Ack Flashcards

1
Q

NT LAN (NTLM)

A

Windows New Technology LAN Manager (NTLM) is an outmoded challenge-response authentication protocol from Microsoft. Still in use though succeeded by Kerberos, NTLM is a form of Single Sign-On (SSO) enabling users to authenticate to applications without submitting the underlying password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3DES

A

Triple Digital Encryption Algorithm (deprecated)

symmetric-key block cipher applies the DES cipher algorithm three times to each data block - 168 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AAA

A

Authentication, Authorization, and Accounting
It is used to refer to a family of protocols that mediate network access. Two network protocols providing this functionality are particularly popular: the RADIUS protocol, and its newer Diameter counterpart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ABAC

A

Attribute-based Access Control
also known as policy-based access control for IAM, defines an access control paradigm whereby access rights are granted to users through the use of policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ACL

A

Access Control List

a list of permissions associated with a system resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AD

A

Active Directory
access policies can be configured via GPOs Windows Active Directory network, users and devices can often auto-enroll with the CA just by authenticating to Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES

A

Advanced Encryption Standard

specification for the encryption of electronic data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AES256

A

Advanced Encryption Standards 256bit
AES-256, which has a key length of 256 bits, supports the largest bit size and is practically unbreakable by brute force based on current computing power, making it the strongest encryption standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AH

A

Authentication Header
provides message authentication and integrity but not confidentiality.

performs a cryptographic hash on the whole packet, including the IP header, plus a shared secret key (known only to the communicating hosts), and adds this HMAC in its header as an Integrity Check Value (ICV).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AIS

A

Automated Indicator Sharing
Threat intelligence data feed operated by the DHS.
Uses TAXII to transmit CTI data between servers and clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ALE

A

Annualized Loss Expectancy
the amount that would be lost over the course of a year. This is determined by multiplying the SLE by the Annualized Rate of Occurrence (ARO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AP

A

Access Point
device that provides a connection between wireless devices and can connect to wired networks. Also known as wireless access point or WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

API

A

Application Programming Interface
A library of programming utilities used, for example, to enable software developers to access functions of the TCP/IP network stack under a particular operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

APT

A

Advanced Persistent Threat
An attacker’s ability to obtain, maintain, and diversify access to network systems using exploits and malware.
Can evade signature-based detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP

A

Address Resolution Protocol

maps a network interface’s hardware (MAC) address to an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ASLR

A

Address Space Layout Randomization
A memory-protection process - computer security technique involved in preventing exploitation of memory corruption vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ASP

A

Active Server Pages

Microsoft’s first server-side scripting language and engine for dynamic web pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge
MITRE ATT&CK™ framework is a comprehensive matrix of tactics and techniques used by threat hunters, red teamers, and defenders to better classify attacks and assess an organization’s risk. Organizations can use the framework to identify holes in defenses, and prioritize them based on risk (TTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AUP

A

Acceptable Use Policy
set of rules applied by the owner, creator or administrator of a network, website, or service, that restrict the ways in which the network, website or system may be used and sets guidelines as to how it should be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AV or A-V

A

Antivirus

prevent, detect, and remove malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BASH

A

Bourne Again Shell
A command shell and scripting language for Unix-like system
Found in DMZ

22
Q

BCP

A

Business Continuity Planning
identifies controls and processes that enable an organization to maintain critical workflows in the face of some adverse event

23
Q

BIA

A

Business Impact Analysis

process of assessing what losses might occur for a range of threat scenarios

24
Q

BGP

A

Border Gateway Protocol
exterior gateway protocol designed to exchange routing and reachability information between autonomous systems (AS) on the Internet
Decides which network your local router should hookup with. (think matchmaker)

25
BIOS
Basic Input/Output System Firmware—vulnerabilities can exist in the BIOS/UEFI firmware that controls the boot process for PCs. "the program a computer's microprocessor uses to start the computer system after it is powered on"
26
BPA
Business Partnership Agreement | Agreement by two companies to work together closely
27
BPDU
Bridge Protocol Data Unit Switch port security feature that disables the port if it receives BPDU notifications related to spanning tree. This is configured on access ports where there any BPDU frames are likely to be malicious Messages exchanged between switches inside a LAN; prevents looping
28
BSSID
Basic Service Set Identifier | Each WAP is identified by its MAC address, BSSID is the MAC address of a wireless point
29
BYOD
Bring Your Own Device
30
CA
Certificate Authority | entity responsible for issuing and guaranteeing certificates
31
CAC
Common Access Card | smart card that provides certificate-based authentication and supports two-factor authentication
32
CAPTCHA
Completely Automated Public Turing | Test to Tell Computers and Humans Apart
33
CAR
Corrective Action Report | actions adopted to eliminate the problem from occurring again
34
ML
Machine Learning
35
MMS
Multimedia Message Service
36
MOA
Memorandum of Agreement | written (legal) document describing a cooperative relationship between two parties wishing to work together
37
MOU
Memorandum of Understanding | Intent to work together (informal, not binding)
38
MPLS
Multiprotocol Label Switching Developed by Cisco data forwarding technology that increases the speed and controls the flow of network traffic. A VPN (not part of public internet) that directs data from one node to the next using short path labels instead of long network addresses.
39
MSA
Measurement System Analysis | Cyber, Evaluates the data collection and statistical methods used by a quality management process
40
MSCHAP
MS Challenge Handshake Authentication Protocol
41
MSP
Managed Service Provider a third-party company that provides network, application and system management services to enterprises with a pay-as-you-go pricing model
42
MSSP
Managed Security Service Provider fully outsourcing responsibility for information assurance to a third party. Expensive but can be a good fit for an SME that has experienced rapid growth and has no in-house security capability
43
MTBF
Mean Time Between Failures
44
MTTF
Mean Time to Failure
45
MTTR
Mean Time to Repair
46
MTU
Maximum Transmission Unit | limits data packet size on a network
47
NAC
Network Access Control Keeps unauthorized users and devices out of a private network 802.1X standard
48
NAS
Network-attached Storage storage device connected to a network that allows storage and retrieval of data from a centralized location for authorized network users
49
NAT
Network Address Translation | used to enable multiple hosts on a private network to connect to the Internet using a single public IP address
50
NDA
Non-disclosure Agreement