A Flashcards

1
Q

AAA

A

Authentication, Authorization, and Accounting

A security framework that controls access to computer resources, enforces policies, and audits usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List

A set of rules that can be used to control access to digital environments and network traffic in computer security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standard

A symmetric block cipher chosen by the US govt to protect classified information. One of the most robust encryption methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES-256

A

Advanced Encryption Standard 256-bit

A symmetric block cipher used to protect sensitive information. One of the most robust encryption methods. The key size is 256 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AH

A

Authentication Header

An HTTP header that verifies the identity and permissions of the requester. It carries authentication credentials or access tokens to authorize and validate requests. This proves the sender’s identity.

This header also contains a checksum that can verify the message’s integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AI

A

Artificial Intelligence

The simulation of human intelligence processes by machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AIS

A

Automated Indicator Sharing

A free service that allows the real-time exchange of cyber threat indicators (CTIs) and defensive measures (DMs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE

A

Annualized Loss Expectancy

A quantitative metric used to estimate the impact of potential cybersecurity threats/vulnerabilities over a year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

Access Point

A device that logically connects wireless client devices to one another and provides access to a distribution system, usually an organization’s enterprise wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

API

A

Application Programming Interface

A mechanism that enables software components to communicate with each other using a set of definitions and protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT

A

Advanced Persistent Threat

An attack campaign in which an intruder or team of intruders establishes an illicit, long-term presence on a network in order to mine highly sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARO

A

Annualized Rate of Occurrence

The likelihood of a risk/threat occurring in a given year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP

A

Address Resolution Protocol

A network protocol that maps IP addresses to MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge

A curated knowledge base and model for cyber adversary behavior. Used for threat modeling and security defense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AUP

A

Acceptable Use Policy

A document that outlines guidelines for how an organization’s resources should be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AV

A

Antivirus

A type of security software that detects, quarantines, or blocks malware from running on devices.