sec_20250514002345 Flashcards
(87 cards)
AAA
AAA – Authentication, Authorization, Accounting
ACL
Access Control List. Permissions attached to a file when using DAC, or a list of filtering rules in a firewall.
AH
Authentication Header
Provides:
Integrity
Encryption
Authentication
Anti-replay
APT
An APT (advanced persistent threat) is the worst type of threat actor.
They can compromise a system, and by definition, maintain long term remote access without being detected.
CA
Certificate Authority (provides certificates to computers)
CASB
CASB = Cloud Access Security Broker. A proxy server that filters everything that goes in and out of the cloud. Typically includes all the functions a NGFW would have, plus many others.
CIRT
Computer Incident Response Team, a team that handles cybersecurity incidents.
CIA
CIA – Confidentiality, Integrity, Availability
CRC
Cyclic Redundancy Check (used to detect errors with Ethernet messages)
CRL
Certificate Revocation List: A list (by serial number) of all revoked certificates that a CA has previously issued. These lists can become very large, which is why OCSP was created. A decent option if the computer is airgapped.
CSR
Certificate Signing Request: This is sent to a CA to begin the process of certificate creation. The CSR should include the public key, domain/device validation (proof of ownership), common name, location, etc.
CVE
Common Vulnerabilities and Exposures
CVSS
Common Vulnerability Scoring System. It is a public framework for quantifying the severity of vulnerabilities in information systems, helping security teams prioritize patching and mitigation efforts.
DBA
Database Administrator
DHCP
DHCP (Dynamic Host Configuration Protocol) refers to a network service that automatically assigns IP addresses and other network configuration information to devices on a network
DLP
Data Loss Prevention
DLP
Data Loss Preventer. A software that stops users from leaking sensitive data.
DNSSEC
Domain Name System Security Extensions
DRP
Disaster Recovery Plan
EAP
Extensible Authentication Protocol, which is a framework used for authenticating users on networks, particularly wireless networks
EDR
EDR stands for Endpoint Detection and Response and its essentially
an advanced anti-malware software you would install on a computer.
Embedded systems
Embedded systems. Computer systems that are extremely specialized, often with limited resources/hardware. Not built for constantly changing environments.
ESP
ESP: Encapsulating Security Payload
provides:
Integrity
Encryption
Authentication
Anti-replay
FDE
FDE (Full Disk Encryption) you will need a TPM and should back up the keys to escrow.