Security+ Acronym Flashcards
(149 cards)
A port based authentication protocol. It provides authentication when a user connects to a specific access point, or , in this context, a logical port.
It’s primary purpose is to secure the authentication process prior to a client actually gaining access to a network. While this protocol can be used in wired and wireless networks, it is often closely associated with wireless networks.
802.1x
Symmetric block cipher designed as an improvement over the weaknesses of DES. It encrypts data using the DES algorithm in 3 separate passes and uses multple keys.
It uses multiple keys and multiple passes, not as efficient as AES but still used in some applications when hardware does not support AES. It has key sizes of 56 bits, 112bits, or 168 bits.
3DES
Provides authentication, authorization and accounting. Authentication verifies a user’s identification. Authorization determines if a user should have access. Accounting tracks user access with logs.
RADIUS and TACACS+ are both considered this protocol because they provide all three services. They authenticate users who attempt remote access, determine if the user is authorized for remote access by checking a database, and then record the user’s activity. TACACS+ uses multiple challenges and responses during a session.
AAA
Identifies a user or group that is granted permission to a resource. They are contained within a DACL in NTFS.
ACE (Access Control Entry)
A strong symmetric block cipher it can use key sizes of 128bits, 192bits, or 256 bits. Because of its strengths, it has been adopted for a wide assortment of applications such as encrypting data on a USB drive. It is fast, and requires one pass to encrypt and decypt data.
AES (Advanced Encryption Standard)
A list of rules used to grant access to a resource. It can define what is allowed based on permissions or based on traffic.
ACL (Access Control List)
Identified with protocol ID number 51, being a part of IPSEC it provides authentication and integrity.
AH (Authentication Header)
Used to measure risk with annualized rate of occurrence (ARO) and single loss expectancy (SLE). This identifies the total amount of loss expected for a given risk. The calculation is SLE x ARO = this.
ALE (Annualized Loss Expectancy)
This provides access to a wired network to wireless clients. Many of these support isolation mode to segment wireless users from other wireless users.
AP (Access point or short for Wireless Access Point)
Used to measure risk with annualized loss expectancy (ALE) and single loss expectancy (SLE). This identifies how many times a loss is expected to occur in a year. The calculation is SLE x this = ALE
ARO (Annualized rate of occurrence)
Resolves IP addresses to MAC addresses.
ARP (Address Resolution Protocol)
These type of attacks can redirect traffic through an attacker’s system by sending false MAC address updates. VLAN segregation helps prevent the scope of these type of attacks within a network.
ARP (Address Resolution Protocol) Poisoning
Defines proper system usage. It will often describe the purpose of computer systems and networks, how users can access them, and the responsibilities of users when accessing the systems.
AUP (Acceptable Use Policy)
A plan that helps an organization predict and plan for potential outages of critical services or functions.
BCP (Business Continuity Plan)
Disaster recovery elements that provide the steps used to return critical functions to operation after an outage. The BIA is part of a this and the BIA drives decisions to create redundancies such as failover clusters or alternate sites.
BCP (Business Continuity Plan)
This identifies critical business or mission requirements and includes elements such as Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) but it does not identify solutions.
BIA (Business Impact Analysis)
An automated program or system used to perform one or more tasks. A malicious this is a group of computers called zombies and controlled through a command and control server.
BOTS (or Network Robots)
Attackers use malware to join computers to these. Zombies regularly check in with the command and control server and can launch DDoS attacks against other victims.
BOTS (or Network Robots)
This kind of activity often includes hundreds of outbound connections, and some of these use IRC channels.
BOTS (or Network Robots)
An organization that manages, issues, and signs certificates and is a part of PKI.
CA (Certificate Authority)
A specialized type of smart card used by the US DOD. It includes photo identification and and provides confidentiality, integrity, authentication, and non-repudiation for the users. It is similar to a PIV.
CAC (Common Access Card)
A standard that allows microcontrollers and devices to communicate with each other without a host computer.
CAN (Controller Area Network)
An encryption protocol based on AES used with WPA2 for wireless security. It is more secure than TKIP, used with the original release of WPA.
CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)
This is a detective control that provides video surveillance. Video survelliance provides reliable proof of a person’s location and activity. It can be used by an organization to verify if any equipment or data is being removed.
CCTV (Close Circuit Television)