Abbreviations Flashcards

1
Q

AES

Cryptography

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wireless Technology

ATIM

A

Announcement Traffic Indication Messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ALE

A

Annual Loss Expectancy

SLE times ARO

SLE times ARO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

APT

A

Advanced Persistant Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ARO

GRC

A

Annual rate of Occurance

number of times a loss can occur within an year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

C2

A

Command to Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CASB

A

Cloud Access Security Broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CCM

A

Cloud Controls Matrix

CSA CCM - Cloud Security Aliance CCM - to assess the security posture of an organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CCMP

A

Cipher Block Chaining Message Authentication Code Protocol

Counter Mode Cipher Block Chaining Message Authentication Code Protocol (Counter Mode CBC-MAC Protocol) or CCM mode Protocol (CCMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CER

A

Cross Error Rate

used to determine the effectiveness of a control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CHAP

A

Challenge Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CIS-RAM

A

Center for Internet Security - Risk Assessment Method

to evaluate the overall security posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CRL

issued by Certificate Authority(CA)

A

Certificate Revocation List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CSF

A

Cybersecurity Framework

NIST CSF - security policy to assess and improve the ability to prevent, detect and respond to cybersecurity attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CVE

A

Common Vulnerabilities and Exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CVSS

A

Common Vulnerability Scoring System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DDoS

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DES

A

Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DNS

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

EAP

A

Extensible Authentication Protocol

802.1x - allows multiple authentication methods to permit users access LAN &WLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

EAP-AKA

A

EAP Authentication and Key Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

EAP-EKE

A

EAP Encrypted Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

EAP-FAST

A

EAP Flexible Authentication via Secure Tunneling

Cisco Proprietory - designed to replace LEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

EAP-GTC

A

EAP Generic Token Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

EAP-IKEv2

A

EAP Internet Key Exchange v2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

EAP-NOOB

A

Nible out-of-band Authentication for EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

EAP-PSK

A

EAP Pre-Shared Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

EAP-SIM

A

EAP Subscriber Identity Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

EAP-TLS

A

EAP Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

EAP-TTLS

A

EAP Tunneled Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

ECDHE

A

Elliptic Curve Diffie-Hellman Ephemeral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

EF

A

Exposure Factor

This is the percentage of the asset value that would be lost as a result of a threat. This is used to calculate SLE. SLE = Asset Value X EF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

ESP

A

Encapsulation Security Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

FAR

A

False Acceptance Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

FRR

A

False Rejection Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

FTPES

A

Explicit FTP over SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

FTPS

A

FTP over SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

GDPR

A

General Data Protection Regulation

Regulation in EU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

GRC

A

Governance, risk and compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

HIPAA

A

Health Insurence Portability & Accountability Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

HIPS

A

Host based Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

HMAC

A

Hash-based message authentication code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

HOTP

A

HMAC-Based One-Time Password Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

HPKP

A

HTTP Public Key Pinning

an obsolete Internet security mechanism delivered via an HTTP header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

HSM

A

Hardware Security Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

HVAC

A

Heating, Ventilation & Air Conditioning

50
Q

IA

A

Information Assurance

51
Q

IaaS

A

Infrastructure as a Service

52
Q

IAM

A

Identity & Access Management

53
Q

ICMP

A

Internet Control Message Protocol

Supporting protocol in the Internet protocol suite.

It is used by network devices, including routers, to send error messages and operational information

54
Q

ICV

A

Integrity Check Value

55
Q

IDS

A

Intrusion Detection System

56
Q

IPS

A

Intrusion Prevention System

57
Q

ISFW

A

Internal Segmentation Firewall

58
Q

LEAP

A

Lightweight EAP

59
Q

MDA

A

Message Digest Algorithm

Also known as md5

The MD5 hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length digest value to be used for authenticating the original message.

60
Q

MitM

A

Man-in-the-Middle

61
Q

MoU

Done before any engagement.

A

Memorandum of Understanding

used during the priliminary discussions stage between two merging/parterning businesses

62
Q

MTBF

A

Mean Time Between Failures

provides a measure of a system’s average reliability and is measured in hours. This is used to measure for repairable assets

63
Q

MTTF

A

Mean Time To Failure

used to measure the non-repairable assets

64
Q

MTTR

A

Mean Time To Recover

is the average time it takes to restore a system after an outage.

65
Q

NFC

A

Near Field Communication

NFC doesn’t provide encryption, so eavesdropping and MitM attacks are possible.

66
Q

NGFW

A

Next Generation Firewall

67
Q

NIST

A

National Institute of Standards & Technology

68
Q

OCSP

It is an Internet Protocol (IP) that certificate authorities (CAs) use to determine the status of secure sockets layer/transport layer security (SSL/TLS) certificates

A

Online Certificate Status Protocol

69
Q

OIDC

an authenticaiton protocol

A

Open ID Connect

is an authentication protocol, providing authenticaiton for federated applications

70
Q

OSINT

A

Open Source Intelligence

71
Q

PaaS

A

Platform as a Service

72
Q

PAP

It is a basic authenticaiton mechanism.

A

Password Authentication Protocol

an unsophisticated authentication method used as the basic authentication mechanism in HTTP. It relies on clear-text password exchange.

73
Q

PAT

in layer 3

A

Port Address Translation

Similar to NAT

74
Q

PCI-DSS

GRC

A

Payment Card Industry Data Security Standard

75
Q

PEAP

A

Protected EAP

76
Q

PFS

Cryptography

A

Perfect Forward Secrecy

77
Q

PII

GRC

A

Personally Identifiable Information

78
Q

POP3

A

PostOffice Protocol V3

79
Q

PPP

A

Point-to-Point Protocol

80
Q

PUP

A

Potentially Unwanted Program

81
Q

QoS

A

Quality of Service

802.1p

82
Q

RADIUS

A

Remote Authentication Dial Up

used primarily for network access control

83
Q

RASP

Security mechanism

A

Runtime Application Self Protection

84
Q

RBAC

Technical Control

A

Role Based Access Control

85
Q

RCE

A

Remote Code Execution

86
Q

RoR

A

Rate of Return

87
Q

RPO

A

Recovery Point Objective

identifies a point in time that data loss is acceptable. In the event of a system failure, the company may lose some data, but the RPO is the last seven days.

88
Q

RRset

A

Resource Records set

89
Q

RSA

Cryptography

A

Rivest, Shamir, Adleman

Widely used, but it’s no more secure

90
Q

RTO

GRC

A

Recovery Time Objective

identifies the maximum time it takes to recover a system in the event of an outage. for example Eight hours to restore represent the RTO.

91
Q

RTP

A

Real-time Transport Protocol

92
Q

S/MIME

A

Secure Multipart Internet Message Extensions

to sign & encrypt mail messages using an email certificate

93
Q

SaaS

A

Software as a Service

94
Q

SECaas

A

Security as a Service

95
Q

SED

Cryptography

A

Self Encrypting Drive

96
Q

SFTP

A

Secure Shell FTP

97
Q

In Cryptography

SHA

A

Secure Hash Algorithm

SHA & salt are part of key stretching process

98
Q

SIP

A

Session Initiation Protocol

99
Q

SLE

GRC

A

Single Loss Expectancy

cost of any single item loss. SLE = AV X EF

100
Q

SOAR

A

Security Orchestration, Automation & Response

101
Q

SoC

A

System on a Chip

102
Q

SOC

A

Security Operations Center

103
Q

SRTP

A

Secure RTP

Used for Video and VOIP calls

104
Q

SSO

A

Single Sign-On

105
Q

SSRF

A

Server Side Request Forgery

106
Q

SWG

A

Secure Web Gateway

107
Q

TACACS+

A

Terminal Access Controller Access-Control System Plus

specifically designed for network administration of routers. TACACS+ performs authentication, authorization, and accounting functions better than RADIUS

108
Q

TEAP

A

Tunnel Extensible Authentication Protocol

109
Q

TLS

A

Transport Layer Security

110
Q

TOTP

A

Time based One Time Password Algorithm

111
Q

TPM

A

Trusted Platform Module

112
Q

TTP

A

Tactics, Techniques & Procedures

113
Q

UBA

A

User Behaviour Analytics

114
Q

UTM

A

Unified Threat Management

115
Q

WAP

A

Wireless Application Protocol

116
Q

WAS

A

Web Application Security

117
Q

XSS

A

Cross-Site Scripting

118
Q

ZTNA

A

Zero Trust Network Access

119
Q

PMK

Cryptography

A

Pairwise Master Key

120
Q

BSS

A

Basic Service Set

121
Q

IBSS

A

Independent BSS