Comprehensive guide Flashcards
Acronym
Definition
AAA
Authentication
ACL
Access Control List - A router has an ACL that allows only specific IP addresses to access certain network resources.
AES
Advanced Encryption Standard - AES is used to encrypt sensitive data stored in cloud services.
CIA
Confidentiality
DLP
Data Loss Prevention - A DLP system detects and prevents the transfer of sensitive data outside the organization.
IDS
Intrusion Detection System - An IDS monitors network traffic for suspicious activities and alerts administrators.
IPS
Intrusion Prevention System - An IPS can block malicious traffic in real time
MFA
Multi-Factor Authentication - A user logs into an account using a password and a one-time code sent to their phone.
PKI
Public Key Infrastructure - PKI is used to issue digital certificates that validate user identities.
VPN
Virtual Private Network - Employees use a VPN to securely connect to the company’s internal network from remote locations.
SIEM
Security Information and Event Management - SIEM systems aggregate and analyze log data to detect security incidents.
SSO
Single Sign-On - With SSO
RADIUS
Remote Authentication Dial-In User Service - RADIUS is used to manage access for remote users connecting to a network.
TACACS+
Terminal Access Controller Access-Control System Plus - TACACS+ provides centralized authentication for network devices.
TLS
Transport Layer Security - TLS encrypts data transmitted over the internet
SSL
Secure Sockets Layer - SSL certificates secure web traffic between a user’s browser and a web server.
WAF
Web Application Firewall - A WAF protects web applications from common attacks like SQL injection.
BYOD
Bring Your Own Device - A BYOD policy allows employees to use personal devices for work purposes.
NIDS
Network Intrusion Detection System - NIDS monitors network traffic and alerts on suspicious behavior.
NIPS
Network Intrusion Prevention System - NIPS actively blocks potentially harmful traffic on the network.
SOC
Security Operations Center - A SOC monitors and analyzes security events in real-time to respond to incidents.
FIM
File Integrity Monitoring - FIM detects unauthorized changes to files and alerts administrators.
RPO
Recovery Point Objective - A business aims for an RPO of one hour