Security +601 Acronyms and Definitions Flashcards

(50 cards)

1
Q
  • Deprecated and considered insecure. Replaced by AES
  • Symmetric
  • Applies the DES cipher algorithm 3 times to each data block
A

3DES (Triple Digital Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Often used to describe RADIUS, or some other form of networking protocol that provides Authentication, Authorization, and Accounting

A

AAA (Authentication, Authorization, and Accounting)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Database and identity service used to provide identity management

A

Active Directory (AD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Set of rules that allow/permit or deny any traffic flow through routers
  • Looks at the packet to determine whether it should be allowed or denied
  • Works at layer 3 toprovide security by filtering & controlling the flow of trafficfrom one router to another
A

ACL (Access Control List)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Industry-standard for data security
  • 128-bit, 192-bit, or 256-bit (strongest) implementations
A

AES (Advanced Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • This is the 256-bit implementation of AES
  • The 256 references the bit size of keys
A

AES256 (Advanced Encryption Standards 256bit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Used to authenticate origins of packets of data transmitted
  • These headers don’t hide any data from attackers, but they do provide proof that the data packets are from a trusted source and that the data hasn’t been tampered with
  • Helps protect against replay attacks
A

AH (Authentication Header)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the theory and development of computer systems able to perform tasks that normally require human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.

A

AI (Artificial Intelligence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • DHS and CISA free program
  • Enables organizations to share and receive machine-readable cyber threat indicators (CTIs) and defensive measures (DMs) in real-time
  • Useful to monitor and defend networks against known threats
A

AIS (Automated Indicator Sharing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

can expect x number of devices to fail per year

A

ALE (Annualized Loss Expectancy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Networking hardware device that provides Wi-Fi access, typically then connected via wire to the router, or directly integrated in the router itself

A

AP (Access Point)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • used to allow applications to talk to one another
  • For example: an application can query an API to retrieve data and then display that data or process it in some way
A

API (Application Programming Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stealthy threat actor (usually nation-state or state-sponsored group) that gains unauthorized access to a system and remains undetected for a period of time

A

APT (Advanced Persistent Threat)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The calculated probability that a risk will occur in a given year

A

ARO (Annualized Rate of Occurrence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Helps connect IP devices to MAC addresses

A

ARP (Address Resolution Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Prevent exploitation of memory corruption vulnerabilities

A

ASLR (Address Space Layout Randomization)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • Microsoft server-side scripting language and engine to create dynamic web pages
A

ASP (Active Server Page)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • Knowledge base framework of adversary tactics and techniques based on real-world observations
  • Helpful to build effective threat models and defenses against real threats
A

ATT&CK Adversarial Tactics, Techniques, and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Terms that users must accept in order to use a network, system, website, etc…

A

AUP (Acceptable Use Policy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  • Typically uses signature-based detection
  • Not effective against zero-days or polymorphic malware
A

AV (Antivirus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • Powerful UNIX shell and command language
  • Used to issue commands that get executed, which can also be turned into shell scripts
  • Often used for automation
A

BASH (Bourne Again Shell)

22
Q
  • Plan used to create processes and systems of both prevention and recovery to deal with threats that a company faces
  • This plan outlines how a business can continue delivering products and services if crap hits the fan
A

BCP (Business Continuity Planning)

23
Q

Used to predict the consequences a business would face if there were to be a disruption

A

BIA (Business Impact Analysis)

24
Q
  • The postal service of the Internet”
  • finds the best route for data to travel to reach its destination
A

BGP (Border Gateway Protocol)

25
- Firmware that performs hardware initialization when systems are booting up, and to provide runtime services for the OS and programs - First software to run when you power on a device
BIOS (Basic Input/Output System)
26
Defines a contract between two or more parties as to how a business should run
BPA (Business Partnership Agreement)
27
- Frames that have spanning tree protocol information - Switches send these with a unique source MAC address to a multicast address with a destination MAC
BPDU (Bridge Protocol Data Unit)
28
When employees use personal devices to connect to their organization’s networks and access work-related systems
BYOD (Bring Your Own Device)
29
- An organization that validates the identities of entities through cryptographic keys by issuing digital certificates
CA (Certificate Authority)
30
Smart card for active-duty personnel
CAC (Common Access Card)
31
- These are the “problems” you have to solve from time to time to make sure that you are not a robot - Typically used for forms (signup, login, purchase, search, etc...) to defend against bots
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
32
Lists defects that need to be rectified
CAR (Corrective Action Report)
33
- Acts as an intermediary between the cloud and on-premises - Monitors all activity - Enforces security policies -
CASB (Cloud Access Security Broker)
34
- CBC is a mode of operation for block ciphers - Block ciphers (for encryption) by themselves would only work for a single block of data…a mode of operation like CBC can be used to give instructions on how to apply encryption to multiple blocks of data - CBC helps prevent issues of identical blocks, even if you have identical inputs. It does that by using an operation called XOR (exclusive-OR) - Each block gets XORed with the previous ciphertext before being encrypted (the first block uses an initialization vector, aka IV) - CBC requires that blocks be processed in order, so you can’t parallelize encryption which means it runs slower than some of the other modes (ie: ECB) - Think of CBC as building a chain from left to right - CBC does have vulnerabilities, including POODLE and Goldendoodle
CBC (Cipher Block Chaining)
35
- An online, self-paced, and interactive training system - Students can set their own goals and learn at their own pace
CBT (Computer-based Training)
36
Encryption protocol designed for Wireless LAN products
CCMP (Counter-Mode/CBC-Mac Protocol)
37
- Camera monitoring system, especially one that transmits back to a centralized location with a limited number of monitors - Could be monitored by security personnel or simply set to record
CCTV (Closed Circuit Television)
38
- Expert group that handles computer security incidents - Could also be called CSIRT, which is short for Computer Security Incident Response Team
CERT (Computer Emergency Response Team)
39
- When a mode of operation uses the ciphertext from the previous block in the chain -
CFB (Cipher Feedback)
40
- Authenticates a user or network host to an authenticating entity - Provides protection against replay attacks - Requires that both the client and server know the plaintext of the secret, but it's never sent over the network
CHAP (Challenge Handshake Authentication Protocol)
41
- Company executive responsible for implementing and managing IT - Mostly considered to be IT generalists - Useful way to think about it: CIO aims to improve processes within and for the company
CIO (Chief Information Officer)
42
- CTO is different from CIO, and typically focuses on development, engineering, and research & development departments - Useful way to think about it: CTO uses technology to improve or create products and services for customers
CTO (Chief Technology Officer)
43
- Executives that specialize in security - Much more focused of a responsibility than CIO
CSO (Chief Security Officer)
44
a security solution that enforces policy on devices that access networks to increase network visibility and reduce risk
NAC (network access control)
45
Non-profit organization that helps put together, validate, and promote best practices to help people, businesses, and governments protect themselves against cyber threats
CIS (Center for Internet Security)
46
Blank is computer software used to manage the creation and modification of digital content. Blank is typically used for enterprise content management and web content management. An example is WordPress
CMS (Content Management System)
47
- Effort for agencies to make sure they can continue operations during a wide range of emergencies - Requires planning for various types of events such as natural or human-caused disasters
COOP (Continuity of Operation Planning)
48
Organization provides its employees with mobile computing devices
COPE (Corporate Owned Personal Enabled)
49
Used to restore systems and information in the event that systems become compromised
CP (Contingency Planning)
50
Used to detect accidental changes in digital networks and storage devices
CRC (Cyclical Redundancy Check)