Acronyms Flashcards
DLP
Data Loss Prevention
HIDS
Host-Based Intrusion Detection System
EDR
Endpoint Detection and Response
NIPS
Network-Based Intrusion Prevention System
IRP
An incident response plan lists the procedures, contacts, and resources available to responders for various incident categories. The CSIRT should develop profiles or scenarios of typical incidents (DDoS attack, virus/worm outbreak, data exfiltration by an external adversary, data modification by an internal adversary, and so on). This will guide investigators in determining priorities and remediation plans. Steps included are: preparation, identification,
containment, eradication, recovery, and lessons learned
CVE
Common Vulnerabilities and Exposures
PUP
Potentially Unwanted Program (programs which MIGHT NOT be malware, but that you may not want, like AdWare)
SCADA
Supervisory Control And Data Acquisition
CASB
cloud access security broker: enterprise management software designed to mediate access to cloud services by users across all types of devices.
DAC
Discretionary Access Control
ABAC
Attribute-based access control
SCAP
Security Content Automation Protocol
SOAR
Security orchestration, automation, and response (SOAR) is designed as a solution to the problem of the volume of alerts overwhelming analysts’ ability to respond
FRR
False Rejection Rate—where a legitimate user is not recognized. This is also referred to as a Type I error or false non-match rate (FNMR)
FAR
False Acceptance Rate—where an interloper is accepted (Type II error or false match rate [FMR]).
CER
Crossover Error Rate—the point at which FRR (False Rejection Rate) and FAR (False Acceptance Rate) meet.
TPM
Trusted Platform Module
SDP
Software Defined Perimeter
AAA
Authentication, Authorization, and Accounting
MSSP
An managed security service provider (MSSP) provides outsourced monitoring and management of security devices and systems.
SOC
A security operations center (SOC – pronounced “sock”) is a team of experts that proactively monitor an organization’s ability to operate securely.
MAC
Mandatory Access Control: uses system of clearances and labels. Users can’t change the labels or their own clearance levels.
RAID 0
striping, no parity. Fast, but not fault tolerant.
RAID 1
Mirroring only. No improvement to speed, but adds fault tolerance.
RAID 5
Striping with parity, three disks. Allows one disk to fail without losing data. More efficient than RAID 1.
RAID 6
Striping with double parity: allows multiple disks to fail without losing data.
Nested RAID
Different combinations are possible, usually to improve speed or redundancy.
VTC
Video Tele-Conferencing
SIP
The Session Initiation Protocol (SIP) is one of the most widely used session control protocols. SIP endpoints are the end-user devices (also known as user-agents), such as IP-enabled handsets or client and server web conference software. Each device, conference, or telephony user is assigned a unique SIP address known as a SIP Uniform Resource Indicator (URI), such as sip:bob.dobbs@comptia.org
RTP/SRTP
While SIP provides session management features (for VoIP and VTC), the actual delivery of real-time data uses different protocols. The principal one is real-time Transport Protocol (RTP).SRTP is the secure version of this.