Acronyms Flashcards

1
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HIDS

A

Host-Based Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

EDR

A

Endpoint Detection and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NIPS

A

Network-Based Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IRP

A

An incident response plan lists the procedures, contacts, and resources available to responders for various incident categories. The CSIRT should develop profiles or scenarios of typical incidents (DDoS attack, virus/worm outbreak, data exfiltration by an external adversary, data modification by an internal adversary, and so on). This will guide investigators in determining priorities and remediation plans. Steps included are: preparation, identification,
containment, eradication, recovery, and lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CVE

A

Common Vulnerabilities and Exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PUP

A

Potentially Unwanted Program (programs which MIGHT NOT be malware, but that you may not want, like AdWare)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SCADA

A

Supervisory Control And Data Acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CASB

A

cloud access security broker: enterprise management software designed to mediate access to cloud services by users across all types of devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DAC

A

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ABAC

A

Attribute-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SCAP

A

Security Content Automation Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SOAR

A

Security orchestration, automation, and response (SOAR) is designed as a solution to the problem of the volume of alerts overwhelming analysts’ ability to respond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FRR

A

False Rejection Rate—where a legitimate user is not recognized. This is also referred to as a Type I error or false non-match rate (FNMR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FAR

A

False Acceptance Rate—where an interloper is accepted (Type II error or false match rate [FMR]).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CER

A

Crossover Error Rate—the point at which FRR (False Rejection Rate) and FAR (False Acceptance Rate) meet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TPM

A

Trusted Platform Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SDP

A

Software Defined Perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

MSSP

A

An managed security service provider (MSSP) provides outsourced monitoring and management of security devices and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SOC

A

A security operations center (SOC – pronounced “sock”) is a team of experts that proactively monitor an organization’s ability to operate securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

MAC

A

Mandatory Access Control: uses system of clearances and labels. Users can’t change the labels or their own clearance levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

RAID 0

A

striping, no parity. Fast, but not fault tolerant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

RAID 1

A

Mirroring only. No improvement to speed, but adds fault tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

RAID 5

A

Striping with parity, three disks. Allows one disk to fail without losing data. More efficient than RAID 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

RAID 6

A

Striping with double parity: allows multiple disks to fail without losing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Nested RAID

A

Different combinations are possible, usually to improve speed or redundancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

VTC

A

Video Tele-Conferencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

SIP

A

The Session Initiation Protocol (SIP) is one of the most widely used session control protocols. SIP endpoints are the end-user devices (also known as user-agents), such as IP-enabled handsets or client and server web conference software. Each device, conference, or telephony user is assigned a unique SIP address known as a SIP Uniform Resource Indicator (URI), such as sip:bob.dobbs@comptia.org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

RTP/SRTP

A

While SIP provides session management features (for VoIP and VTC), the actual delivery of real-time data uses different protocols. The principal one is real-time Transport Protocol (RTP).SRTP is the secure version of this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

ESP

A

Encapsulation Security Payload (ESP) provides confidentiality and/or authentication and integrity. It can be used to encrypt the packet rather than simply calculating an HMAC.

32
Q

COPE

A

Corporate owned, personally-enabled: the device is chosen and supplied by the company and remains its property. The employee may use it to access personal email and social media accounts and for personal web browsing (subject to whatever acceptable use policies are in force)

33
Q

CYOD

A

Choose your own device (CYOD)—much the same as COPE but the employee is given a choice of device from a list.

34
Q

COBO

A

Corporate owned, business only (COBO)—the device is the property of the company and may only be used for company business.

35
Q

BYOD

A

Bring your own device (BYOD)—the mobile device is owned by the employee. The mobile will have to meet whatever profile is required by the company (in terms of OS version and functionality) and the employee will have to agree on the installation of corporate apps and to some level of oversight and auditing. This model is usually the most popular with employees but poses the most difficulties for security and network managers.

36
Q

RTO

A

Recovery Time Objective

37
Q

BIA

A

Business impact analysis (BIA) is the process of assessing what losses might occur for a range of threat scenarios. For instance, if a DDoS attack suspends an e-commerce portal for five hours, the business impact analysis will be able to quantify the losses from orders not made and customers moving permanently to other suppliers based on historic data.

38
Q

HE

A

Homomorphic Encryption: Encryption which allows manipulation of encrypted data without unencrypting it. (my words, paraphrased from book)

39
Q

SIEM

A

security information and event management

40
Q

BSSID

A

Basic service set identiifier: mac address of a WAP

41
Q

CBC

A

Cipher Block Chaining:

42
Q

ASLR

A

Address space layout randomization: laying out memory randomly to hinder attackers

43
Q

AIS

A

Automated indicator sharing: feed from DHS of indicators of compromise (IoC)

44
Q

CCMP

A

Counter-mode/CBCMAC protocol

45
Q

AIS

A

Automated Indicator Sharing (AIS) is a service offered by the Department of Homeland Security (DHS) for companies to participate in threat intelligence sharing

46
Q

ISO 27701

A

Extension of ISO standards 27001 and 27002 to include detailed management of PII (Personally Identifiable Information) and data privacy.

47
Q

ISO 31000

A

sets international standards for risk management practices

48
Q

CTI

A

Cyber Threat Intelligence: A type of platform through which a person/company can receive feed of threat data to use to determine whether Indicators of Compromise are present.

49
Q

DEP

A

Data execution prevention: restrictions against using space in memory as executable memory space when it is reserved for data

50
Q

ISO 27001

A

International standard for the foundation of Information Security Management Systems.

51
Q

SSAE

A

Statements on Standards for Attestation Engagements: Audit specifications developed by the American Institute of Certified Public Accountants (AICPA)

52
Q

ISO 27701

A

Extension of ISO standards 27001 and 27002 to include detailed management of PII (Personally Identifiable Information) and data privacy.

53
Q

ISO 31000

A

sets international standards for risk management practices

54
Q

PEAP

A

Protected EAP: encapsulates EAP in a TLS tunnel. Authenticates via MSCHAPV2 if using a Microsoft server as authentication server. Can also be used with Generic Token Card (GTC) or hardware token generator. Less secure than EAP-TLS.

55
Q

TACACS+

A

Terminal Access Controller Access-Control System Plus: reliable, connection-oriented delivery on TCP port 49 for encrypted transfers of critical network infrastructure data. Provides Authentication, Authorization and Accounting (AAA) functions. Centralizes logins for admin accounts for network appliances.

56
Q

NIST

A

National Institute of Standards and Technology

57
Q

EAP-FAST

A

FAST=Flexible Authentication via Secure Tunneling. EAP-FAST needs RADIUS server to provide authentication DB access.

58
Q

EAP

A

Extensible Authentication Protocol (EAP) provides a framework for deploying multiple types of authentication protocols and technologies.

59
Q

802.1X

A

Port-based Network Access Control (NAC) protocol provides the means of using an EAP method when a device connects to an Ethernet switch port, wireless access point (with enterprise authentication configured), or VPN gateway.

60
Q

PEAP

A

Protected EAP: encapsulates EAP in a TLS tunnel

61
Q

TACACS+

A

Terminal Access Controller Access-Control System Plus: reliable, connection-oriented delivery on TCP port 49 for encrypted transfers of critical network infrastructure data. Provides Authentication, Authorization and Accounting (AAA) functions. Centralizes logins for admin accounts for network appliances. Designed as a replacement for Radius.

62
Q

RADIUS

A

Remote Authentication Dial-In User Service: UDP/IP on ports 1812 and 1813

63
Q

EAP-FAST

A

FAST=Flexible Authentication via Secure Tunneling

64
Q

PAC

A

Protected Access Credential (part of EAP-FAST terminology). This is a shared secret in that system.

65
Q

AS

A

Authentication Server (in EAP-FAST terminology)

66
Q

EAP-TLS

A

More secure than PEAP as EAP-TLS uses digital certificates for both clients and servers rather than only on the server side like in PEAP. Excludes older devices as clients which cannot support digital certificates.

67
Q

EAP-TTLS

A

EAP over Tunneled TLS

68
Q

SAE

A

Simultaneous Authentication of Equals (Used with Pre-Shared Keys in authenticating to wireless networks). This gives each user a separate session ID even though everyone gets in with the same pass key.

69
Q

WPS

A

Wifi Protected Setup (The PINs only have 11k different combinations, so they can be vulnerable to brute force attacks. Newer devices have brute-force protection. Older devices should just have this disabled.)

70
Q

NFC

A

Near Field Communication

71
Q

DER certs

A

Distinguised Encoding Rules

72
Q

PEM certs

A

Privacy-Enhanced Mail (text formatted through base64 encoding)

73
Q

PKCS #12

A

Public Key Cryptography Standards #12 (can contain multiple X.509 certs in a single .p12 or .pfx file)

74
Q

CER Certs

A

Usually contains only public key

75
Q

PKCS #7

A

sent as .p7b file, stored in ASCII. Doesn’t contain private keys.

76
Q

dig

A

Domain Information Groper