Acronyms !! Flashcards
AUP
Acceptable user policy – determines what is and what is not permitted on the network.
AP
Access Point
OID
Object identifiers
RAT
Remote Access Trojan
MAC
Mandatory Access Control – refers to a type of access control by which the operating system or database constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.
AAA
Authentication, Authorization, and Accounting
DAC
Discretionary access control – (DAC) model assigns an owner to an object, and the owner establishes access to users for the objects.
TAP
Test Access Point – a device that copies signals from the physical layer and the data link layer. Since no network or transport logic is used, every frame is received, allowing reliable packet monitoring.
MAM
Mobile Application Management – sets policies for apps that can process corporate data and prevents data transfer to personal apps. This type of solution configures an enterprise-managed container or workspace.
UEM
Unified Endpoint Management – is a suite of applications and features that extends the concept of network access control (NAC) solutions to the mobile device. UEM may include MAM.
NAC
Network Access control – an approach to computer security that attempts to unify endpoint security technology, user or system authentication and network security enforcement.
ARP
Address Resolution Protocol
DNS
Domain Name System
IP
Internet Protocol
RDP
Remote Desktop Protocol – is Microsoft’s protocol for operating remote connections to a Windows machine.
VPN
Virtual Private Network
RAM
Random Access Memory
SOAR
Security Orchestration, Automation, and Response. SOAR allows better response when the volume of alerts becomes overwhelming.
SEDS
Self-encrypting drives
FPGA
Field Programmable Gate Arrays – are semiconductor devices that contain programmable logic blocks and interconnection circuits. These devices can be programmed and reprogrammed to meet the required functionality. Difficulty in updating and patching is often a downfall of embedded systems such as FPGAs.
OT
Operational Technology
FQDN
Fully Qualified Domain Name
DNSSEC
Domain Name System Security Extensions
DHCP
Dynamic Host Configuration Protocol
SFTP
Secure File Transfer Protocol
FTP
File Transfer Protocol
TFTP
Trivial File Transfer Protocol – is a simple protocol for exchanging files between two TCP/IP machines. TFTP servers allow connections from a TFTP Client for sending and receiving files.
CIRT
Cyber Incident Response Team
HIPS
Host-based Intrusion Prevention System
OS
Operating System