Acronym Flashcards

1
Q

AAA

A

Authentication, Authorization, Accounting:

  1. Authentication has 2 components: Identification (Username or email address) and the authentication factor (Something you know, Something you have, Something you are, Somewhere you are or are not, Something you do)
  2. Authorization: the rights and privileges assigned to a user to be able to perform their job.
  3. Accounting or Auditing: Accounting is the process of recording system activities and resource access. Auditing is part of accounting where an administrator examines logs of what was recorded.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ABAC

A

Attribute-based Access Control:

Access control based on different attributes: group membership, OS being used, IP address, the presence of up-to-date patches and anti-malware, geographic location. Typically used in an SDN (Software Defined Network).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A

Advanced Encryption Standard:

A symmetric block cipher. Three different block sizes; 128, 192, & 256 bit. Used in BitLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ALE

A

Annual Loss Expectancy:

The amount of money an organization would lose over the course of a year. The formula is the SLE (Single Loss Expectancy) times the ARO (Annual Rate of Occurrence). SLE x ARO = ALE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AP

A

Access Point:

Sometimes referred to as a WAP (Wireless Access Point). An AP is a bridge between wireless and wired networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

API

A

Application Programming Interface:

A software module or component that identifies inputs and outputs for an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

APT

A

Advanced Persistent Threat:

An attack that uses multiple attack vectors, attempt to remain hidden as to maintain a connection to compromised systems. You can normally tie this to nation-states (foreign countries)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARO

A

Annual Rate of Occurrence:

The number of times a year that a particular loss occurs. It is used to measure risk with ALE and SLE in a quantitative risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARP

A

Address Resolution Protocol:

Matches the MAC address to a known IP address. Easily spoofed, used in MITM (Man-in-the-Middle) attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ASCII

A

American Standard Code for Information Interchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ATT&CK

A

Adversarial Tactics, Techniques, & Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AV

A

Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BASH

A

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BCP

A

Business Continuity Planning

Need to identify critical business systems, which systems need to be protected the most, and have resources available to help recover them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BEC

A

Business Email Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BPA

A

Business Partnership Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CA

A

Certificate Authority:

Sometimes referred to as PKI (Public Key Infrastructure). Issues and signs certificates, and maintains the public / private key pair.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CASB

A

Cloud Access Security Broker

Enterprise management software
designed to mediate access to cloud services by users across all types of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

CCA

A

Chosen Cipher Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

CCTV

A

Closed-circuit Television

Detective Control, Deterrent Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

CEO

A

Chief Executive Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

CER

A

Cross-over Error Rate

A metric for biometric technologies are rated. The CER is the point where the FRR (False Rejection Rate) and FAR (False Acceptance Rate) meet. The lowest possible CER is most desirable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

CERT

A

Computer Emergency Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

CFO

A

Chief Financial Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

CHAP

A

Challenge Handshake Authentication Protocol

An encrypted authentication protocol normally used for remote access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

CIA

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

CI/CD

A

Continuous Integration / Continuous Delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

CIO

A

Chief Information Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

CIRT

A

Computer Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

CIS

A

Center for Internet Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

CISO

A

Chief Information Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

COOP

A

Continuity of Operations Plan

Designing operations and systems to be as little affected by an incident and to have resources to recover from them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

COPE

A

Corporate Owned, Personally Enabled

Company owns and supplies the device. The employee may use the device for web browsing, personal email, and personal social media sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

CPU

A

Central Processing Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

CRC

A

Cyclic Redundancy Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

CRL

A

Certificate Revocation List

A list of certificates that were revoked before they were configured to expire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

CSF

A

Cybersecurity Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

CSP

A

Cloud Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

CSR

A

Certificate Signing Request

When a subject wants a certificate, it completes a CSR and submits it to a CA (Certificate Authority)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

CTO

A

Chief Technology Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

CVE

A

Common Vulnerabilities and Exposures

This is a place to find out what platforms have vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

CVSS

A

Common Vulnerability Scoring System

This scoring system lets you know the criticality / impact to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

CYOD

A

Choose Your Own Device

A mobile deployment model where the company gives the employees a list of approved mobile devices they can use on the corporate network. This helps keep the devices with more current models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

DAC

A

Discretionary Access Control

Access control is set by the data owner, or possibly the administrator. The permissions can be applied to a group or an individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

DBA

A

Database Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

dd command

A

Data Duplicator

Linux command that makes a bit-by-bit copy of an input file, typically used for disk imaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

DDoS

A

Distributed Denial of Service

Many devices attacking a single device. The devices can be PCs’ laptops, DVRs, Webcams, etc. This type of attack is carried out via a botnet, and the devices are known as drones or zombies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

DES

A

Digital Encryption Standard

Considered weak encryption, symmetric block cipher that encrypts in blocks of 64 bits and uses a 56-bit key. This method is deprecated and the easiest upgrade is 3DES (Triple DES). Considered weak encryption and has been deprecated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

DHCP

A

Dynamic Host Configuration Protocol

A protocol that provides an automated process of assigning IP addresses. Can also issue optional parameters such as DNS address, DNS suffix, Default Gateway, and subnet mask. Uses Ports 67 & 68 UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

DKIM

A

Domain Keys Identified Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

DLL

A

Dynamic Link Library

Is a binary package used to implement functionality, such as cryptography or establishing a network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

DLP

A

Data Loss Prevention

A hardware or software solution that prevents a certain type of information from being exfiltrated from a device or network. Data like PII (Personally Identifiable Information), credit card numbers, Social Security numbers, data that is sensitive using keywords. USB blocking is a form of DLP. Preventing this type of information from being printed is another protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

DMARC

A

Domain Message Authentication Reporting and Conformance

Prevents phishing and spear phishing attacks against an organization’s email server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

DNS

A

Domain Name Service (Server)

A service that maps / resolves host names to an IP address. Use Port 53 UDP for DNS queries, uses Port 53 TCP for Zone Transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

DNSSEC

A

Domain Name System Security Extensions

A security protocol
that provides authentication of DNS data and upholds DNS data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

DoS

A

Denial of Service

Is an attack that is one to one. Anything that can keep a device or user from accessing a service or information is a denial of service. One user flooding other user’s accounts with email attachments until the email box is full, cut the network cable or power are just a few examples.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

DPO

A

Data Protection Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

DRP

A

Disaster Recovery Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

DSA

A

Digital Signature Algorithm

Public key encryption used for digital signatures. This is an asymmetric encryption method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

EAP

A

Extensible Authentication Protocol

EAP allows different authentication methods, most of using a digital certificate on the server and/or the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

EAP-TLS

A

Extensible Authentication Protocol-Transport Layer Security

Requires certificates on the clients and server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

EDR

A

Endpoint Detection and Response

A software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

EF

A

Exposure Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

ELB

A

Electronic Load Balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

EOL

A

End of Life

When systems or applications are no longer supported by the manufacturer or developer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

ESP

A

Encapsulated Security Payload

An IPSec protocol that does the same as for AH (Authentication Header), but also encrypts/encapsulates the entire payload/packet. Uses protocol # 50.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

EULA

A

End User Licensing Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

EXIF

A

Exchangeable Image File Format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

FAR

A

False Acceptance Rate

A Type II error. The ratio of when a biometric system authenticates an unauthorized user as an authorized user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

FDE

A

Full Disk Encryption

This means that the entire contents of the drive (or volume), including system files and folders, are encrypted. Two methods are BitLocker and PGP Whole Disk Encryption. This is a software-based or an operating system encryption method. These methods are more CPU intensive processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

FIM

A

File Integrity Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

FPGA

A

Field Programmable Gate Array

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

FRR

A

False Rejection Rate

Type I error. The ratio in which a biometric system rejects an authorized user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

FTP

A

File Transfer Protocol

Uploads and downloads large files to and from an FTP server. FTP transmits data in plaintext. FTP active mode uses TCP port 21 for control and TCP port 20 for data transfer. FTP passive mode (PASV) also uses TCP port 21 for control signals, but it uses a random TCP port for data.

If the user can connect to the FTP but not upload or download, disable PASV (passive mode)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

FTPS

A

Secure File Transfer Protocol / FTP over SSL

Ports 989 & 990 TCP,

transfer in plain text or encrypted via “Explicit” mode, forced to use encryption is “Implicit” mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

FWSM

A

Firewall Service Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Gbps

A

Gigabit per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

GDPR

A

General Data Protection Regulation

Provisions and requirements
protecting the personal data of European Union (EU) citizens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

GLBA

A

Gramm-Leach-Bliley Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

GPO

A

Group Policy Object

Group Policy Object is a component of Group Policy (in Microsoft Active Directory) that can be used in Microsoft operating systems to control user accounts and user activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

GPS

A

Global Positioning System

GPS is a way of determining a device’s position (its latitude and longitude) based on information received from GPS satellites. The device must have line-of-sight to the GPS satellites. GPS provides another means of locating the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

HA

A

High Availability

The key premise is that systems are resilient and redundant. HA is the percentage of uptime a system is able to maintain over a period of a year. For example, 99% would equal being down 3.65 per year of 14 minutes per day. The five 9’s, 99.999%, would equal being down 5.25 minutes per year or .86 seconds per day.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

HDD

A

Hard Disk Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

HIDS

A

Host-Based Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

HIPAA

A

Health Insurance Portability Accountability Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

HIPS

A

Host-Based Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

HR

A

Human Resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

HSM

A

Hardware Security Module

Provides root of trust, stores cryptographic keys, can also work as an SSL accelerator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

HTTP

A

Hypertext Transfer Protocol

Port 80 TCP, plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

HTTPS

A

Hypertext Transfer Protocol Secure

Port 443 TCP, requires certificates and TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

HVAC

A

Heating, Ventilation, Air Conditioning

Provides availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

IaaS

A

Infrastructure as a Service

This type of service you have the most control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

IaC

A

Infrastructure as Code

A provisioning architecture in which deployment of resources is performed by scripted automation and orchestration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

IAM

A

Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

ICMP

A

Internet Control Message Protocol

Suite containing ping, tracert, and pathping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

ICS

A

Industrial Control Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

IdP

A

Identity Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

IDS

A

Intrusion Detection System

Out-of-band. If anomaly, heuristic, or behavioral-based, need to establish a baseline first. Detects attacks and sends an alert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

IKE

A

Internet Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

IoC

A

Indicators of Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

IoT

A

Internet of Things

IoT includes any connecting to the Internet that is not a PC, tablet, or laptop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

IP

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

IPS

A

Intrusion Prevention System

IPS are in-band, either Signature-based or Anomaly-based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

IPSec

A

Internet Protocol Security

IPSec is used to secure data-in-transit. Works at Layer 3 of the OSI, and has two modes: transport and tunneling. In Transport mode, only the data is encrypted, not the header. in Tunnel mode, the packet and header are encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

IR

A

Incident Response

112
Q

IRC

A

Internet Relay Channel

113
Q

IRP

A

Incident Response Plan

Specific procedures that must be performed if a certain type of event is detected or reported

114
Q

ISA

A

Interconnection Security Agreement

115
Q

ISAC

A

Information Sharing and Analysis
Center

Not-for-profit group set up to share sector-specific threat intelligence and security best practices amongst its members.

116
Q

ISO

A

International Organization for Standardization

117
Q

ISP

A

Incident Service Provider

118
Q

JSON

A

JavaScript Object Notation

119
Q

KMS

A

Key Management System

120
Q

L2TP

A

Layer 2 Tunneling Protocol

Port 1701 UDP, uses IPSec

121
Q

LAN

A

Local Area Network

122
Q

LDAP

A

Lightweight Directory Access Protocol

Port 389 TCP, plaintext

123
Q

LDAPS

A

Secure Lightweight Directory Access Protocol

Port 636 TCP, requires PKI/CA, uses TLS

124
Q

LEAP

A

Lightweight Extensible Authentication Protocol

Does not require certificates, deprecated & replaced with EAP-FAST

125
Q

MAC

A

Mandatory Access Control

Resources (objects) and users
(subjects) are allocated a clearance level (or label), or a “need to know” basis

126
Q

MAC

A

Media Access Control:

A network data transfer policy that determines how data is transmitted between two computer terminals through a network cable.

127
Q

MAM

A

Mobile Application Management

Enterprise management function that enables control over apps and storage for mobile devices and other endpoints

128
Q

MD5

A

Message Digest 5

Hashing algorithm, 128 bit, fastest, provides an integrity check.

129
Q

MDM

A

Mobile Device Management

The process and supporting technologies for tracking, controlling, and securing the
organization’s mobile infrastructure

130
Q

MFA

A

Multifactor Authentication

Two or more factors from the following:

  1. Something you know
  2. Something you have
  3. Something you are
  4. Something you do
  5. Somewhere you are or are not
131
Q

MiTM

A

Man in the Middle:

A man-in-the-middle (MITM) attack is a cyberattack where a criminal inserts themselves between two parties to intercept their communication. The attacker can then steal data or manipulate it without the victim’s knowledge.

132
Q

MOA

A

Memorandum of Agreement:

A written contract between parties to work together on a project or goal

133
Q

MOU

A

Memorandum of Understanding

A non-binding agreement between two or more parties. It’s a formal document that outlines the parties’ intentions, roles, and objectives.

134
Q

MPLS

A

Multiprotocol Label Switching

A network routing technique that uses labels to direct data packets to their destinations.

135
Q

MSA

A

Master Service Agreement

A contract that establishes the terms and conditions of a business relationship between two parties.

136
Q

MS-CHAP

A

Microsoft Challenge-Handshake
Authentication Protocol

A password-based authentication method that’s used for secure user logins.

137
Q

MSP

A

Managed Service Provider

A third-party company that manages a customer’s IT systems and information.

138
Q

MSSP

A

Managed Security Service Provider

A third-party company that offers cybersecurity services to organizations.

139
Q

MTBF

A

Mean Time Between Failures

The system can be repaired, the reliability of the system, need a redundant/fail-over system while the system is being repaired.

140
Q

MTTF

A

Mean Time to Failure

Life expectancy of a system, cannot be repaired.

141
Q

MTTR

A

Mean Time to Repair

The actual time it took to bring a system back online.

142
Q

NAC

A

Network Access Control

Make sure systems have current Operating System updates and Antivirus updates.

143
Q

NAT

A

Network Address Translation

Many internal IP addresses mapped to one external IP address.

144
Q

NDA

A

Non-disclosure Agreement

145
Q

NFC

A

Near-field Communication:

A wireless technology that allows devices to communicate when they are very close together.

146
Q

NGFW

A

Next-generation Firewall:

A security device that protects networks by analyzing traffic and blocking potentially dangerous traffic.

147
Q

NIC

A

Network Interface Card:

An essential component of any computer that connects it to the network.

148
Q

NIDS

A

Network-based Intrusion Detection System

NIDS can also perform rogue system detection.

149
Q

NIPS

A

Network-based Intrusion Prevention System

A security technology that actively monitors network traffic for malicious activity and takes immediate action to block or mitigate potential threats

150
Q

NIST

A

National Institute of Standards and Technology:

Promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life

151
Q

NSA

A

National Security Agency:

Collects and analyzes intelligence to protect the United States from foreign threats.

152
Q

NTLM

A

New Technology LAN Manager:

A set of Microsoft security protocols that authenticates users and protects their activity.

153
Q

NTP

A

Network Time Protocol:

An internet standard that synchronizes clocks between devices.

154
Q

OAuth

A

Open Authorization:

A standard that allows users to grant third-party apps access to their information without sharing their passwords.

155
Q

OCSP

A

Online Certificate Status Protocol:

An internet protocol used to check the validity of a digital certificate, specifically whether it has been revoked, by querying a Certificate Authority (CA) in real-time.

156
Q

OPSEC

A

Operational Security:

A security process that protects sensitive information from adversaries.

157
Q

OS

A

Operating System

158
Q

OSI

A

Open Systems Interconnection:

A framework that describes how different systems communicate on a network.

159
Q

OSINT

A

Open Source Intelligence:

Information gathered from publicly available sources. It’s used by organizations like law enforcement, cybersecurity, and intelligence agencies.

160
Q

OVAL

A

Open Vulnerability and Assessment Language

Used with SCAP

161
Q

OWASP

A

Open Web Application Security Project:

A non-profit organization focused on improving the security of software applications by providing freely available resources like articles, methodologies, tools, and documentation to help developers and security professionals identify and mitigate common web application vulnerabilities.

162
Q

PaaS

A

Platform as a Service:

A cloud computing model where a third-party provider delivers a complete development environment, including tools, middleware, operating systems, and databases, allowing users to build, test, deploy, and manage applications without having to manage the underlying infrastructure.

163
Q

PAM

A

Privileged Access Management:

A cybersecurity strategy that protects an organization’s sensitive systems and data.

164
Q

PAP

A

Password Authentication Protocol

Username and password sent in cleartext

165
Q

PCAP

A

Packet Capture

166
Q

PCI DSS

A

Payment Card Industry Data Security Standard

167
Q

PDU

A

Power Distribution Unit

168
Q

PEAP

A

Protected Extensible Authentication Protocol

169
Q

PEM

A

Privacy-Enhanced Mail

170
Q

PHI

A

Personal Health Information

171
Q

PII

A

Personally Identifiable Information

172
Q

PIN

A

Personal Identification Number

Something you know

173
Q

PKI

A

Public Key Infrastructure:

A system of policies, hardware, software, and procedures that manage digital certificates and public-key encryption.

174
Q

PNG

A

Portable Network Graphics:

A raster image file format that supports lossless compression.

175
Q

PPPoE

A

Point-to-Point over Ethernet

Encapsulation

176
Q

PPTP

A

Point-to-Point Tunneling Protocol:

A network protocol that creates virtual private networks (VPNs).

177
Q

PSK

A

Pre-Shared Key

Password or passphrase

178
Q

RADIUS

A

Remote Authentication Dial-in User Server

179
Q

RAID

A

Redundant Array of Inexpensive Disks:

A data storage technology that combines multiple physical hard drives into a single logical unit, allowing for increased reliability and performance by distributing data across the drives, creating redundancy in case of a single drive failure; essentially, it lets you use several inexpensive disks to create a more reliable storage system.

180
Q

RAM

A

Random Access Memory:

Your computer or laptop’s short-term memory. It’s where the data is stored that your computer processor needs to run your applications and open your files.

181
Q

RAS

A

Remote Access Server:

A combination of hardware and software that allows users to connect to a network from a remote location.

182
Q

RAT

A

Remote Access Trojan:

Is malicious software designed to allow attackers to monitor and control a computer system or network remotely.

183
Q

RBAC

A

Role-Based Access Control:

A security model that limits access to systems and data based on a user’s role in an organization.

184
Q

RBAC

A

Rule-Based Access Control:

A system that controls access to resources based on predetermined rules.

185
Q

RDP

A

Remote Desktop Protocol

Port 3389

186
Q

RFID

A

Radio Frequency Identifier:

A wireless system that uses radio waves to identify objects, people, or animals.

187
Q

ROI

A

Return on Investment

188
Q

ROM

A

Read-only Memory

Non-volatile

189
Q

RPO

A

Recovery Point Objective

Amount of data an organization is willing to lose.

190
Q

RSA

A

Rivest, Shamir, & Adleman

Asymmetric encryption, used to encrypt email, digital signatures, and X.509 certificates.

191
Q

RSH

A

Remote Shell:

A command-line program that allows users to run commands on a remote computer as if they were logged in locally.

192
Q

RSTP

A

Rapid Spanning Tree Protocol:

A network protocol that acts as an improved version of the standard Spanning Tree Protocol (STP), designed to significantly reduce the time it takes for a network to recover from topology changes by providing faster convergence when network links fail.

193
Q

RTO

A

Recovery Time Objective

An allotted, expected, or maximum amount of time to get a system online.

194
Q

RTOS

A

Real Time Operating System:

A specialized operating system designed to handle tasks with strict time constraints, ensuring that data is processed and events are responded to within a predictable timeframe.

195
Q

RTP

A

Real-time Transfer Protocol

Audio, Video, VoIP

196
Q

S/MIME

A

Secure/Multipurpose Internet Mail Extensions

Used for encrypting email and creating digital signatures

197
Q

SA

A

Security Associations

198
Q

SaaS

A

Software as a Service

You have no control over, can only use the program.

199
Q

SAE

A

Simultaneous Authentication of Equals

Used with WPA-3, replaces PSK

200
Q

SAM

A

Security Accounts Manager

201
Q

SAML

A

Security Assertions Markup Language:

An open standard that allows applications to exchange authentication and authorization data between different parties.

202
Q

SAN

A

Storage Area Network:

A high-speed network that connects servers to storage devices.

203
Q

SAN

A

Subject Alternative Name

204
Q

SASE

A

Secure Access Service Edge

204
Q

SCADA

A

System Control and Data Acquisition:

A system that monitors and controls industrial processes by collecting real-time data from sensors and field devices, allowing operators to remotely manage equipment and conditions within a facility or network, often used in applications like power grids, water treatment plants, and oil pipelines.

205
Q

SCAP

A

Security Content Automation Protocol

206
Q

SCEP

A

Simple Certificate Enrollment Protocol:

An open-source protocol that allows devices to easily and automatically request and receive digital certificates from a Certificate Authority (CA) by using a standardized method to communicate, typically through a shared secret and a URL.

207
Q

SCM

A

Supply Chain Management

208
Q

SDLC

A

Software Development Life Cycle:

A structured process that software development teams follow, encompassing all stages from initial planning and requirement analysis to design, development, testing, deployment, and ongoing maintenance.

209
Q

SDN

A

Software Defined Networking:

A network architecture that uses software to manage and control a network.

210
Q

SD-WAN

A

Software-Defined Wide Area Network:

A network technology that uses software-based principles to manage and optimize wide area networks (WANs), allowing organizations to securely connect users and applications across multiple locations while improving performance, reliability, and scalability through centralized control and visibility over the network.

211
Q

SED

A

Self-Encrypting Drives:

A hard disk drive (HDD) or solid state drive (SSD) that encrypts data as it’s written and decrypts it when it’s read.

212
Q

SFTP

A

Secured File Transfer Protocol

Also known as FTP over SSH, uses port 22 TCP

213
Q

SHA

A

Secure Hashing Algorithm:

A cryptographic function that turns an input of any size into a fixed-sized output, or hash value.

214
Q

SIEM

A

Security Information and Event Management

This is a detective control.

215
Q

SIP

A

Session Initiation Protocol

VoIP credentials

216
Q

SLA

A

Service Level Agreement:

A contract between a service provider and a customer that defines the level of service expected.

217
Q

SLE

A

Single Loss Expectancy:

The estimated amount of money lost if an asset is damaged or compromised.

218
Q

SMS

A

Short Message Service

Test message

219
Q

SMTP

A

Simple Mail Transfer Protocol

Port 25 TCP, sends email in plaintext

220
Q

SNMP

A

Simple Network Management Protocol

Port 161 UDP, only secure version is version 3.

221
Q

SOAR

A

Security Orchestration, Automation, Response

222
Q

SoC

A

System on Chip

223
Q

SOC

A

Security Operation Center

224
Q

SOC

A

Service Organization Control

225
Q

SOP

A

Standard Operating Procedure

226
Q

SOW

A

Statement of Work

227
Q

SPAN

A

Switched Port Analyzer:

A dedicated port on a switch that takes a mirrored copy of network traffic from within the switch to be sent to a destination.

228
Q

SPF

A

Sender Policy Framework:

An email authentication method that verifies that an email’s sender is authorized to send mail from a domain.

229
Q

SPIM

A

Spam over Internet Messaging

230
Q

SQL

A

Structured Query Language

231
Q

SQLi

A

SQL Injection:

A code injection technique that might destroy your database. SQL injection is one of the most common web hacking techniques.

232
Q

SRTP

A

Secure Real-Time Protocol

Encrypts audio & video streaming, and VoIP

233
Q

SSD

A

Solid State Drive:

Is a type of solid-state storage device that uses integrated circuits to store data persistently.

234
Q

SSH

A

Secure Shell

Port 22 TCP

235
Q

SSID

A

Service Set Identifier:

A unique name that identifies a wireless network.

236
Q

SSL

A

Secure Sockets Layer:

A security protocol that encrypts data sent between a user’s device and a website or server.

237
Q

SSO

A

Single Sign On:

System that lets users log in to multiple applications using one set of credentials.

238
Q

STIX

A

Structured Threat Information eXchange:

A standardized language used to express and share cyber threat intelligence information in a consistent format.

239
Q

STP

A

Spanning Tree Protocol

Prevents switching loops

240
Q

SWG

A

Secure Web Gateway

URL filter, Content Filter

241
Q

TAP

A

Test Access Point

242
Q

TAXII

A

Trusted Automated eXchange of Indicator Information

243
Q

TCP

A

Transmission Control Protocol:

A set of rules that govern how data is sent and received over a network.

244
Q

TFTP

A

Trivial File Transfer Protocol

Uses port 69 UDP, mainly used for deploying images

245
Q

TGT

A

Ticket Granting Ticket

246
Q

TKIP

A

Temporal Key Integrity Protocol:

A security protocol used in wireless networking, primarily within the IEEE 802.11 standard, designed to provide more secure encryption than the older “Wired Equivalent Privacy” (WEP) while still working with existing hardware.

247
Q

TLS

A

Transport Layer Security:

A cryptographic protocol that protects data sent over networks like the internet.

248
Q

TOC/TOU

A

Time of Check / Time of Use

Used in a Race Condition attack

249
Q

TOR

A

The Onion Router

250
Q

TOTP

A

Time-based One Time Password

251
Q

TPM

A

Trusted Platform Module:

A chip on a computer’s motherboard that helps protect sensitive information and verifies the authenticity of the operating system and firmware.

252
Q

UAT

A

User Acceptance Testing

253
Q

UBA

A

User Behavior Analytics

254
Q

UDP

A

User Datagram Protocol

255
Q

UPS

A

Uninterruptable Power Supply

256
Q

URL

A

Universal Resource Locator

257
Q

UTM

A

Unified Threat Management

258
Q

VDI

A

Virtual Desktop Infrastructure

259
Q

VLAN

A

Virtual Local Area Network

260
Q

VM

A

Virtual Machine

261
Q

VPC

A

Virtual Private Cloud

262
Q

VPN

A

Virtual Private Network

263
Q

VSAN

A

Virtual Storage Area Network

264
Q

WAF

A

Web Application Firewall

265
Q

WAP

A

Wireless Access Point

266
Q

WEP

A

Wired Equivalent Privacy

267
Q

WPA

A

Wi-Fi Protected Access

268
Q

WPS

A

Wi-Fi Protected Setup

269
Q

XaaS

A

Anything as a Service

270
Q

XDR

A

Extended Detection and Response

271
Q

XML

A

Extensible Markup Language:

A text-based format for storing, sharing, and exchanging data.

272
Q

XSRF

A

Cross-Site Request Forgery:

A cyber attack that tricks a user into performing actions they didn’t intend. This can include transferring funds, changing passwords, or making purchases.

273
Q

XSS

A

Cross-Site Scripting:

A web security flaw that allows attackers to inject malicious scripts into websites.

274
Q

NAS

A

Network Attached Server