Cyber Security Flashcards

(135 cards)

1
Q

SOC

A

Security Operations Center (SOC)
- centralized unit that monitors and manages an organization’s security posture on a 24/7 basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NIPS

A

Network Intrusion Prevention System (NIPS)
- monitors network traffic for suspicious activity and can take automated actions to block or prevent potential threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WAF

A

Web Application Firewall (WAF) with DDoS protection
- specifically designed to mitigate and block DDoS attacks by filtering and monitoring incoming traffic to a web application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PKI

A

Public Key Infrastructure (PKI)
- involves the use of asymmetric cryptography to provide secure communication and authentication, each device is assigned a unique key pair consisting of a public key and a private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IDS

A

Intrusion Detection System (IDS)
- designed to monitor network traffic for suspicious activities or patterns that may indicate unauthorized access, malware infections, or other security threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ACL

A

Access Control Lists (ACLs)
- used to control access to network resources by specifying which users of systems are allowed or denied access to specific resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TPM

A

Trusted Platform Module (TPM)
- dedicated microcontroller designed to secure hardware by integrated cryptographic keys into devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SAN Certificate

A

Subject Alternative Name (SAN) Certificate
- can secure multiple domains and subdomains by specifying them in the certificate’s SAN field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

VLAN

A

Virtual Local Area Network
- logical grouping of network devices that allows devices on different physical LANs to communicate as if they were on the same physical LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RSA

A

Rivest, Shamir, & Adleman
- an asymmetric algorithm used primarily for secure data transmission and digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HMAC

A

Hash-based Message Authentication Code (HMAC)
- used to verify the integrity and authenticity of a message, requires a shared secret key but does not provide a method for establishing or agreeing upon that key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AES

A

Advanced Encryption Standard (AES)
- a symmetric encryption algorithm used to encrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TLS

A

Transport Layer Security (TLS)
- security protocol that protects data and privacy when communicating over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SSL

A

Secure Socket Layer (SSL)
- standard technology for securing an internet connection by encrypting data sent between a website and a browser (or between two servers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CRL

A

Certificate Revocation List (CRL)
- list of digital corticates that have been revoked by the CA (Certificate Authority) before their expiration date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CSRF

A

Cross-Site Request Forgery (CSRF)
- web-based attack where an attacker tricks a user into performing actions on a web application without their consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

APT

A

Advanced Persistent Threat (APT)
- highly skilled, well-resourced, and persistent attackers, often associated with state-sponsored groups, that focus on long-term espionage or sabotage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ARP

A

Address Resolution Protocol (ARP)
- protocol or procedure that connects an ever-changing Internet Protocol (IP) address to a fixed physical machine address, also known as a media access control (MAC) address, in a local-area network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

WEP

A

Wired Equivalent Privacy (WEP)
- an outdated encryption standard known to have significant vulnerabilities that can be easily compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

WPA

A

Wi-Fi Protected Access (WPA)
- a security standard for wireless networks that protects data transmitted between devices and the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

PSK

A

Pre-Shared Key (PSK)
- a complex string of characters that is used to authenticate users on a network and secure wireless communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AES

A

Advanced Encryption Standard (AES)
- a symmetric block cipher chosen by the U.S. government to protect classified information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

NTLM

A

New Technology LAN Manager
- suite of Microsoft security protocols intended to provide authentication, integrity, and confidentiality to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

TOC

A

Time-of-check (TOC)
- refers to the moment when a system checks the state of a resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
TOU
Time-of-use (TOU) - refers to the moment when a system uses a resource after it has been checked
25
SSH
Secure Shell (SSH) - a network protocol that allows secure communication between devices over an unsecured network
26
HIPS
Host-based Intrusion Prevention System (HIPS) - a security software that monitors and prevents malicious activity on a device
27
CVE
Common Vulnerability and Exposure (CVE) - a system that identifies and tracks publicly known cybersecurity vulnerabilities
28
EDR
Endpoint Detection and Response (EDR) - focuses on identifying and addressing security threats at the endpoint level, such as laptops, desktops, and mobile devices
29
RAT
Remote Access Trojan (RAT) - re malware designed to allow an attacker to remotely control an infected computer
30
SCADA
Supervisory Control and Data Acquisition (SCADA) - provide centralized control, data acquisition, and real-time monitoring of industrial processes
31
RTO
Recovery Time Objective (RTO) - the maximum amount of time an organization can tolerate for restoring its systems, applications, and data after a cyber incident
32
AAA
Authentication, Authorization, and Accounting (AAA)
33
AES-256
Advanced Encryption Standards 256-bits (AES-256)
34
AH
Authentication Header (AH) - an IPSec header used to verify that the contents of a packet have not been modified while the packet was in transit
35
AIS
Automated Indicator Sharing (AIS) - program enables organizations to share and receive machine-readable cyber threat indicators (CTIs) and defensive measures (DMs) in real-time for use in monitoring and defending their networks against known threats that are relevant to AIS participants
36
ALE
Annualized Loss Expectancy (ALE) - the total loss we can expect from a risk in a one-year timeframe and is calculated by multiplying SLE (Single Loss Expectancy) by ARO (Annualized Rate Occurrence)
37
APT
Advanced Persistent Threat (APT) - a type of cyber attack that involves a prolonged, covert intrusion into a network or system
38
ARO
Annualized Rate Occurrence (ARO) - the likelihood of a risk being compromised and is calculated by dividing the estimated number of incidents by the time frame
39
ASLR
Address Space Layout Randomization (ASLR) - a technique that is used to increase the difficulty of performing a buffer overflow attack that requires the attacker to know the location of an executable in memory
40
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) - a comprehensive matrix of tactics and techniques used by cyber adversaries
41
AUP
Acceptable User Policy (AUP) - sets rules related to an organization's IT security policies
42
BASH
Bourne Again Shell (BASH) - default shell language in most server computing environments in Linux
43
BCP
Business Continuity Planning (BCP) - a proactive approach that prepares an organization to respond and recover from potential cyber threats
44
BGP
Border Gateway Protocol (BGP) - a gateway protocol that enables the internet to exchange routing information between autonomous systems (AS)
45
BIA
Business Impact Analysis (BIA) - a systematic process that helps organizations evaluate the potential impact of disruptions on their critical assets, processes, and services
46
BPA
Business Partners Agreement (BPA) - legal agreements between partners, this is a legal agreement that outlines the terms, conditions, and expectations between the partners
47
BPDU
Bridge Protocol Data Unit (BPDU) - a message that helps switches exchange information and determine the best paths for data to travel through a network.
48
BYOD
Bring Your Own Device (BYOD)
49
CAPTCHA
Completely Automated Public Turing Test To Tell Computers and Humans Apart (CAPTCHA)
50
CAR
Corrective Action Report (CAR) - a formal document used by organizations to address and rectify issues, errors, non-conformances, or deficiencies identified in processes, products, services, or systems
51
CASB
Cloud Access Security Broker (CASB) - a security solution that monitors and enforces an organization's security policies for cloud applications
52
CBC
Cipher Block Chain (CBC) - a block mode of DES that XORs the previous encrypted block of ciphertext to the next block of plaintext to be encrypted
53
CCMP
Counter Mode/CBC-MAC Protocol (CCMP) - a cryptographic protocol that uses the AES cipher to encrypt data and provide security services
54
CERT
Computer Emergency Response Team (CERT) - a group of information security experts who protect an organization's cybersecurity
55
CFB
Cipher Feedback (CFB) - a block cipher mode of operation used in encryption algorithms to encrypt and transfer plaintext values
56
CHAP
Challenge Handshake Authentication Protocol (CHAP) - an identity checking protocol that periodically re-authenticates the user during an online session
57
CIO
Chief Information Officer (CIO)
58
CIRT
Computer Incident Response Team (CIRT) - a group of experts who manage and respond to cyber security incidents and breaches
59
COOP
Continuity of Operation Planning (COOP) - a set of plans and procedures that ensure an organization can continue to perform essential functions during emergencies
60
COPE
Corporate Owned, Personally Enabled (COPE) - a business model where a company owns devices that employees can use for both business and personal purposes
61
CP
Contingency Planning (CP) - a set of procedures an organization initiates in the event of cyberattacks
62
CRC
Cyclical Redundancy Check (CRC) - a technique used for detecting errors in digital data transmission, commonly employed in network communication and data storage
63
CSO
Chief Security Officer (CSO)
64
CSP
Cloud Service Provider (CSP)
65
CSR
Certificate Signing Request (CSR) - a formal request to a Certificate Authority (CA) for a digital identity certificate, such as an SSL/TLS certificate
66
CSU
Channel Service Unit (CSU) - a hardware device that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa
67
RTOS
Real-Time Operating System (RTOS) - a specialized operating system used in critical embedded systems that requires fast, deterministic responses to events
68
PDU
Power Distribution Unit (PDU) - a device fitted with multiple outputs designed to distribute electric power, especially to racks of computers and networking equipment located within a data center
69
PEAP
Protected Extensible Authentication Protocol (PEAP) - a security protocol that protects wireless networks by encrypting authentication data during transmission, does not require client-side certificates
70
LEAP
Lightweight Extensible Authentication Protocol (LEAP) - a proprietary wireless LAN authentication method developed by Cisco Systems, considered insecure due to known vulnerabilities
71
ESP
Encapsulating Security Payload (ESP) - a member of the Internet Protocol Security (IPsec) set of protocols that encrypt and authenticate the packets of data
72
DLP
Data Loss Prevention (DLP) - the practice of detecting and preventing data breaches, exfiltration, or unwanted destruction of sensitive data
73
UTM
Unified Threat Management (UTM) - UTM devices are hardware or software that tie together network security features into one simple-to-use, easy-to-manage appliance
74
IPSec
Internet Protocol Security (IPSec) - a set of communication rules or protocols for setting up secure connections over a network
75
SHA
Secure Hashing Algorithm (SHA)
76
SASE
Secure Access Service Edge (SASE) - a cloud-based architecture that combines network and security services into a single solution
77
SD-WAN
Software-defined Wide Area Newtork (SD-WAN) - a technique for using software to make wide area networks more intelligent and flexible
78
NAC
Network Access Control (NAC) - controls and manages access to a network, ensuring that only authorized devices and users can connect
79
DMZ
Demilitarized Zone (DMZ) - also known as a screened subnet, designed to add an extra layer of security by isolating the public-facing service from the internal network
80
CVE
Common Vulnerabilities and Exposures (CVE) - a list of publicly known cybersecurity vulnerabilities that affect software, hardware, and firmware
81
IoC
Indicators of Compromise (IoC) - are clues or evidence that a network or system has been compromised or attacked
82
OSINT
Open-source Intelligence (OSINT) - a method of gathering information from public or other open sources, which can be used by security experts, national intelligence agencies, or cybercriminals
83
STIX
Structured Threat Information eXchange (STIX) - a standardized language and data model that allows organizations to share cyber threat intelligence (CTI) in a consistent and readable format
84
SAML
Security Assertion Markup Language (SAML) - is used for single sign-in (SSO) and can be used for both authentication and authorization, especially in enterprise environments
85
MAC
Mandatory Access Control (MAC) - an access control model where access rights are regulated by central authority based on a multiple levels of security, users cannot change access policies
86
DAC
Discretionary Access Control (DAC) - access to resources is determined by the resource owner
87
RBAC
Role-Based Access Control (RBAC) - a cybersecurity method that limits access to applications and networks based on a user's role and assigned permissions
88
SNMPv3
Simple Network Management Protocol version 3 (SNMPv3) - designed specifically to provide secure management and monitoring of network devices, it includes important security features such as authentication, encryption, and message integrity
89
RADIUS
Remote Authentication Dial-In User Service (RADIUS) - is used for authentication, authorization and accounting (AAA) services, particularly for network access
90
SFTP
SSH File Transfer Protocol (SFTP)
91
ABAC
Attribute-based Access Control (ABAC) - uses various attributes, such as user role, time of access, and geographic location, to determine access rights
92
CVSS
Common Vulnerability Scoring System (CVSS) - standard for assessing the severity of security vulnerabilities
93
FDE
Full Disk Encryption (FDE)
94
SPF
Sender Policy Framework (SPF) - an email authentication method designed to detect forging sender addresses during the delivery of the email, allows domain owners to specify which mail servers are permitted to send email on behalf of their domains by creating a specific SPF record in the DNS
95
DKIM
Domain Keys Identified Mail (DKIM) - provides a way to verify that an email was indeed sent and authorized by the owner of that domain, it does this by using a digital signature
96
DMARC
Domain-based Message Authentication, Reporting & Conformance (DMARC) - builds on SPF and DKIM to provide additional reporting and policy enforcement
97
EF
Exposure Factor (EF) - the percentage of an asset's value that is exposed to be lost due to a specific incident of loss event
98
CYOD
Choose Your Own Device (CYOD)
99
PAM
Privileged Access Management (PAM) - a cybersecurity strategy that helps organizations protect against cyber threats by monitoring and controlling access to critical resources
100
GPO
Group Policy Objects (GPOs) - a collection of settings that can be used to manage and configure systems, applications, and user settings in Active Directory
101
ICS
Industrial Control System (ICS) - a general term for any system used to control and manage industrial processes, including manufacturing, production and distribution
102
SE Linux
Security-enhanced Linux (SE Linux) - a security module integrated into the Linux kernel that provides mandatory access control (MAC) policies
103
MSA
Master Service Agreement (MSA) - a fundamental contract outlining the scope of the relationship between two parties, including terms and conditions for current and future activities and responsibilities
104
MOA
Memorandum of Agreement (MOA) - a written document describing a cooperative relationship between two parties wishing to work together on a project
105
MOU
Memorandum of Understanding (MOU) - a non-binding agreement that outlines the general intentions and understanding between parties
106
MTBF
Mean Time Between Failures (MTBF) - the average time between repairable failures of a technology product
107
MTTR
Mean Time To Failure (MTTF) - the average time between non-repairable failures of a technology product
108
RPO
Recovery Point Objective (RPO) - the maximum length of time permitted that data can be restored from
109
SLA
Service Level Agreement (SLA) - a formal agreement between a service provider and a client that defines the level of service expected
110
DRP
Disaster Recovery Plan (DRP) - process involves creating a strategy to restore IT systems and data after a disaster
111
IRP
Incident Response Plan (IRP) - a written document, formally approved by the senior leadership team, that helps your organization before, during, and after a confirmed or suspected security incident
112
RDP
Remote Desktop Protocol (RDP) - a protocol that enables users anywhere in the world to access and control a computer through a secure, reliable channel
113
PII
Personally Identifiable Information (PII) - a category of sensitive data that can be used to identify an individual
114
SPIM
Spam Over Internet Messaging (SPIM) - involves sending un
115
HSM
Hardware Security Module (HSM) - a physical device that protects cryptographic keys and other sensitive data in an organization
116
OCSP
Online Certificate Status Protocol (OCSP) - an alternative to the certificate revocation list (CRL) and is used to check whether a digital certificate is valid or if it has been revoked
117
CMS
Content Management System (CMS) - software suites that allow site administrators to easily manage the design, functionality, and operation of websites with minimal technical expertise
118
CTM
Counter Mode (CTM)
119
DEP
Data Execution Prevention (DEP) - a technology built into Windows that helps protect you from executable code launching from places it's not supposed to
120
DES
Data Encryption Standard (DES) - a symmetric-key algorithm for the encryption of digital data
121
DHCP
Dynamic Host Configuration Protocol (DHCP) - a networking protocol that automatically assigns IP addresses and other network parameters to devices connected to a network; responsible for setting up configurations when a computer first joins a local network
122
DHE
Diffie-Hellman Ephemeral (DHE)
123
DNAT
Destination Network Address Translation (DNAT) - a networking technology that can be used to enhance network security and allow external users to access internal services
124
DNS
Domain Name System (DNS) - a critical part of the internet infrastructure that translates domain names into IP addresses so that computers can communicate with each other
125
DPO
Data Privacy Officer (DPO) - a role in an organization that ensures that the company is compliant with data protection laws and regulations when handling personal data
126
DSA
Digital Signature Algorithm (DSA) - a FIPS (Federal Information Processing Standard) and public-key cryptosystem that's used for digital signatures
127
DSL
Digital Subscriber Line (DSL)
128
EAP
Extensible Authentication Protocol (EAP) - used to pass the authentication information between the supplicant (the Wi-Fi workstation) and the authentication server (Microsoft IAS or other)
129
ECB
Electronic Code Book (ECB) - a block cipher mode of operation that encrypts messages by dividing them into blocks and encrypting each block separately
129
ECC
Elliptic Curve Cryptography (ECC) - a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller and more efficient cryptographic keys
130
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral (ECDHE)
131
ECDSA
Elliptic Curve Digital Signature Algorithm (ECDSA)
132
EFS
Encrypted File System (EFS) - a Windows feature that encrypts files and folders to protect them from unauthorized access
133