Ack Flashcards
NT LAN (NTLM)
Windows New Technology LAN Manager (NTLM) is an outmoded challenge-response authentication protocol from Microsoft. Still in use though succeeded by Kerberos, NTLM is a form of Single Sign-On (SSO) enabling users to authenticate to applications without submitting the underlying password
3DES
Triple Digital Encryption Algorithm (deprecated)
symmetric-key block cipher applies the DES cipher algorithm three times to each data block - 168 bits
AAA
Authentication, Authorization, and Accounting
It is used to refer to a family of protocols that mediate network access. Two network protocols providing this functionality are particularly popular: the RADIUS protocol, and its newer Diameter counterpart
ABAC
Attribute-based Access Control
also known as policy-based access control for IAM, defines an access control paradigm whereby access rights are granted to users through the use of policies
ACL
Access Control List
a list of permissions associated with a system resource
AD
Active Directory
access policies can be configured via GPOs Windows Active Directory network, users and devices can often auto-enroll with the CA just by authenticating to Active Directory
AES
Advanced Encryption Standard
specification for the encryption of electronic data
AES256
Advanced Encryption Standards 256bit
AES-256, which has a key length of 256 bits, supports the largest bit size and is practically unbreakable by brute force based on current computing power, making it the strongest encryption standard
AH
Authentication Header
provides message authentication and integrity but not confidentiality.
performs a cryptographic hash on the whole packet, including the IP header, plus a shared secret key (known only to the communicating hosts), and adds this HMAC in its header as an Integrity Check Value (ICV).
AIS
Automated Indicator Sharing
Threat intelligence data feed operated by the DHS.
Uses TAXII to transmit CTI data between servers and clients
ALE
Annualized Loss Expectancy
the amount that would be lost over the course of a year. This is determined by multiplying the SLE by the Annualized Rate of Occurrence (ARO)
AP
Access Point
device that provides a connection between wireless devices and can connect to wired networks. Also known as wireless access point or WAP
API
Application Programming Interface
A library of programming utilities used, for example, to enable software developers to access functions of the TCP/IP network stack under a particular operating system
APT
Advanced Persistent Threat
An attacker’s ability to obtain, maintain, and diversify access to network systems using exploits and malware.
Can evade signature-based detection
ARP
Address Resolution Protocol
maps a network interface’s hardware (MAC) address to an IP address.
ASLR
Address Space Layout Randomization
A memory-protection process - computer security technique involved in preventing exploitation of memory corruption vulnerabilities
ASP
Active Server Pages
Microsoft’s first server-side scripting language and engine for dynamic web pages.
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge
MITRE ATT&CK™ framework is a comprehensive matrix of tactics and techniques used by threat hunters, red teamers, and defenders to better classify attacks and assess an organization’s risk. Organizations can use the framework to identify holes in defenses, and prioritize them based on risk (TTP)
AUP
Acceptable Use Policy
set of rules applied by the owner, creator or administrator of a network, website, or service, that restrict the ways in which the network, website or system may be used and sets guidelines as to how it should be used
AV or A-V
Antivirus
prevent, detect, and remove malware