deck 0 Flashcards
(243 cards)
6to4
A protocol that provides unicast IPv6/ IPv4 connectivity between IPv6 sites and hosts across the IPv4 Internet
802.11
A family of protocols developed by the IEEE for wireless LAN communication between wireless devices or between wireless devices and a base station.
802.1X
An IEEE standard used to provide a port- based authentication mechanism over a LAN or wireless LAN.
AAR
(after-action report) A document that includes an analysis of security events and incidents that can provide insight into directions you may take to enhance security for the future.
ACL
(access control list) A security mechanism that specifies which objects in a system have which permissions.
Active Directory
The LDAP-based directory service from Microsoft that runs on Microsoft Windows servers.
AES
(Advanced Encryption Standard) A symmetric 128-, 192-, or 256-bit block cipher based on the Rijndael algorithm developed by Belgian cryptographers Joan Daemen and Vincent Rijmen and adopted by the U.S. government as its encryption standard to replace DES.
agile method
A software development method that focuses on iterative and incremental development to account for evolving requirements and expectations.
AI
(artificial intelligence) A scientific discipline that encompasses human-like intelligence exhibited by non-living machines.
ALE
(annual loss expectancy) The total cost of a risk to an organization on an annual basis.
Android fragmentation
The condition in which users are running many different versions of the Android operating system as a result of original equipment manufacturers (OEM) and mobile carriers manufacturing Android devices that cannot easily upgrade to the latest versions of the operating system.
application blacklist
A list of apps that are blocked from accessing a host or working with the host in some way. Apps not on the list are allowed.
application permissions
The process of a mobile application asking the user for specific access privileges to the operating system.
application sandboxing
An app security technique used to segregate an application from other applications and data on a system.
application security framework
A framework that can be embedded into standard software development processes to make it easier to apply security throughout the lifecycle.
application streaming
The process of a server providing a thin client with access to as little of an application’s resources as it needs to do its work.
application whitelist
A list of apps that are allowed to access a host or work with the host in some way. Apps not on the list are blocked.
application wrapping
The process of adding a layer of control over one or more apps on a device.
AppLocker
A feature of Active Directory environments that enables an administrator to restrict what software users can run on their systems.
ARO
(annual rate of occurrence) How many times per year a particular loss is expected to occur.
ASLR
(address space layout randomization) An operating system security technique that randomizes where components of a running process are placed in memory.
asset management
The process of maintaining a detailed record of technology resources for periodic review by network and security administrators.
attestation
The technique of verifying that only the individuals who need certain access privileges have those privileges. Attestation is also the process of verifying that no tampering has occurred in a system protected by a TPM.
augmented reality
Technology that modifies one’s view of physical reality by enhancing certain elements of an environment or incorporating new ones.