A Flashcards
Acceptable Use Policy (AUP)
A document that provides network and system users with a clear direction on permissible uses of information resources.
Access badges
Used for entry access via magnetic stripe and radio frequency ID access system and when including a picture, allows personal to determine if the person is who they say they are.
Access control list (ACL)
Rule that either permits or denies actions?
What does ACL mean?
Access control list (ACL) and it is a rule that either permits or denies actions.
Access restrictions
Security measures that limit the ability of individuals or systems to access sensitive information or resources.
Account Lockout
Accounts are often locked out after failed login attempts. Maybe an indictor of compromised because of brute force.
Acknowledgement
Ensuring that employees and business partners state that they are aware of the compliance requirements.
Active/active load balancer
A kind of load balancer that brings backup or secondary systems online when an active system is removed or fails to respond properly to a health check. 2
Active reconnaissance
A technique that directly engages the target in intelligence gathering.
Ad Hoc reports
Reports that are produced as needed
Ad Hoc risk assessment
Conducted in response to a specific event or situation.
802.1X
The IEEE standard that defines port-based security for network access control 2
Adaptive identity
Often called adaptive authentication, it leverages context-based authentication that considers data points like where the user is logging in from, what device they are logging in from, and whether the device meets security and configuration requirements. 3
Address resolution protocol (ARP)
A protocol that provides translations between MAC addresses and IP addresses on a local network.
Adversarial artificial intelligence (AI)
The use of artificial intelligence techniques by attackers for malicious purposes.
Adversary tactics, techniques, and procedures (TTPs)
The study of the methods used by cyber security adversaries when engaging in attacks. 3
Agents
Software that is deployed to endpoints allowing them to perform actions or to be controlled by central server or services. 3
Agent based scanning
The use of software agents installed on target devices to assist with vulnerability scans.
Agile
A software development model that is both iterative and incremental.
Agility
The speed to provision cloud resource and ability to use them for short periods of time.
Advance Persistent Threats (APT)
Cybersecurity adversary characterized by a sophisticated series of related attacks taking placed over an extended period of time.3