Ack4 Flashcards

1
Q

HOTP

A

HMAC-based One-Time Password

algorithm for token-based (smart card or QR code) authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HSM

A

Hardware Security Module
An appliance for generating & storing cryptographic keys. It is designed to be tamper-evident to mitigate against insider threat risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HSMaaS

A

Hardware Security Module as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IaaS

A

Infrastructure as a Service

computing method that uses the cloud to provide any or all infrastructure needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IAM

A

Identity and Access Management
A security process that provides identification, authentication, and authorization mechanisms for users, computers, and other entities to work with organizational assets like networks, operating systems, and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ICMP

A

Internet Control Message Protocol

use with ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ICS

A

Industrial Control Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IDEA

A

International Data Encryption Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IDF

A

Intermediate Distribution Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IdP

A

Identity Provider

user auth’d to identity provider for a crypto-token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IDS

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IEEE

A

Institute of Electrical & Electronics Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IKE

A

Internet Key Exchange

Framework for creating a Security Association (SA) used with IPSec. An SA establishes that two hosts trust one another (authenticate) and agree secure protocols and cipher suites to use to exchange data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IM

A

Instate Messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IMAP4

A

Internet Message Access Protocol v4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IoC

A

Indicators of Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IoT

A

Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IP

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IPS

A

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IPSec

A

Internet Protocol Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IR

A

Incident Response

22
Q

IRC

A

Internet Relay Chat

23
Q

IRP

A

Incident Response Plan

24
Q

ISA

A

Interconnection Security Agreement

Federal agency interconnecting IT to a 3rd party. Sets security risk awareness & security controls

25
ISFW
Internal Segmentation Firewall
26
ISO
International Organization for Standardization
27
ISP
Internet Service Provider
28
ISSO
Information Systems Security Officer
29
ITCP
IT Contingency Plan
30
IV
Initialization Vector
31
KDC
Key Distribution Center
32
KEK
Key Encryption Key
33
L2TP
Layer 2 Tunneling Protocol
34
LAN
Local Area Network A bunch of computers linked together (like in a school, residence, or office) Allow shared access to printers, files, ...
35
IP
Addresses in computer networks Consists of two components: the network address and the host address. The network address finds the subnet the computer or the device is located The host address finds the computer or the device in the subnet
36
LDAP
Lightweight Directory Access Protocol An application attack that targets web-based applications by fabricating LDAP statements that are typically created by user input
37
LEAP
``` Lightweight Extensible Authentication Protocol Cisco EAP (wireless authentication framework -not a way to auth) Implementation ```
38
MaaS
Monitoring as a Service Cloud service providing ongoing security and availability monitoring of on-premises and/or cloud-based hosts and services
39
MAC
Media Access Control | identifies that device from every other globally
40
MAM
Mobile Application Management
41
MAN
Metropolitan Area Network
42
MBR
Master Boot Record
43
MD5
Message Digest Algorithm V5 cryptographic hash function producing a 128-bit output
44
MDF
Main Distribution Frame | connect equipment to cables
45
MDM
Mobile Device Management
46
MFA
Multifactor Authentication
47
MFD
Multifunction Device
48
MFP
Multifunction Printer
49
MITM
Man-in-the-Middle A form of eavesdropping where the attacker makes an independent connection between two victims and steals information to use fraudulently
50
MEF
Mission Essential Function | Business activity too critical to be deferred for longer than a few hours