Ack5 Flashcards
OVAL
Open Vulnerability and Assessment Language
XML Schema for describing system security state & querying vulnerability reports
OWASP
Open Web Application Security Project
keep up to date with specific attack methods and new types of attacks
P12
PKCS#12
type of certificate format used to transfer your private key and certificate from one Windows host computer to another
PKCS
(public key cryptography standards)
Series of standards defining the use of certificate authorities and digital certificates
Promote PKI use
P2P
Peer-to-Peer
A point-to-point topology is one where two nodes have a dedicated connection to one another. In a point-to- multipoint topology, a central node mediates links between remote nodes
PaaS
Platform as a Service
computing method that uses the cloud to provide any platform-type services (aka Hardware + SW)
PAC
Proxy Auto Configuration
A script that allows a client to configure proxy (access) settings without user intervention
i.e. Will the web request go to the destination or a server?
PAM
Privileged Access Management
Pluggable Authentication Modules (linux access)
PAP
Password Authentication Protocol
unsophisticated authentication method, HTTP-cleartext
PBKDF2
Password-based Key Derivation Function 2
Key stretching algorithm
PBX
Private Branch Exchange
interface between the VoIP network and external telephone and cellular networks
PCAP
Packet Capture
file format for tcpdump & tcpreplay
PCI DSS
Payment Card Industry
Data Security Standard
PDU
Power Distribution Unit
PE
Portable Executable
file format for executables
PEAP
Protected Extensible Authentication Protocol
EAP implementation that uses a server-side certificate to create a secure tunnel for user authentication
PED
Portable Electronic Device
PEM
Privacy Enhanced Mail
PFS
Perfect Forward Secrecy
ensures if a key is compromised the compromise will only affect a single session, not let data from other session get recovered
PGP
Pretty Good Privacy
alt. to PKI
PIV
Personal Identity Verification
Gov’t Smart Card resistant to tampering and provides quick electronic authentication of the card’s owner.
PKCS
Public Key Cryptography Standards
standards defining the use of certificate authorities and digital certificates
PKI
Public Key Infrastructure
Framework of certificate authorities, digital certificates, software, services, and other cryptographic components deployed for the purpose of validating subject identities
PoC
Proof of Concept
POP
Post Office Protocol
mailbox protocol designed to store themessages delivered by SMTP on a server
POTS
Plain Old Telephone Service
PPP
Point-to-Point Protocol
provides encapsulation for IP traffic plus IP address assignment and authentication via the widely supported (CHAP)
PPTP (obsolete)
Point-to-Point Tunneling Protocol
Support VPN over PPP & TCP/IP, vulnerable to PW cracking
PSK
Pre-shared Key
Passphrase to generate the key that is used to encrypt communications. aka Group Authentication share the same secret
PTZ
Pan-Tilt-Zoom
PUP
Potentially Unwanted Program
Software that cannot definitively be classed as malicious, but may not have been chosen by or wanted by the user
QoS
Quality of Service
RA
Registration Authority
In PKI, an authority that accepts requests for digital certificates and authenticates the entities making those requests
RAD
Rapid Application Development
RADIUS
Remote Authentication Dial-in User Service
manage remote and wireless authentication infrastructures
RAS
Remote Access Server
allows users to gain access to files and print services on the LAN from a remote location
RAT
Remote Access Trojan
Malware that creates a backdoor
RCS
Rich Communication Service
platform-independent advanced messaging app for video calling or large file attachments
RFC
Request for Comments
when a new technology is accepted as a web standard, it is published as an RFC by the W3C
RFID
Radio Frequency Identifier
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
cryptographic hash functions
RPO
Recovery Point Objective
amount of data loss that a system cansustain, measured in time
RSA
first successful algorithm for public key encryption
Asymmetric
RTBH
Remotely Triggered Black Hole
area of the network that cannot reach any other part of the network
RTO
Recovery Time Objective
period following a disaster that an individual IT system may remain offline. This represents the amount of time it takes to identify
that there is a problem and then perform recovery
RTOS
Real-Time Operating System
type of OS that prioritizes deterministic execution of operations to ensure consistent response for time-critical tasks
RTP
Real-time Transport Protocol
Opens a data stream for video and voice applications over UDP.
S/MIME
Secure/Multipurpose Internet Mail Extensions
An email encryption standard that adds digital signatures and public key cryptography
SaaS
Software as a Service
cloud the app/software needed