Acronym w. Definition . Flashcards
3DES
Triple Digital Encryption Standard
A symmetric algorithm used to encrypt data & provide confidentiality.
AAA
A group of technologies used in remote access systems.
- Authentication verifies a user’s identification.
- Authorization determines if a user should have access.
- Accounting tracks a user’s access with logs.
ABAC
Attribute-Based Access Control
An access control model that grants access to resources based on attributes assigned to subjects and objects.
AUP
Acceptable Use Policy
A policy defining proper system usage and the rules of behavior for employees.
It often describes the purpose of computer systems and networks, how users can access them, and the responsibilities of users when accessing the systems.
AP
Access Point
A device that connects wireless clients to wireless networks. Sometimes called wireless access point (WAP).
Accounting
The process of tracking the activity of users and recording this activity in logs. One method of accounting is audit logs that create an audit trail.
ACLs
Access control lists. Lists of rules used by routers and stateless firewalls. These devices use the ACL to control traffic based on networks, subnets, IP addresses, ports, and some protocols.
Active Reconnaissance
A penetration testing method used to collect information. It sends data to systems and analyzes responses to gain information on the target.
Ad Hoc
A connection mode used by wireless devices without an AP.
Administrative controls
Security controls implemented via administrative or management methods.
Advanced Encryption Standard (AES)
A strong symmetric block cipher that encrypts data in 128-bit blocks.
Affinity
A scheduling method used with load balancers. It used the client’s IP address to ensure the client is redirected to the same server during session.
Aggregation switch
A switch used to connect multiple switches together into a network. Switches connect to the aggregation switch and it connects to a router.
Agile
A software development life cycle model that focuses on interaction and integrity.
Authentication Header (AH)
Only used in Tunneling mode, to encrypt the message headers.
- An option within IPSec to provide authentication and integrity.
Airgap
A physical security control that provides physical isolation. Systems separated by an airgap don’t typically have any physical connections to other systems.
Annual Loss Expectancy (ALE)
The expected loss for a year.
Used to measure risk with ARO and SLE in a quantitative risk assessment.
SLE x ARO = ALE
Amplification attack
An attack that increased the amount of bandwidth sent to a victim.
Anomaly
A type of monitoring on intrusion detection and intrusion prevention systems.
Detects attacks by comparing operations against a baseline.
Aka Heuristic detection
ANT
A proprietary wireless protocol used by some mobile devices.
Not an acronym
Antispoofing
A method used on some routers to protect against spoofing attacks.
Antivirus
Software that protects systems from malware.
Application blacklist
A list of applications that a system blocks.
Users are unable to install or run any applications on the list.
Application cell
A virtualization technology that runs services or applications within isolated application cells (containers).
Aka application containers