Security+ 701 Acronyms Flashcards
(399 cards)
3DES
Triple Digital Encryption Standard
Performs encryption in 3 rounds of the same algorithym.
802.1x
Switch Authentication
Standard for controlling access to intranet infrastructure devices.
Honeypot
Fake target
Used to identify and distract hackers.
AAA
Authentication, Authorization, and Accounting
Principle of verififying identity, capability, and use.
ABAC
Attribute-based Access Control
Granting accss based upon the characteristic of the subject, such as clearance level.
ACL
Access Control List
Restricting entry, based upon a listing of controls or permissions.
AES256
Advanced Encryption Standard 256bit
256 bit version of this algorithm is its highest level and is deemed uncrackable by brute force methods.
AH
Authentication Header
AH header transmits in clear text but authenticates and integrity checks each packet.
AI
Artificial Intelligence
Simulation of human intelligence and thinking in a machine, including adaptive learning and problem-solving.
AIS
Automatic Indicator Sharing
Automated sharing of threat information between organizations to enhance detection and response.
ALE
Annualized Loss Expectancy
Single loss expectancy times the annualized rate of occurrence.
ALG
Application Layer Gateway
Type of firewall able to inspect headers and payload in the upper protocol layers.
AP
Access Point
Infrastructure connection point for most wireless networks.
API
Application Programming Interface
Development tools used by programmers that have prebuilt functions with desired utility.
APT
Advanced Persistent Threat
Applications with advanced targeting, zero days and exfiltration techniques that are aimed at particular organizations or industries.
ARO
Annualized Rate of Occurrence
Most risk assessments track threats and attacks on an annualized basis.
ARP
Address Resolution Protocol
Given the IP address ARP will locate the MAC address.
ASLR
Address Space Layout Randomization
This randomizes the location of an application in memory making it harder for attackers to successfully perform the buffer overflow.
ASP
Application Service Provider
An organization provides access to its custom developed softeare, such as accounting or customer management.
Asymmetric key
Public key
The use of complementary values to disguise and then reveal information.
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge
A database of adversarial tactics and techniques that might be used to compromise systems organizations to enhance threat management.
AUP
Acceptable Use Policy
This policy is legally required, if HR wants to fire someone for misuse.
AV
Antivirus
Designed to identify malware, primarily based upon known patterns.
AV
Asset Value
This can be the replacement cost or income derived from something.