Ack4 Flashcards
HOTP
HMAC-based One-Time Password
algorithm for token-based (smart card or QR code) authentication
HSM
Hardware Security Module
An appliance for generating & storing cryptographic keys. It is designed to be tamper-evident to mitigate against insider threat risks.
HSMaaS
Hardware Security Module as a Service
IaaS
Infrastructure as a Service
computing method that uses the cloud to provide any or all infrastructure needs
IAM
Identity and Access Management
A security process that provides identification, authentication, and authorization mechanisms for users, computers, and other entities to work with organizational assets like networks, operating systems, and applications
ICMP
Internet Control Message Protocol
use with ping
ICS
Industrial Control Systems
IDEA
International Data Encryption Algorithm
IDF
Intermediate Distribution Frame
IdP
Identity Provider
user auth’d to identity provider for a crypto-token
IDS
Intrusion Detection System
IEEE
Institute of Electrical & Electronics Engineers
IKE
Internet Key Exchange
Framework for creating a Security Association (SA) used with IPSec. An SA establishes that two hosts trust one another (authenticate) and agree secure protocols and cipher suites to use to exchange data
IM
Instate Messaging
IMAP4
Internet Message Access Protocol v4
IoC
Indicators of Compromise
IoT
Internet of Things
IP
Internet Protocol
IPS
Intrusion Prevention System
IPSec
Internet Protocol Security
IR
Incident Response
IRC
Internet Relay Chat
IRP
Incident Response Plan
ISA
Interconnection Security Agreement
Federal agency interconnecting IT to a 3rd party. Sets security risk awareness & security controls
ISFW
Internal Segmentation Firewall
ISO
International Organization for Standardization
ISP
Internet Service Provider
ISSO
Information Systems Security Officer
ITCP
IT Contingency Plan
IV
Initialization Vector
KDC
Key Distribution Center
KEK
Key Encryption Key
L2TP
Layer 2 Tunneling Protocol
LAN
Local Area Network
A bunch of computers linked together (like in a school, residence, or office)
Allow shared access to printers, files, …
IP
Addresses in computer networks
Consists of two components: the network address and the host address.
The network address finds the subnet the computer or the device is located
The host address finds the computer or the device in the subnet
LDAP
Lightweight Directory Access Protocol
An application attack that targets web-based applications by fabricating LDAP statements that are typically created by user input
LEAP
Lightweight Extensible Authentication Protocol Cisco EAP (wireless authentication framework -not a way to auth) Implementation
MaaS
Monitoring as a Service
Cloud service providing ongoing security and availability monitoring of on-premises and/or cloud-based hosts and services
MAC
Media Access Control
identifies that device from every other globally
MAM
Mobile Application Management
MAN
Metropolitan Area Network
MBR
Master Boot Record
MD5
Message Digest Algorithm V5
cryptographic hash function producing a
128-bit output
MDF
Main Distribution Frame
connect equipment to cables
MDM
Mobile Device Management
MFA
Multifactor Authentication
MFD
Multifunction Device
MFP
Multifunction Printer
MITM
Man-in-the-Middle
A form of eavesdropping where the attacker makes an independent connection between two victims and steals information to use fraudulently
MEF
Mission Essential Function
Business activity too critical to be deferred for longer than a few hours