Patterns, Protocols & Implementation Standards Flashcards

(30 cards)

1
Q

2FA

A

Two Factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ABAC

A

Attribute Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CA

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CORS

A

Cross Origin Resource Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DoH

A

DNS over HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DOM

A

Document Object Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FTPS

A

FTP-SSL or FTP Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IR

A

Incidence Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

JIT

A

Just In Time (SAML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

JWT

A

Json Web Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MFA

A

Multi Factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

mTLS

A

Mutual Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OASIS

A

Organization for the Advancement of Structured Information Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OAuth

A

Open Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OTP

A

One Time Password

17
Q

PaC

A

Policy as Code

18
Q

SAML

A

Security Assertion Markup Language

19
Q

SARIF

A

Static Analysis Results Interchange Format

20
Q

SFTP

A

SSH File Transfer Protocol

21
Q

SPDX

A

Software Package Data Exchange

22
Q

SSH

23
Q

SSL

A

Secure Sockets Layer

24
Q

SSO

A

Single Sign-On

25
TLP
Traffic Light Protocol (TLP) The Traffic Light Protocol (TLP) is a standardized, four-color classification system designed to facilitate secure, controlled sharing of sensitive information among individuals or organizations. It enables creators to define sharing boundaries, ensuring information reaches the right audience to act on threats or incidents without unauthorized disclosure.
26
TLS
Transport Layer Security
27
U2F
Universal Two Factor
28
WEP
Wired Equivalent Privacy (WEP) is an outdated, insecure IEEE 802.11 security protocol from 1997 designed to provide wireless networks (WLANs) the same confidentiality as wired networks. Utilizing 64-bit or 128-bit static keys with the RC4 algorithm, WEP is now obsolete, as flaws allow attackers to crack keys in minutes.
29
WPA
Wi-Fi Protected Access (WPA) is a security standard designed by the Wi-Fi Alliance to secure wireless networks, replacing the insecure WEP protocol. It offers improved data protection via Temporal Key Integrity Protocol (TKIP) and stronger authentication (Pre-Shared Key or 802.1x). WPA is often used in home (WPA-PSK) and enterprise (WPA-802.1x) environments.
30
WPS
Wi-Fi Protected Setup (WPS) is a network security standard that allows users to easily connect devices to a secure home Wi-Fi network without typing long passwords. It works via a physical button on the router or a PIN, primarily supporting devices like printers, smart TVs, and extenders.