Security + Acroynms Flashcards
(325 cards)
AAA
AAA (Authentication, Authorization, and Accounting):
- Authentication: Verifies the identity of a user, device, or system. Think of it as the gatekeeper checking IDs before granting access.
- Authorization: Determines what an authenticated user is allowed to do. It’s like giving different people different keys that only open certain doors.
- Accounting: Tracks what the authenticated user does once they are granted access. It’s the record-keeper, logging actions for monitoring and auditing.
Together, AAA ensures secure access control, proper usage permissions, and tracking of activities for security and compliance purposes.
ACL
Access Control List (ACL):
An ACL is a set of rules that control the traffic flow into and out of a network or a device. Each entry in an ACL specifies a permit or deny rule, determining whether network packets can pass based on criteria such as IP addresses, protocols, and port numbers.
- Usage: Primarily used in firewalls and routers to manage incoming and outgoing traffic.
- Purpose: To enhance network security by specifying which users or system processes can access certain resources.
AES
Advanced Encryption Standard (AES):
AES is a symmetric encryption algorithm widely used to secure sensitive data. It encrypts data in fixed blocks of 128 bits using keys of 128, 192, or 256 bits. AES is known for its speed and security, making it the standard for encrypting everything from financial transactions to personal communications.
AES-256
AES-256 (Advanced Encryption Standard 256-bit):
AES-256 is a variant of the Advanced Encryption Standard (AES) that uses a 256-bit encryption key. This provides a higher level of security compared to shorter key lengths (such as 128-bit or 192-bit). It is widely regarded as one of the most secure encryption methods available, making it ideal for encrypting highly sensitive data.
AH
Authentication Header (AH):
AH is a component of the IPsec protocol suite used for securing IP communications by providing connectionless integrity and data origin authentication for IP packets. It adds a header to the packet that includes a hash of the packet’s content, ensuring that any changes to the packet after transmission can be detected.
AI
Artificial Intelligence (AI):
AI refers to the simulation of human intelligence processes by machines, especially computer systems. These processes include learning (the acquisition of information and rules for using the information), reasoning (using rules to reach approximate or definite conclusions), and self-correction. AI encompasses various fields such as machine learning, natural language processing, robotics, and more.
AIS
Automated Indicator Sharing (AIS):
AIS is a system developed by the U.S. Department of Homeland Security (DHS) to enable the rapid exchange of cyber threat indicators between the federal government and the private sector. It aims to improve the collective cybersecurity posture by allowing organizations to share and receive real-time threat information automatically.
ALE
Annualized Loss Expectancy (ALE):
ALE is a risk management metric used to estimate the potential annual financial loss from a specific risk. It is calculated using the formula:
[ \text{ALE} = \text{Single Loss Expectancy (SLE)} \times \text{Annualized Rate of Occurrence (ARO)} ]
- Single Loss Expectancy (SLE): The expected monetary loss every time a risk event occurs.
- Annualized Rate of Occurrence (ARO): The estimated frequency with which a risk event is expected to occur in a year.
ALE helps organizations prioritize and allocate resources to mitigate risks based on their potential financial impact.
AP
Access Point (AP):
An Access Point is a hardware device that allows wireless devices to connect to a wired network using Wi-Fi or other wireless standards. It serves as a bridge between the wireless clients (such as laptops, smartphones, and tablets) and the wired network, facilitating communication and data transfer.
Access Points are commonly used to extend the coverage of a wireless network, ensuring that devices can stay connected even as they move around within a given area.
API
Application Programming Interface (API):
An API is a set of protocols, routines, and tools for building software and applications. It defines methods of communication between various software components. Essentially, an API allows different software systems to interact and share data or functionality. For example, a weather application might use an API to retrieve the latest weather data from a weather service.
APT
Advanced Persistent Threat (APT):
An APT is a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period. The goal is usually to steal data rather than cause damage. APTs are often carried out by well-funded and skilled attackers, such as nation-states or organized crime groups, and they use sophisticated techniques to avoid detection.
ARO
Annualized Rate of Occurrence (ARO):
ARO represents the estimated frequency with which a specific risk event is expected to occur within a year. It is used in risk management to calculate the potential impact of risks over time. A higher ARO indicates a higher likelihood of the event happening within a year.
ARP
ARP (Address Resolution Protocol) is a communication protocol used for discovering the link-layer address (such as a MAC address) associated with a given network-layer address (such as an IP address). It’s vital in Ethernet and IP networks.
Key Features
Mapping: Translates IP addresses to MAC addresses, allowing devices to find each other on a local network.
Caching: Stores recent mappings to speed up network communication.
Broadcasting: Uses broadcast messages to find the MAC address corresponding to a specific IP address.
How It Works
Request: When a device wants to communicate with another device on the local network, it sends an ARP request asking “Who has this IP address?”
Response: The device with the matching IP address replies with its MAC address.
Cache: The requesting device stores this information in its ARP cache for future use.
ASLR
ASLR (Address Space Layout Randomization) is a security technique used to prevent exploitation of memory corruption vulnerabilities. Here’s a snapshot:
Key Features
Randomization: Randomly arranges the address space positions of key data areas like the heap, stack, and libraries.
Protection: Makes it harder for attackers to predict the locations of specific memory regions, thus reducing the likelihood of successful attacks.
Benefits
Enhanced Security: Provides an additional layer of security against buffer overflow attacks and return-oriented programming (ROP) attacks.
Unpredictability: Increases the difficulty of developing exploits as the memory addresses are randomized each time a program runs.
Implementation
Operating Systems: Widely implemented in modern operating systems such as Windows, Linux, and macOS.
Applications: Can be applied to individual applications to improve their security posture.
ASLR’s main goal is to disrupt attack vectors that rely on knowing the memory layout, making it a powerful tool in your cybersecurity arsenal.
ATT&CK
ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a comprehensive framework developed by MITRE to describe and classify cyberattacks and intrusions. It provides a structured approach to understanding the tactics, techniques, and procedures (TTPs) used by adversaries1
.
Key Features
Tactics: The “why” of an attack, representing the adversary’s technical objectives1
.
Techniques: The “how” of an attack, detailing the methods used to achieve the tactics1
.
Procedures: Specific implementations of techniques2
.
ATT&CK Matrix
The framework is presented in a matrix format, categorizing various tactics and techniques used by cybercriminals1
. It helps organizations analyze threats, improve defenses, and develop threat models2
.
AUP
An AUP (Acceptable Use Policy) is a set of rules and guidelines that outline how users are permitted to use an organization’s technology, network, and systems. It helps maintain security, ensure compliance, and prevent misuse.
Key Elements:
Usage Guidelines: Defines acceptable and unacceptable activities.
Security Measures: Outlines password policies, data protection, and device security.
Legal Compliance: Ensures adherence to legal and regulatory requirements.
Consequences: Specifies penalties for policy violations.
By establishing clear boundaries, an AUP helps protect both the organization and its users.
AV
Antivirus (AV) software is designed to detect, prevent, and remove malware, including viruses, worms, trojans, and other malicious software. Here are some key features and benefits of using antivirus software:
Key Features
Real-Time Protection: Monitors your system in real-time to detect and block threats as they occur.
Scanning: Performs regular scans of your system to identify and remove malware.
Updates: Keeps its virus definitions and software up-to-date to protect against the latest threats.
Firewall: Protects against unauthorized access and network-based attacks.
Email Protection: Scans incoming and outgoing emails for malicious attachments and links.
Benefits
Security: Provides a robust defense against a wide range of malware and cyber threats.
Peace of Mind: Helps you browse, work, and play online with confidence.
Data Protection: Safeguards your personal information, files, and sensitive data.
System Performance: Maintains system health by preventing malware-related slowdowns and crashes.
Popular antivirus software includes
BASH
BASH (Bourne Again Shell) is a command-line interpreter widely used in Unix and Linux environments. It’s essentially a powerful, enhanced version of the original Bourne Shell (sh) and is the default shell for many Linux distributions.
Key Features
Scripting: Write scripts to automate tasks and create complex workflows.
Command History: Recall and reuse previous commands.
Aliases: Create shortcuts for longer commands.
Tab Completion: Auto-complete commands and filenames with the Tab key.
Job Control: Manage multiple processes from the command line.
Example Commands
bash
Copy
# Basic command execution
echo “Hello, World!”
Navigating directories
cd /path/to/directory
Listing files
ls -l
Creating and running a script
nano myscript.sh
chmod +x myscript.sh
./myscript.sh
BASH is an indispensable tool for developers, sysadmins, and power users looking to leverage the full potential of their Unix/Linux systems.
BCP
BCP (Business Continuity Planning) is the process of creating systems of prevention and recovery to deal with potential threats to a company. The goal is to ensure that critical business functions continue to operate despite disruptions.
Key Components
Risk Assessment: Identify potential risks and their impact on business operations.
Business Impact Analysis (BIA): Assess the impact of interruptions on critical business functions.
Recovery Strategies: Develop strategies to recover critical business functions.
Plan Development: Create a detailed plan outlining roles, responsibilities, and procedures.
Testing and Exercises: Regularly test and update the plan to ensure its effectiveness.
Benefits
Resilience: Enhances the organization’s ability to withstand and recover from disruptions.
Customer Confidence: Maintains trust and satisfaction among customers by ensuring continuous service.
Regulatory Compliance: Meets legal and regulatory requirements for business continuity.
BGP
BGP (Border Gateway Protocol) is the protocol used to exchange routing information between different autonomous systems on the internet. It’s the backbone of the internet, ensuring data packets find their way across the complex web of networks.
Key Features
Inter-AS Routing: Manages routing between different autonomous systems (ASes).
Path Vector Protocol: Uses a path vector mechanism to maintain the path information that gets updated as routing information is passed from one router to another.
Scalability: Designed to handle a large number of routes, making it ideal for the global internet.
How It Works
BGP Peers: Routers establish a BGP session with peers in other ASes.
Routing Information Exchange: BGP routers exchange routing information, advertising the routes they know.
Decision Process: Each router uses a complex decision process to select the best path for data.
Security Concerns
Route Hijacking: Incorrect route announcements can lead to misrouting of data.
Mitigation: Techniques like Route Origin Authorization (ROA) and Resource Public Key Infrastructure (RPKI) help secure BGP.
In essence, BGP is like the mapkeeper of the internet, ensuring your data takes the best path possible across a myriad of networks.
BIA
Business Impact Analysis (BIA) is a process that helps organizations identify and evaluate the potential effects of disruptions on their operations. It’s a crucial part of business continuity planning. Here’s a deeper dive:
Key Objectives
Identify Critical Functions: Determine which business functions are vital for the organization’s survival.
Assess Impact: Evaluate the financial and operational impacts of disruptions.
Set Priorities: Establish priorities for recovery based on the impact analysis.
Develop Strategies: Formulate strategies to mitigate risks and reduce the impact of disruptions.
Steps in a BIA
Data Collection: Gather information through interviews, surveys, and document reviews.
Analysis: Assess the potential impacts of disruptions on critical business functions.
Documentation: Compile the findings into a report that includes impact assessments, recovery priorities, and recommended strategies.
Benefits
Informed Decision-Making: Provides valuable insights for planning and prioritizing recovery efforts.
Risk Mitigation: Helps identify vulnerabilities and develop strategies to minimize risks.
Regulatory Compliance: Assists in meeting legal and regulatory requirements for business continuity.
BIA is like a health check for your business, ensuring you’re prepared to handle whatever comes your way.
BIOS
BIOS (Basic Input/Output System) is a firmware interface that initializes and tests hardware components when a computer is powered on. It also provides runtime services for operating systems and programs. Here’s a snapshot:
Key Functions
POST (Power-On Self Test): Checks hardware components to ensure they are working correctly before loading the operating system.
Bootstrapping: Locates and initiates the boot loader to start the operating system.
Hardware Configuration: Provides a setup utility to configure system hardware settings like date, time, and system configuration.
Characteristics
Non-Volatile Memory: Stored on a chip on the motherboard, retaining settings even when the computer is turned off.
Legacy System: Being gradually replaced by UEFI (Unified Extensible Firmware Interface) in modern systems for improved features and security.
BIOS is like the conductor, getting all the components to work together in harmony before the OS takes over.
BPA
A Business Partners Agreement (BPA) is a legal document that outlines the terms and conditions of a partnership between two or more business entities. It defines the roles, responsibilities, and expectations of each partner, as well as how profits and losses will be shared.
Key Elements
Partnership Structure: Specifies the type of partnership (e.g., general, limited, limited liability).
Roles and Responsibilities: Details the duties and obligations of each partner.
Profit and Loss Distribution: Outlines how profits and losses will be divided among partners.
Decision-Making: Establishes how business decisions will be made and who has authority.
Contribution: Describes the contributions (capital, resources, skills) each partner will make.
Dispute Resolution: Provides mechanisms for resolving conflicts between partners.
Having a well-drafted BPA can help prevent misunderstandings and disputes, ensuring a smooth and successful partnership.
BPDU
BPDU (Bridge Protocol Data Unit) is a type of data message used in local area networks (LANs) to detect and prevent network loops, primarily through the Spanning Tree Protocol (STP)1
. Here’s a quick overview:
Key Functions
Loop Detection: Helps identify and eliminate network loops, which can cause broadcast storms and degrade network performance1
.
Topology Sharing: Shares information about network topology between switches1
.
Root Bridge Election: Assists in electing the root bridge in an STP domain1
.
Types of BPDU
Configuration BPDU (CBPDU): Exchanges topology information and helps elect the root bridge1
.
Topology Change Notification (TCN) BPDU: Indicates changes in the network topology1
.
How It Works
Switches send BPDUs to each other to share information about their ports, switch IDs, and other relevant data1
. This information is used to build a loop-free network topology1
.
, ) to define the structure and content of a webpage.
Hyperlinks: Links pages to each other via tags, creating a web of interconnected pages.
Multimedia Integration: Embeds images, videos, and other multimedia content within web pages.
Basic Structure
Here's a simple example of an HTML document:
html
Copy
This is a paragraph.Welcome to My Webpage