Cyber Security Flashcards
(135 cards)
SOC
Security Operations Center (SOC)
- centralized unit that monitors and manages an organization’s security posture on a 24/7 basis
NIPS
Network Intrusion Prevention System (NIPS)
- monitors network traffic for suspicious activity and can take automated actions to block or prevent potential threats
WAF
Web Application Firewall (WAF) with DDoS protection
- specifically designed to mitigate and block DDoS attacks by filtering and monitoring incoming traffic to a web application.
PKI
Public Key Infrastructure (PKI)
- involves the use of asymmetric cryptography to provide secure communication and authentication, each device is assigned a unique key pair consisting of a public key and a private key
IDS
Intrusion Detection System (IDS)
- designed to monitor network traffic for suspicious activities or patterns that may indicate unauthorized access, malware infections, or other security threats
ACL
Access Control Lists (ACLs)
- used to control access to network resources by specifying which users of systems are allowed or denied access to specific resources
TPM
Trusted Platform Module (TPM)
- dedicated microcontroller designed to secure hardware by integrated cryptographic keys into devices
SAN Certificate
Subject Alternative Name (SAN) Certificate
- can secure multiple domains and subdomains by specifying them in the certificate’s SAN field
VLAN
Virtual Local Area Network
- logical grouping of network devices that allows devices on different physical LANs to communicate as if they were on the same physical LAN
RSA
Rivest, Shamir, & Adleman
- an asymmetric algorithm used primarily for secure data transmission and digital signature
HMAC
Hash-based Message Authentication Code (HMAC)
- used to verify the integrity and authenticity of a message, requires a shared secret key but does not provide a method for establishing or agreeing upon that key
AES
Advanced Encryption Standard (AES)
- a symmetric encryption algorithm used to encrypt data
TLS
Transport Layer Security (TLS)
- security protocol that protects data and privacy when communicating over the internet
SSL
Secure Socket Layer (SSL)
- standard technology for securing an internet connection by encrypting data sent between a website and a browser (or between two servers)
CRL
Certificate Revocation List (CRL)
- list of digital corticates that have been revoked by the CA (Certificate Authority) before their expiration date
CSRF
Cross-Site Request Forgery (CSRF)
- web-based attack where an attacker tricks a user into performing actions on a web application without their consent
APT
Advanced Persistent Threat (APT)
- highly skilled, well-resourced, and persistent attackers, often associated with state-sponsored groups, that focus on long-term espionage or sabotage
ARP
Address Resolution Protocol (ARP)
- protocol or procedure that connects an ever-changing Internet Protocol (IP) address to a fixed physical machine address, also known as a media access control (MAC) address, in a local-area network (LAN)
WEP
Wired Equivalent Privacy (WEP)
- an outdated encryption standard known to have significant vulnerabilities that can be easily compromised
WPA
Wi-Fi Protected Access (WPA)
- a security standard for wireless networks that protects data transmitted between devices and the internet
PSK
Pre-Shared Key (PSK)
- a complex string of characters that is used to authenticate users on a network and secure wireless communication
AES
Advanced Encryption Standard (AES)
- a symmetric block cipher chosen by the U.S. government to protect classified information
NTLM
New Technology LAN Manager
- suite of Microsoft security protocols intended to provide authentication, integrity, and confidentiality to users
TOC
Time-of-check (TOC)
- refers to the moment when a system checks the state of a resources