Terms Flashcards

Learn Terminology (33 cards)

1
Q

What is ARO

A

Annualized Rate of Occurrence, estimate how often a threat or risk is likely to occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is ALE

A

Annual Lose Expectancy, average and estimated loss rate of devices to things like stolen property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is COPE

A

Company Owned Personally Enabled, When the company provides a Mobile device to an employee and can be used also as a personal device as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is CRL

A

Certificate Revocation List, a list of public key certificates that have been revoked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is CYOD

A

Choose Your Own Device, Hardware management model in cybersecurity that allows employees to select a pre-approved device from a company-provided list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

who is the Data Owner

A

The Person who owns the data in question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

who is the Data Controller

A

determines the purposes and means of processing personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

who is the data steward

A

define, implement, and enforce data management policies and procedures within their specific Data Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

who is the Data Processor

A

holds personal data on behalf of the data controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is DLP

A

Data Loss Prevention, the practice of preventing data breaches, exfiltration or unwanted destruction of sensitive Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is EAP

A

Extensible Authentication Protocol, used to authenticate information between Workstation and Authentication Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Federation based sign on

A

Variant of Single Sign On (SSO) that allows sign in without password. Uses trust between two well know servers/systems to authenticate the user who has already signed it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is HIPS

A

Host Intrusion Prevention system, this party software on the Host Machine to identify and prevent Malicious activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an HSM

A

Hardware Security Modules, Hardened tamper resistant hardware devices, by managing keys used for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Logic Bomb

A

Type of malicious code embedded in software that remains dormant until specific conditions are met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is MTTR

A

Mean Time to Repair, Time it would take to be able to repair equipment that breaks

17
Q

what is OCSP

A

Online Certificate Status Protocol, Alt to Certificate Revocation List (CRL) used to check whether Cert is valid or revoked.

18
Q

What is OCSP Stalping

A

an internet standard that allows us to check the validity status of X. 509 digital certificates.

19
Q

what is a On-Path Attack

A

place themselves between two devices (often a web browser and a web server) and intercept or modify communications between the two

20
Q

what is a Policy Engine

A

A software component that evaluates and enforces rules or policies within an organization or application

21
Q

what is a Policy Enforcment Point

A

protects objects, such as files, services, and applications, and enforces authorization decisions

22
Q

what is a PSK

A

Pre-Shared Key, security mechanism used in Wi-Fi Protected Access (WPA) to establish a secure connection between a wireless device and a Wi-Fi access point

23
Q

what is a Race Condition

A

software bug that can occur in a computing system when multiple operations need to be executed in a specific order, but the system doesn’t enforce that order

24
Q

what is a Responsibility Matrix

A

define and manage roles and responsibilities for tasks, milestones, and decisions

25
what is a Replay Attack
type of network attack where a cybercriminal intercepts and retransmits network communication between two parties
26
What is a SASE
Secure access service edge, framework for network architecture that brings cloud native security technologies
27
what is a supply chain attack
targets an organization's suppliers or third-party vendors to gain unauthorized access to their systems or data
28
what is a Secure Enclave
hardware-based component of a computing device that provides an extra layer of security to protect data
29
what is a SCAP
Security Content Automation Protocol, set of standards and protocols that help organizations improve their cybersecurity
30
what is a WAF
Web Application Firewall, Firewall that is web based for web servers and applications
31
what is a UTM
Unified Threat Management, when multiple security features or services are combined into a single device within your network
32
what is a Zeon Configuration
logical design approaches that control and limit access and data communication to certain users and components
33
what is 802.1X
LDAP Protocol method to use Local AD user credentials to authenticate to the WPA2-3 Wi-Fi connections within a Wi-Fi Network.