Acronyms Flashcards

1
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HIDS

A

Host-Based Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

EDR

A

Endpoint Detection and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NIPS

A

Network-Based Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IRP

A

An incident response plan lists the procedures, contacts, and resources available to responders for various incident categories. The CSIRT should develop profiles or scenarios of typical incidents (DDoS attack, virus/worm outbreak, data exfiltration by an external adversary, data modification by an internal adversary, and so on). This will guide investigators in determining priorities and remediation plans. Steps included are: preparation, identification,
containment, eradication, recovery, and lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CVE

A

Common Vulnerabilities and Exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PUP

A

Potentially Unwanted Program (programs which MIGHT NOT be malware, but that you may not want, like AdWare)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SCADA

A

Supervisory Control And Data Acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CASB

A

cloud access security broker: enterprise management software designed to mediate access to cloud services by users across all types of devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DAC

A

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ABAC

A

Attribute-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SCAP

A

Security Content Automation Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SOAR

A

Security orchestration, automation, and response (SOAR) is designed as a solution to the problem of the volume of alerts overwhelming analysts’ ability to respond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FRR

A

False Rejection Rate—where a legitimate user is not recognized. This is also referred to as a Type I error or false non-match rate (FNMR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FAR

A

False Acceptance Rate—where an interloper is accepted (Type II error or false match rate [FMR]).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CER

A

Crossover Error Rate—the point at which FRR (False Rejection Rate) and FAR (False Acceptance Rate) meet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TPM

A

Trusted Platform Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SDP

A

Software Defined Perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

MSSP

A

An managed security service provider (MSSP) provides outsourced monitoring and management of security devices and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SOC

A

A security operations center (SOC – pronounced “sock”) is a team of experts that proactively monitor an organization’s ability to operate securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

MAC

A

Mandatory Access Control: uses system of clearances and labels. Users can’t change the labels or their own clearance levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

RAID 0

A

striping, no parity. Fast, but not fault tolerant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

RAID 1

A

Mirroring only. No improvement to speed, but adds fault tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
RAID 5
Striping with parity, three disks. Allows one disk to fail without losing data. More efficient than RAID 1.
26
RAID 6
Striping with double parity: allows multiple disks to fail without losing data.
27
Nested RAID
Different combinations are possible, usually to improve speed or redundancy.
28
VTC
Video Tele-Conferencing
29
SIP
The Session Initiation Protocol (SIP) is one of the most widely used session control protocols. SIP endpoints are the end-user devices (also known as user-agents), such as IP-enabled handsets or client and server web conference software. Each device, conference, or telephony user is assigned a unique SIP address known as a SIP Uniform Resource Indicator (URI), such as sip:bob.dobbs@comptia.org
30
RTP/SRTP
While SIP provides session management features (for VoIP and VTC), the actual delivery of real-time data uses different protocols. The principal one is real-time Transport Protocol (RTP). SRTP is the secure version of this.
31
ESP
Encapsulation Security Payload (ESP) provides confidentiality and/or authentication and integrity. It can be used to encrypt the packet rather than simply calculating an HMAC.
32
COPE
Corporate owned, personally-enabled: the device is chosen and supplied by the company and remains its property. The employee may use it to access personal email and social media accounts and for personal web browsing (subject to whatever acceptable use policies are in force)
33
CYOD
Choose your own device (CYOD)—much the same as COPE but the employee is given a choice of device from a list.
34
COBO
Corporate owned, business only (COBO)—the device is the property of the company and may only be used for company business.
35
BYOD
Bring your own device (BYOD)—the mobile device is owned by the employee. The mobile will have to meet whatever profile is required by the company (in terms of OS version and functionality) and the employee will have to agree on the installation of corporate apps and to some level of oversight and auditing. This model is usually the most popular with employees but poses the most difficulties for security and network managers.
36
RTO
Recovery Time Objective
37
BIA
Business impact analysis (BIA) is the process of assessing what losses might occur for a range of threat scenarios. For instance, if a DDoS attack suspends an e-commerce portal for five hours, the business impact analysis will be able to quantify the losses from orders not made and customers moving permanently to other suppliers based on historic data.
38
HE
Homomorphic Encryption: Encryption which allows manipulation of encrypted data without unencrypting it. (my words, paraphrased from book)
39
SIEM
security information and event management
40
BSSID
Basic service set identiifier: mac address of a WAP
41
CBC
Cipher Block Chaining:
42
ASLR
Address space layout randomization: laying out memory randomly to hinder attackers
43
AIS
Automated indicator sharing: feed from DHS of indicators of compromise (IoC)
44
CCMP
Counter-mode/CBCMAC protocol
45
AIS
Automated Indicator Sharing (AIS) is a service offered by the Department of Homeland Security (DHS) for companies to participate in threat intelligence sharing
46
ISO 27701
Extension of ISO standards 27001 and 27002 to include detailed management of PII (Personally Identifiable Information) and data privacy.
47
ISO 31000
sets international standards for risk management practices
48
CTI
Cyber Threat Intelligence: A type of platform through which a person/company can receive feed of threat data to use to determine whether Indicators of Compromise are present.
49
DEP
Data execution prevention: restrictions against using space in memory as executable memory space when it is reserved for data
50
ISO 27001
International standard for the foundation of Information Security Management Systems.
51
SSAE
Statements on Standards for Attestation Engagements: Audit specifications developed by the American Institute of Certified Public Accountants (AICPA)
52
ISO 27701
Extension of ISO standards 27001 and 27002 to include detailed management of PII (Personally Identifiable Information) and data privacy.
53
ISO 31000
sets international standards for risk management practices
54
PEAP
Protected EAP: encapsulates EAP in a TLS tunnel. Authenticates via MSCHAPV2 if using a Microsoft server as authentication server. Can also be used with Generic Token Card (GTC) or hardware token generator. Less secure than EAP-TLS.
55
TACACS+
Terminal Access Controller Access-Control System Plus: reliable, connection-oriented delivery on TCP port 49 for encrypted transfers of critical network infrastructure data. Provides Authentication, Authorization and Accounting (AAA) functions. Centralizes logins for admin accounts for network appliances.
56
NIST
National Institute of Standards and Technology
57
EAP-FAST
FAST=Flexible Authentication via Secure Tunneling. EAP-FAST needs RADIUS server to provide authentication DB access.
58
EAP
Extensible Authentication Protocol (EAP) provides a framework for deploying multiple types of authentication protocols and technologies.
59
802.1X
Port-based Network Access Control (NAC) protocol provides the means of using an EAP method when a device connects to an Ethernet switch port, wireless access point (with enterprise authentication configured), or VPN gateway.
60
PEAP
Protected EAP: encapsulates EAP in a TLS tunnel
61
TACACS+
Terminal Access Controller Access-Control System Plus: reliable, connection-oriented delivery on TCP port 49 for encrypted transfers of critical network infrastructure data. Provides Authentication, Authorization and Accounting (AAA) functions. Centralizes logins for admin accounts for network appliances. Designed as a replacement for Radius.
62
RADIUS
Remote Authentication Dial-In User Service: UDP/IP on ports 1812 and 1813
63
EAP-FAST
FAST=Flexible Authentication via Secure Tunneling
64
PAC
Protected Access Credential (part of EAP-FAST terminology). This is a shared secret in that system.
65
AS
Authentication Server (in EAP-FAST terminology)
66
EAP-TLS
More secure than PEAP as EAP-TLS uses digital certificates for both clients and servers rather than only on the server side like in PEAP. Excludes older devices as clients which cannot support digital certificates.
67
EAP-TTLS
EAP over Tunneled TLS
68
SAE
Simultaneous Authentication of Equals (Used with Pre-Shared Keys in authenticating to wireless networks). This gives each user a separate session ID even though everyone gets in with the same pass key.
69
WPS
Wifi Protected Setup (The PINs only have 11k different combinations, so they can be vulnerable to brute force attacks. Newer devices have brute-force protection. Older devices should just have this disabled.)
70
NFC
Near Field Communication
71
DER certs
Distinguised Encoding Rules
72
PEM certs
Privacy-Enhanced Mail (text formatted through base64 encoding)
73
PKCS #12
Public Key Cryptography Standards #12 (can contain multiple X.509 certs in a single .p12 or .pfx file)
74
CER Certs
Usually contains only public key
75
PKCS #7
sent as .p7b file, stored in ASCII. Doesn't contain private keys.
76
dig
Domain Information Groper