certificate, or to bundle the members of a chain of trust - Think of it as a container for X.509 public key certs, private keys, CRLs, and generic data
30
P2P
Peer-to-Peer
31
PaaS
Platform as a Service
32
PAC
Proxy Auto Configuration - Used to define how web browsers and other user agents can automatically choose the appropriate proxy server for fetching URLs - Contains a JavaScript function that returns a string with one or more access method specifications
33
PAM
Privileged Access Management - Safeguarding identities with special access or admin capabilities
34
PAM (Authentication)
Pluggable Authentication Modules - Used to separate the tasks of authentication from applications - Apps can call PAM libraries to check permissions
35
PAP
Password Authentication Protocol - Two-way handshake to provide the peer system with a simple method to establish its identity
36
PAT
Port Address Translation
37
PBKDF2
Password-based Key Derivation Function 2 - Key derivation functions with a sliding computation cost, which is used to reduce vulnerabilities of brute-force attacks - Applies a pseudorandom function (like HMAC) to the input password along with a salt value, and repeats this process multiple times to produce a derived key - Derived key can then be used as a cryptographic key
38
PCI DSS
Payment Card Industry Data Security Standard - Security standards to use when accepting, processing, storing, or transmitting credit card information
39
PDU
Power Distribution Unit - Provides multiple electric power outputs
40
PE
Portable Executable
41
PEAP
Protected Extensible Authentication Protocol - Provides a method to transport securely authenticated data including legacy password-based protocols, via 802.11 wifi - Uses tunneling between PEAP clients and an auth server
42
PED
Portable Electronic Device - Devices like phones, laptops, pagers, radios, etc..
43
PEM
Privacy Enhanced Mail - File format for storing and sending cryptographic keys, certificates, and other data - For example, when using SSH, you will often use a .pem file - Encodes the binary data using base64 - Starts with `-----BEGIN` a label and then `-----`
44
PFS
Perfect Forward Secrecy - Feature of specific key agreement protocols that give assurances that session keys will not be compromised, even if long-term secrets used in the session key exchange are compromised - ie: for HTTPS, the long-term secret is usually the private key of the server
45
PGP
Pretty Good Privacy - Encryption program used to provide cryptographic privacy and authentication for data communication - Useful for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions
46
PHI
Personal Health Information
47
PII
Personally Identifiable Information
48
PIN
Personal Identification Number
49
PIV
Personal Identity Verification - MFA on a smartcard - Used for identity proofing
50
PKCS
Public Key Cryptography Standards - Group of standards for public keys
51
PKI
Public Key Infrastructure - Roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption
52
POP
Post Office Protocol - Most commonly used message request protocol for transferring messages from e-mail servers to e-mail clients
53
PoC
Proof of Concept
54
POTS
Plain Old Telephone Service
55
PPP
Point-to-Point Protocol - Communication between two routers directly without any hosts or other networks in between - Data Link Layer
56
PPTP
Point-to-Point Tunneling Protocol - Obsolete method of implementing virtual private networks - Port 1723
57
PSK
Pre-Shared Key - Shared secrets sent using a secure channel before it needs to be used
58
PTZ
Pan-Tilt-Zoom - Camera that can be remotely controlled, including zoom and directional control
59
PUP
Potentially Unwanted Program
60
PBX
Private Branch Exchange - Telephone system that switches calls between users on local line - Multiline telephone system
61
PCAP
Packet Capture - Collects and records packet data from a network which can then be analyzed