Definitions Flashcards
3DES
Triple Digital Encryption Standard. A symmetric algorithm used to encrypt data and provide confidentiality. It is a block cipher that encrypts data in 64-bit blocks.
AAA
Authentication, authorization, and accounting. A group of technologies used in remote access systems. Authentication verifies a user’s identification. Authorization determines if a user should have access. Accounting tracks a user’s access with logs. Sometimes called AAAs of security.
ABAC
Attribute-based access control. An access control model that grants access to resources based on attributes assigned to subjects and objects.
acceptable use policy (AUP)
A policy defining proper system usage and the rules of behavior for employees. It often describes the purpose of computer systems and networks, how users can access them, and the responsibilities of users when accessing the systems.
access point (AP)
A device that connects wireless clients to wireless networks. Sometimes called wireless access point (WAP).
accounting
The process of tracking the activity of users and recording this activity in logs. One method of accounting is audit logs that create an audit trail.
ACLs
Access control lists. Lists of rules used by routers and stateless firewalls. These devices use the ACL to control traffic based on networks, subnets, IP addresses, ports, and some protocols.
active reconnaissance
A penetration testing method used to collect information. It sends data to systems and analyzes responses to gain information on the target. Compare with passive reconnaissance.
ad hoc
A connection mode used by wireless devices without an AP. When wireless devices connect through an AP, they are using infrastructure mode.
administrative controls
Security controls implemented via administrative or management methods.
AES
Advanced Encryption Standard. A strong symmetric block cipher that encrypts data in 128-bit blocks. AES can use key sizes of 128 bits, 192 bits, or 256 bits.
affinity
A scheduling method used with load balancers. It uses the client’s IP address to ensure the client is redirected to the same server during a session.
aggregation switch
A switch used to connect multiple switches together into a network. Switches connect to the aggregation switch and it connects to a router.
agile
A software development life cycle model that focuses on interaction between customers, developers, and testers. Compare with waterfall.
AH
Authentication Header. An option within IPsec to provide authentication and integrity.
airgap
A physical security control that provides physical isolation. Systems separated by an airgap don’t typically have any physical connections to other systems.
ALE
Annual (or annualized) loss expectancy. The expected loss for a year. It is used to measure risk with ARO and SLE in a quantitative risk assessment. The calculation is SLE × ARO = ALE.
amplification attack
An attack that increases the amount of bandwidth sent to a victim.
anomaly
A type of monitoring on intrusion detection and intrusion prevention systems. It detects attacks by comparing operations against a baseline. It is also known as heuristic detection.
ANT
A proprietary wireless protocol used by some mobile devices. It is not an acronym.
antispoofing
A method used on some routers to protect against spoofing attacks. A common implementation is to implement specific rules to block certain traffic.
antivirus
Software that protects systems from malware. Although it is called antivirus software, it protects against most malware, including viruses, Trojans, worms, and more.
application blacklist
A list of applications that a system blocks. Users are unable to install or run any applications on the list.
application cell
Also known as application containers. A virtualization technology that runs services or applications within isolated application cells (or containers). Each container shares the kernel of the host.