Abbreviations Flashcards
AES
Cryptography
Advanced Encryption Standard
AH
Authentication Header
Wireless Technology
ATIM
Announcement Traffic Indication Messages
ALE
Annual Loss Expectancy
SLE times ARO
SLE times ARO
APT
Advanced Persistant Threat
ARO
GRC
Annual rate of Occurance
number of times a loss can occur within an year
ARP
Address Resolution Protocol
C2
Command to Control
CASB
Cloud Access Security Broker
CCM
Cloud Controls Matrix
CSA CCM - Cloud Security Aliance CCM - to assess the security posture of an organisation
CCMP
Cipher Block Chaining Message Authentication Code Protocol
Counter Mode Cipher Block Chaining Message Authentication Code Protocol (Counter Mode CBC-MAC Protocol) or CCM mode Protocol (CCMP)
CER
Cross Error Rate
used to determine the effectiveness of a control
CHAP
Challenge Handshake Authentication Protocol
CIS-RAM
Center for Internet Security - Risk Assessment Method
to evaluate the overall security posture
CRL
issued by Certificate Authority(CA)
Certificate Revocation List
CSF
Cybersecurity Framework
NIST CSF - security policy to assess and improve the ability to prevent, detect and respond to cybersecurity attacks
CVE
Common Vulnerabilities and Exposures
CVSS
Common Vulnerability Scoring System
DDoS
Distributed Denial of Service
DES
Data Encryption Standard
DLP
Data Loss Prevention
DNS
Domain Name System
EAP
Extensible Authentication Protocol
802.1x - allows multiple authentication methods to permit users access LAN &WLAN
EAP-AKA
EAP Authentication and Key Agreement
EAP-EKE
EAP Encrypted Key Exchange
EAP-FAST
EAP Flexible Authentication via Secure Tunneling
Cisco Proprietory - designed to replace LEAP
EAP-GTC
EAP Generic Token Card
EAP-IKEv2
EAP Internet Key Exchange v2
EAP-NOOB
Nible out-of-band Authentication for EAP
EAP-PSK
EAP Pre-Shared Key
EAP-SIM
EAP Subscriber Identity Module
EAP-TLS
EAP Transport Layer Security
EAP-TTLS
EAP Tunneled Transport Layer Security
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
EF
Exposure Factor
This is the percentage of the asset value that would be lost as a result of a threat. This is used to calculate SLE. SLE = Asset Value X EF
ESP
Encapsulation Security Payload
FAR
False Acceptance Rate
FRR
False Rejection Rate
FTPES
Explicit FTP over SSL
FTPS
FTP over SSL
GDPR
General Data Protection Regulation
Regulation in EU
GRC
Governance, risk and compliance
HIPAA
Health Insurence Portability & Accountability Act
HIPS
Host based Intrusion Prevention System
HMAC
Hash-based message authentication code
HOTP
HMAC-Based One-Time Password Algorithm
HPKP
HTTP Public Key Pinning
an obsolete Internet security mechanism delivered via an HTTP header
HSM
Hardware Security Module