Security Plus Terms Flashcards
(594 cards)
A security concept where a centralized platform verifies subject identification, ensures the subject is assigned relevant permissions, and then logs these actions to create an audit trail.
AAA (authentication, authorization, and accounting)
An access control technique that evaluates a set of attributes that each subject possesses to determine if access should be granted.
ABAC (attribute-based access control) .
A collection of access control entries (ACEs) that determines which subjects (user accounts, host IP addresses, and so on) are allowed or denied access to the object and the privileges given (read only, read/write, and so on).
Account Policies
A collection of access control entries (ACEs) that determines which subjects (user accounts, host IP addresses, and so on) are allowed or denied access to the object and the privileges given (read only, read/write, and so on).
ACL (Access Control List)
The practice of responding to a threat by destroying or deceiving a threat actor’s capabilities.
Active defense
Using AI to identify vulnerabilities and attack vectors to circumvent security systems.
Adversarial AI (adversarial artificial intelligence)
A symmetric 128-, 192-, or 256-bit block cipher based on the Rijndael algorithm developed by Belgian cryptographers Joan Daemen and Vincent Rijmen and adopted by the U.S. government as its encryption standard to replace DES.
AES (Advanced Encryption Standard)
A software development model that focuses on iterative and incremental development to account for evolving requirements and expectations.
Agile model (Agile)
An IPSec protocol that provides authentication for the origin of transmitted data as well as integrity and protection against replay attacks.
AH (authentication header)
A type of network isolation that physically separates a network from all other networks.
Air gap
Threat intelligence data feed operated by the (DHS), Department of Homeland Security.
AIS (Automated Indicator Sharing)
The total cost of a risk to an organization on an annual basis. This is determined by multiplying the SLE, Single Loss Expectancy by the Annual Rate of Occurrence (ARO). SLE x ARO=ALE
ALE (annual loss expectancy)
A device that provides a connection between wireless devices and can connect to wired networks. Also known as wireless access point or WAP.
AP (access point)
A library of programming utilities used, for example, to enable software developers to access functions of the TCP/IP network stack under a particular operating system.
API (application programming interface)
A Layer 7 firewall technology that inspects packets at the Application layer of the OSI model.
Application aware firewall
Software designed to run on a server to protect a particular application such as a web server or SQL server.
Application firewall
An attacker’s ability to obtain, maintain, and diversify access to network systems using exploits and malware.
APT (advanced persistent threat)
Producing programmable circuit boards for education and industrial prototyping.
Arduino Open-source platform
In risk calculation, an expression of the probability/likelihood of a risk as the number of times per year a particular loss is expected to occur.
ARO (annual rate of occurrence)
An optional security feature of a switch that prevents excessive ARP replies from flooding a network segment.
ARP inspection
A network-based attack where an attacker with access to the target local network segment redirects an IP address to the MAC address of a computer that is not the intended recipient. This can be used to perform a variety of attacks, including DoS, spoofing, and Man-in-the-Middle.
ARP poisoning (ARP spoofing)
A cipher that uses public and private keys. The keys are mathematically linked, using either Rivel, Shamir, Adleman (RSA) or elliptic curve cryptography (ECC) algorithms, but the private key is not derivable from the public one. An asymmetric key cannot reverse the operation it performs, so the public key cannot decrypt what it has encrypted, for example.
Also known as (Elliptic Curve Cryptography) or ECC.
Asymmetric algorithm (Public Key)
A knowledge base maintained by the MITRE Corporation for listing and explaining specific adversary tactics, techniques, and procedures.
ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge)
The points at which a network or application receives external connections or inputs/outputs that are potential vectors to be exploited by a threat actor.
Attack surface