Ack3 Flashcards
DER
Distinguished Encoding Rules
binary format used to structure the information in a digital certificate
DES
Data Encryption Standard
DHCP
Dynamic Host Configuration Protocol
Only one server should be offering up IP addresses. a rogue can DoS or snoop, or starve (repeat IP requests)
DHE
Diffie-Hellman Ephemeral
DKIM
Domain Keys Identified Mail
DLL
Dynamic Link Library
DLP
Data Loss Prevention
DMARC
Domain Message Authentication Reporting & Conformance
DMZ
Demilitarized Zone
DNAT
Destination Network Address Transaction
NAT service where private Internal addresses are mapped to one or more public addresses to facilitate Internet connectivity for hosts on a local network via a router
DNS
Domain Name Systen
Ph book of the internet
DNSSEC
Domain Name System Security Extensions
A security protocol that provides authentication of DNS data and upholds DNS data integrity
DoS
Denial-of-service
Any type of physical, application, or network attack that affects the availability of a managed resource.
DPO
Data Protection Officer
DRP
Disaster Recovery Plan
DSA
Digital Subscriber Line (internet access over voice lines)
EAP
Extensible Authentication Protocol
Authenticate clients & LAN
ECB
Electronic Code Book
first generation of the AES. It is the most basic form of block cipher encryption
ECC
Elliptic-curve Cryptography
An asymmetric encryption algorithm that leverages the algebraic structures of elliptic curves over finite fields to derive public/private key pairs.
ECC
ECDHE
ECDSA
Elliptic-curve Crytpography
Elliptic-curve Diffie-Helman Ephemeral
Elliptic-curve Digital Signature Algorithm
EDR
Endpoint Detection & Response
software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats
EFS
Encrypted File System
EIP
Extended Instruction Pointer
EOL
End of Life
Product life cycle phase where sales are discontinued and support options reduced over time
EOSL
End of Service Life
Product life cycle phase where support is no longer available from the vendor.
ERP
Enterprise Resource Planning
ESN
Electronic Serial Number
ESP
Encapsulating Security Payload
IPSec sub-protocol that enables encryption and authentication of the header and payload of a data packet.
FDE
Full Disk Encryption
FACL
File System Access Control List
FIM
File Integrity Monitoring
software that reviews system files to ensure that they have not been tampered with
FPGA
Field Programmable Gate Array A processor (microcontroller) that can be programmed to perform a specific function by a customer rather than at the time of manufacture
FRR
False Rejection Rate
FTP
File Transfer Protocol
FTPS
Secured File Transport Protocol
GCM
Galois/Counter Mode
A mode of block chained encryption that provides message authenticity for each block.
Replaced AES CCMP
GDPR
General Data Protection Regulation
Provisions and requirements protecting the personal data of European Union (EU) citizens
US is Privacy Shield Requirements
GPG
GNU Privacy Guard
GPO
Group Policy Object
used to configure access rights
a way to deploy per user and per-computer settings such as password policy, account restrictions, firewall status
GPU
Graphic Processing Unit
GRE
Generic Routing Encapsulation
HA
High Availability
HDD
Hard Disk Drive
HIDS
Host-based Intrusion Detection System
HIPS
Host-based Intrusion Prevention System
HMAC
Hash-based Message Authentication Code
method used to verify both the integrity & authenticity of a message by combining a cryptographic hash of the message with a secret key
EPP
(endpoint protection platform) A software agent and monitoring system that performs multiple security tasks.
ERM
(enterprise risk management) The comprehensive process of evaluating, measuring, and mitigating the many risks that pervade an organization