Acronyms Flashcards
3DES
Triple Digital Encryption Standard
Performs encryption in 3 times of the same algorithm
802.1x
Switch authentication
Standard for controlling access to intranet infrastructure
AAA
Authentication, Authorization, and Accounting
The Principle of verifying identity, capability and use
ABAC
Attribute-based Access Control
Granting access based upon the characteristic of the
subject, such as clearance level.
ACL
Access Control List
Restricting entry, based upon a listing of controls or permissions.
AES
Advanced Encryption Standard
Rijndael was approved by the US government and given this title
AES256
Advance Encryption Standard 256bit
The 26 bit version of this algorithm is its highest level and is deemed uncrackable by brute force methods.
AH
Authentication Header
The AH header transmit in clear text but authenticates and integrity checks each packet
AI
Artificial Intelligence
The simulation of human intelligence and thinking in a machine, including adaptive learning and problem solving
AIS
Automatic Indicator Sharing
Automated sharing of threat information between organizations to enhance detection and response.
ALE
Annualized Loss Expectancy
The single loss expectancy times the annualized rate of occurrence
ALG
Application Layer Gateway
This is a type of firewall able to inspect headers and payload in the upper protocol layers
AP
Access Point
Infrastructure connection point for most wireless networks
API
Application Programming Interface
These are developed tools used by programmers that have prebuilt functions with desired utility
APT
Advanced Persistent Threat
Applications with advanced targeting, zero days and
exfiltration techniques that are aimed at particular
organizations or industries.
ARO
Annualized Rate of Occurrence
Most risk assessments track threats and attacks on an
annualized basis.
ARP
Address Resolution Protocol
Given the IP address ARP will locate the MAC address.
ASLR
Address Space Layout Randomization
This randomizes the location of an application in
memory making it harder for attackers to successfully
perform the buffer overflow.
ASP
Application Service Provider
An organization provides access to its custom
developed software, such as accounting or customer
management.
ATT&CK
Adversarial Tactics,
Techniques, and Common
Knowledge
A database of adversarial tactics and techniques that
might be used to compromise systems organizations to
enhance threat management.
Asymmetric key
Public key/Private key
The use of complementary values to disguise and then
reveal information.
AUP
Acceptable Use Policy
This policy is legally required, if HR wants to fire
someone for misuse.
AV
Antivirus
Designed to identify malware, primarily based upon
known patterns.
AV
Asset Value
This can be the replacement cost or income derived
from something.
AXFR
Zone transfer
The synchronization of name resolution information
between a primary and secondary DNS server.
BASH
Bourne again shell
Bash is a UNIX and Linux command interface and
language.
BIA
Business Impact Analysis
This is the prerequisite for disaster recovery and
continuity planning to identify potential losses.
BIOS
Basic Input/Output System
The now deprecated initial program sets for computer.
Firmware based initialization code for booting a system.
Bluetooth
802.15
Technology commonly used to communicate with small
devices at modest speeds over a short range with low
security requirements.
BCP
Business Continuity Plan
The orderly planning for and management of threats and
incidents to an organization.
BGP
Border Gateway Protocol
Border Gateway Protocol is for routing exterior traffic
between autonomous systems/organizations.
BIA
Business Impact Analysis
Assessing the criticality of business activities and assets
in order to determine the appropriate protection and
recovery options.
BO
Buffer overflow
The insertion of malicious computer instructions into
the RAM of a host to accomplish denial of service or
injecting shellcode.
BPA
Business Partners Agreement
This outlines the goals and responsibilities between
entities pursuing a common work product.
BPDU
Bridge Protocol Data Unit
This protocol is used to identify efficient paths and
loops in a switched network.
BSSID
Basic Service Set IDentifier
This is the MAC address that a wireless device is
attached to.
Brute Force
Brute force attack
Discovers a hash or encrypted secret by attempting all
combinations and permutations.
BYOD
Bring Your Own Device
The organization compensates the individual for use of
their phone in organizational activities.
C2
Command and control
Servers that are centrally placed the hold control
instructions for illicitly managed hosts.
CA
Certificate Authority
This entity issues certificates. After verifying them, and
is the center of trust in PKI.
CAC
Common Access Card
A form of identification with photograph, barcode,
RFID and cryptographic storage of private key
information.