Ack2 Flashcards
CASB
Cloud Access Security Broker
enterprise management software designed to mediate access to cloud services by users across all types of devices
CBC
Cipher Block Chaining
ensures that no plaintext block produces the same ciphertext. CBC needs to use padding to ensure that the data to encrypt is an exact multiple of the block s
CBT
Computer-based Training
lets a student acquire skills & experience by completing various activities
CCMP
Counter-Mode/CBC-MAC Protocol
provides authenticated encryption, which is designed to make replay attacks harder
Cipher Block chaining encryption on the LAN
CERT
Computer Emergency Response Team
CFB
Cipher Feedback
CHAP
Challenge-Handshake Authentication Protocol
CIO
Chief Info Officer
CIRT
Computer Incident Response Team
CIS
Center for Internet Security
CMS
Content Management System
CN
Common Name
COOP
Continuity of Operations Planning
refers to the same sorts of activities when undertaken by a government agency, rather than a business
COPE
Corporate-owned Personally Enabled
CP
Contingency Planning
CRC
Cyclic Redundancy Check
a code added to data which is used to detect errors occurring during transmission, storage, or retrieval.
CRL
Certificate Revocation List
lets you know about suspended or revoked keys
CSA
Cloud Security Alliance
Industry body providing security guidance to CSP
CSIRT
Computer Security Incident Response Team
CSO
Chief Security Officer
CSP
Cloud Service Provider
CSR
Certificate Signing Request
Base64 ASCII file that a subject sends to a CA to get a certificate
Use for online CA and make the root an offline CA (to make it secure)
XSRF (CSRF)
Cross-Site Request Forgery
A malicious script hosted on the attacker’s site that can exploit a session started on another site in the same browser.
user unintentionally makes changes
CSU
Channel Service Unit WAN (wide area network port: used to connect to an internet source) router performs loopback testing
CTM
Counter-Mode
An encryption mode of operation where a numerical counter value is used to create a constantly changing IV
CCMP
CCMP (counter mode with cipher block chaining message authentication code protocol) An encryption protocol used for wireless LANs that addresses the vulnerabilities of the WEP protocol
CTO
Chief Technology Officer
CYOD
Choose Your Own Device
DAC
Discretionary Access Control
Access control model where each resource is protected by an Access Control List (ACL) managed by the resource’s owner
DDoS
Distributed Denial-of-Service
An attack that uses multiple compromised hosts (a botnet) to overwhelm a service with request or response traffic
DEP
Data Execution Prevention
system-level memory protection feature, Windows OS (legacy) mark pages as non-executable
helps prevent damage from viruses or malicious code exploits
NFC
Near-field Communication
A standard for peer-to-peer (2-way) radio communications over very short (around 4”) distances, facilitating contactless payment and similar technologies. Based on RFID
NFV
Network Function Virtualization
Provisioning virtual network appliances, such as switches, routers, and firewalls, via VMs and containers
NGFW
Next-Generation Firewall
NG-SWG
Next-Generation Secure Web Gateway
NIC
Network Interface Card
hardware component without which a computer cannot be connected over a network. It is a circuit board
NOC
Network Operations Center
monitor/manage network systems
NTFS
New Technology File System
Stores time values in UTC format used internally Controls storage space on a drive (store/read info on computer that’s not easily removed)
NTLM
New Technology LAN Manager
challenge-response authentication protocol created by Microsoft for use in its products
NTP
Network Time Protocol
Helps servers on a network & on the internet keep the correct time
OAUTH
Open Authentication
Standard for federated identity management, allowing resource servers or consumer sites to work with user accounts created and managed on a separate identity provider (let users give website their info w/o a PW)
OCSP
Online Certificate Status Protocol
Allows clients to request the status of a digital certificate, to check whether it is revoked.
OID
Object Identifier
used for attributes of digital certificates.
onboarding The process of bringing in a new employee, contractor, or supplier
OSI
Open System Interconnection
The 7 layers used for networks
OSINT
Open-source Intelligence
operate threat intelligence services on an open-source basis, earning income from consultancy
OSPF
Open Shortest Path First
link-state routing protocol providing fast convergence and excellent scalability
OT
Operational Technology network is established between embedded systems devices and their controllers. i.e. valves, motors, gauges, sensors DDoS can be used
OTA
Over-The-Air
updates can be delivered wirelessly, either through a Wi-Fi network or the data connection
OTG
On-The-Go
Android USB ports, allow a port to be a host or a device
Port
A number used to uniquely identify a transaction over a network by specifying both the host, and the service