Other Sec Plus Terms Flashcards
a type of computerized cryptography where block cipher algorithms are applied three times to each data block. Each block contains 64 bit of data
3DES
a symmetric block cipher algorithm with a block/chunk size of 128 bits
AES
which has a key length of 256 bits, supports the largest bit size and is practically unbreakable by brute force based on current computing power, making it the strongest encryption standard
AES256
enables the real-time exchange of machine-readable cyber threat indicators and defensive measures to help protect participants of the community and ultimately reduce the prevalence of cyberattacks
automated indicator sharing
is a memory-protection process for operating systems (OSes) that guards against buffer-overflow attacks by randomizing the location where system executables are loaded into memory
Address space layout randomization ASLR
works as a secondary RAM, enable the system to remove infrequently accessed modified pages from physical memory to let the system use physical memory more efficiently for more frequently accessed pages
page file
enables web servers to dynamically generate webpages and create interactive web applications by using server-side scripting technology.
active server pages ASP
is a document that outlines how a business will continue operating during an unplanned disruption in service
business continuity planning BCP
global routing system of the internet. It manages how packets get routed from network to network through the exchange of routing and reachability information among edge routers
Border Gateway Protocol BGP
predicts the consequences of disruption of a business function and process and gathers information needed to develop recovery strategies
Business Impact Analysis BIA
s used in infrastructure mode to identify the media access control (MAC) address of the access point.
Basic Service Set Identifier BSSID
a report of measures taken to address root causes of non-conformances to prevent recurrence of issues
CAR Correction Action Report
Action taken to prevent the occurrence of such non-conformities, generally as a result of a report
Preventive Action Report
is a group of information security experts responsible for the protection against, detection of and response to an organization’s cybersecurity incidents
Computer Emergency Response Team
Group of individuals usually consisting of Security Analysts organized to develop, recommend, and coordinate immediate mitigation actions for containment, eradication, and recovery resulting from computer security incidents.
Computer Incident Response Team
software suites that allow site administrators to easily manage the design, functionality, and operation of websites with minimal technical expertise
Content Management System
A type of checksum algorithm that is not a cryptographic hash but is used to implement data integrity service where accidental changes to data are expected
Cyclic Redundancy Check
is an executive responsible for the safety and security of company data, personnel, and assets.
chief security officer
is a hardware device that converts a digital data frame from the communications technology.
Channel Service Unit CSU
uses an arbitrary number (the counter) that changes with each block of text encrypted is encrypted with the cipher, and the result is XOR’d into ciphertext
counter mode
top executive that oversees the entire information technology department and is responsible for integrating business needs and requirements into IT planning and operations
Chief Technology Officer
approach generates a public and private key on both sides of the transaction, but only shares the public key
diffie hellman DHE
a protocol that allows an organization to take responsibility for transmitting a message by signing it in a way that mailbox providers can verify
Domain Keys Identified Mail DKIM
helps mail administrators prevent hackers and other attackers from spoofing their organization and domain.
Domain-Based Message Authentication Reporting and Conformance DMARC