Acronyms Flashcards
ASLR
Address Space Layout Randomization
Memory protection for operating systems
Guards against buffer overflow attacks
Randomized place system executables are loaded into memory
ARO
Annualized Rate of Occurrence
How likely a particular issue/disaster is to happen
SLE
Single Loss Expectancy
Cost for one single event
ALE
Annual Loss Expectancy
How much it will cost in a year
Calculated by multiplying ARO and SLE
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge
MITRE ATT&CK framework
Information about attacks and how to prevent
AUP
Acceptable Use Policy
Documentation for how all company assets are to be used
Allows for employer to note how things should be used
BIA
Business Impact Analysis
What of the business will be impacted
RTO
Recovery Time Objective
How much time it will take to get back to a certain point
Used in conjunction with RPO
RPO
Recovery point objective
What point is acceptable to recover to
In relation to data
MTTR
Mean time to repair
How log is it going to take to fix an issue
MTBF
Mean time between failures
Predict time between outages
DRP
Disaster Recovery Plan
Detailed plan for resuming operations after an incident
EDM
Exact data match
Used to match format of data (I.E. matching format of ssns)
Cain and Abel
Password cracking tool, includes network packet sniffing, brute force cracking, dictionary attacks, cryptoanalysis, and Cisco VPN Client Password Decoding
SLA
service level agreement- detailes terms under which the service is provided
NAC
Network access control- endpoint security technology (anti-virus, HIPS, vulnerability assessments, user/system authentication, network security enforcement). Segments new remote workstations and scans them for malware and vulnerabilities then allows them to connect if it passes
CCM
Cloud Control Matrix
From CSA
Applies to security controls in the cloud
SPF
EMail authentication to detect forging sender addresses during email delivery
DSUA
Specifies data can only be collected for a specific reason
ISA
Used by Federal agencies interconnecting IT systems to 3rd party
Used to govern the relationlship
27001
Standards for information security
27002
Steps for implementation of information security controls
Code of practice
27701
Privacy management
PIMS
31000
Standards for risk management