Acronyms Flashcards
ABAC
Attribute-based access control
*typically matched to attributes other than the job role.
AD HOC
A wireless network that allows easy connection establishment between wireless client devices in the same physical area without the use of an infrastructure device, such as an access point or a base station.
AES
Advanced Encryption Standard
*a symmetric block cipher chosen by the U.S. government to protect classified information
API Keys
Application Programming Interface
*a code used to identify and authenticate an application or user.
APT
Advanced Persistent Threats
*advanced techniques that are persistent, occurring over a significant period of time.
ARP
Address Resolution Protocol
*used to associate the IP address to a MAC address.
AUP
Acceptable Use Policy
*an agreement between two or more parties that outlines the appropriate use of access to a corporate network or the internet
BIOS
Basic Input-Output system
*a low-level software that resides in a chip on your computer’s motherboard.
BPA
Business Partnership Agreements
*legal agreements between partners. This is a legal agreement that outlines the terms, conditions, and expectations between the partners.
BYOD
Bring Your Own Device
*allows users to use their own device, rather than have the company provide it
CAN bus
The Controller Area Network - bus is a message-based protocol designed to allow the Electronic Control Units (ECUs) found in today’s automobiles, as well as other devices, to communicate with each other in a reliable, priority-driven fashion
CASB
Cloud Access Security Broker
*an intermediary between users, devices, and cloud providers that enforces security policies.
C&C
Control and Command
CCMP
Counter Mode CBC-MAC Protocol
*the encryption mechanism that is the security standard used with WPA2 wireless networks. A block cipher, CCMP provides confidentiality, authentication, and access control features.
CER
Crossover Error Rate
*describes the overall accuracy of a biometric system.
CIA Triad
Confidentiality, Integrity, Availability
CISA
Cybersecurity and Infrastructure Security Agency
COOP
the federal government’s standards for continuity of operations
* four phases: readiness and preparedness, activation and relocation, continuity facility operations, and reconstitution
COPE
Corporate-Owned, Personally Enabled
CRM
Customer relationship management
*packages offered in the cloud would be classified as software-as-a-service (SaaS), since they are not infrastructure components.
CYOD
Choose Your Own Device
*allows users to choose a device but then centrally manages it.
DAC
Discretionary access control
*the principle of restricting access to objects based on the identity of the subject (the user or the group to which the user belongs)
DAD Triad
Disclosure, Alteration, Denial
DDoS
Distributed Denial-of-Service
DES
Data Encryption Standard
*an outdated symmetric key method of data encryption
DLP
Data Loss Prevention
DKIM
DomainKeys Identified Mail
*a protocol that allows an organization to take responsibility for transmitting a message by signing it in a way that mailbox providers can verify.
DMARC
Domain-based Message Authentication Reporting and Conformance
*a free and open technical specification that is used to authenticate an email by aligning SPF and DKIM mechanisms.
DMZ
Demilitarized Zone
*a secured zone exposed to a lower trust level area or population
DNS
Domain Name System
DOS
Denial of Service
*these attacks create viruses, make a Trojan horse, or even distribute ransomware as a service.
DRM
Digital Rights Management
DROP
Don’t Route or Peer Lists
EAP
Extensible Authentication Protocol
*an architectural framework that provides extensibility for authentication methods for commonly used protected network access technologies
EV
Extended validation certificates provide the highest available level of assurance
FAR
False Acceptance Rate
*the percentage of identification instances in which unauthorized persons are incorrectly accepted.
FDE
Full-Device Encryption
FPGA
Field Programmable Gate Arrays
*a hardware circuit that a user can program to carry out one or more logical operations
FRR
False Rejection Rate
*the percentage of identification instances in which authorized persons are incorrectly rejected.
HIPS
Host Intrusion Prevention System
HOTP
Hash-based one-time password
*it is based on hash-based message authentication codes.
HMAC-based
Hash-based message authentication code is a cryptographic authentication technique that uses a hash function and a secret key.
HSM
Hardware Security Module
*used to create, manage, and store cryptographic certificates as well as perform and offload cryptographic operations
HTTP or HTTPS (secure)
Hypertext Transfer Protocol
*an application-layer protocol for transmitting hypermedia documents, such as HTML.
IoCs
Indicators of Compromise
*the telltale signs that an attack has taken place and may include file signatures, log patterns, and other evidence left behind by attackers.
IKE
Internet Key Exchange
*the standard used for remote host, network access, and virtual private network (VPN) access.
IMAP or IMAPs (Secure)
Internet Message Access Protocol
- a method of accessing and storing mail on a mail server.
- runs on TCP Port 993