Vocab Flashcards
(677 cards)
Acceptable Use Policy (AUP)
Policy governing an employees’ use of company equipment and Internet services.
ISPs may also apply AUPs to customers.
Access Badge
Authentication mechanism allowing a user to present a smart card to operate an entry system.
Access Control List (ACL)
Collection of access control entries (ACEs) determining which subjects are allowed or denied access to an object, with specified privileges.
Access Control Vestibule
Secure entry system with two gateways, only one open at a time.
(ex. being the section in-between the external and internal doors at a bank)
Access Point (AP)
Device connecting wireless devices and wired networks, implementing infrastructure mode WLAN.
Account Lockout
Policy preventing account access after excessive failed authentication attempts.
Account Policies
Rules governing user security information, such as password expiration and uniqueness.
Accounting
A log resource of some sort that tracks what a user has done.
Alerts when unauthorized use is detected or attempted.
(What did you do)
Acquisition/Procurement
Policies ensuring purchases and contracts are secure, authorized, and meet business goals.
Active Reconnaissance
Penetration testing techniques interacting directly with target systems.
Active Security Control
Detective and preventive security controls using agents or configurations to monitor hosts.
Ad Hoc Network
A wireless network where connected devices communicate directly with one another.
Address Resolution Protocol (ARP)
A broadcast mechanism matching a hardware MAC address to an IP address on a local network.
Advanced Persistent Threat (APT)
Attacker’s ability to maintain and diversify access to network systems using exploits and malware.
Adware
Software recording a user’s habits, often acknowledged by the user.
AES Galois Counter Mode Protocol (GCMP)
High-performance symmetric encryption mode offering authenticated encryption with associated data (AEAD).
Air-Gapped
Network isolation physically separating a host or network from others.
Alert Tuning
Process of adjusting detection rules to reduce false positives and low-priority alerts.
Algorithm
Operations that transform plaintext into ciphertext with cryptographic properties.
Allow Listing
Security configuration denying access unless the entity is on an allow list.
Amplification Attack
Network attack increasing bandwidth sent to a victim during a DDoS attack.
Analysis
Incident response process assessing indicators for validity, impact, and category.
Annualized Loss Expectancy (ALE)
Total annual cost of risk, calculated by multiplying SLE by ARO.
ARO X SLE = ALE
SLE (Single Loss Expectancy)
ARO (Annual Rate of Occurrence)
Annualized Rate of Occurrence (ARO)
Probability of a risk occurring, expressed as occurrences per year.