Acronyms Flashcards

1
Q

FRR

A

False Rejection Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FAR

A

False Acceptance Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TGS

A

Ticket Granting Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TGT

A

Ticket Granting Ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TGT

A

Ticket Granting Ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

STIX

A

Structured Threat Information Expression
- a standardized XML programming language for conveying data about cybersecurity threats in a common language that can be easily understood by humans and security technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MSSP

A

Managed Security Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CAC

A

Common Access Cards
- Used by military personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PIV

A

Personal Identification Verification
- Used by US Federal Employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ISA

A

Interconnection Security Agreement
- How the systems of each party will be connected
- How data will be shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MSA

A

Measure System Analysis
- Sates measurements to be used to determine the quality and effectiveness of provided services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SIEM

A

Security Information & Event Management
- collects event log data from a range of sources, identifies activity that deviates from the norm with real-time analysis, and takes appropriate action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MOU

A

Memorandum of Understanding
- Provides a summary of which party is responsible for specific tasks
- Who is going to do what, when

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BPO

A

Blanket Purchase Order
- agreement w/ 3rd party vendor to provide services on an ongoing basis
- typically negotiated to take advantage of a preset discounted pricing structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SLA

A

Service Level Agreement
- Specifies services provided by 3rd party & what level of performance is guranteed
- may also define how disputes will be managed, warranties provided, specific disaster recovery procedures, and when agreement will be terminated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OCSP

A

Online Certificate Status Protocol
- used for obtaining the revocation status of an X.509 digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CSR

A

Certificate Signing Requests
- one of the first steps towards getting your own SSL/TLS certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

PEM

A

Privacy Enhanced Mail
- used to store SSL certificates and their associated private keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

P7B

A

A format for sharing and achieving certificates without the private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DER

A

Distinguished Encoding Rules
- digital certificate file that is created and stored in binary format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

.cer

A

certificate files stored using a base-64 encoded X.509 certificate format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

PFX

A

Personal Information Exchange
- used to signify a file carrying just a single certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

RIPEMD

A

RACE Integrity Primitives Evaluation Message Digest
- group of hash functions
- most popular is 160 bit
- also offers 128, 256, and 320 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

MD5

A

Message Digest 5
- 128 bit hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

SHA-2

A

Secure Hashing Algorithm 2
- set of cryptographic hash functions
- variable length input into fixed-length hashes
- 224, 256, 384, 512 bit hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

SHA-1

A

Secure Hashing Algorithm 1
- produces only 160 bit hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

RC4

A

Rivest Cypher 4
- Stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

ECC

A

Elliptical Curve Cryptography
- Newer, complex mathematical approach to create relative short but very secure and high-performance keys
- used when device is low powered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

OSINT

A

Open-source Intelligence
- collection and analysis of data gathered from open sources to produce actionable intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

HMAC

A

Hash-Based Message Authentication Code
- Allows user to verify that a file or message is legitimate

31
Q

DPR

A

Disaster Recovery Plan
- describes how an organization can quickly resume work after an unplanned incident

32
Q

BCP

A

Business Continuity Plan
- consists of the critical information an organization needs to continue operating during an unplanned event

33
Q

ASA

A

Adaptive Security Appliance
- security device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN)

34
Q

CSA

A

Cloud Security Alliance
- best practices for providing security assurance within cloud computing

35
Q

ISO

A

International Organization for Standardization
- develop and publish International Standards

36
Q

eHI

A

Electronic Health Information

37
Q

IDS

A

Intrusion Detection System
- identifies threats but does nothing to prevent issues

38
Q

IPS

A

Intrusion Prevention System
- identifies threats and tries to stop issue

39
Q

DLP

A

Data Loss Prevention

40
Q

FACTA

A

Fair and Accurate Credit Transactions Act
- intended to prevent credit card theft and fraud

41
Q

FISMA

A

Federal Information Security Management Act
- defines an information security framework for government agencies and their contractors

42
Q

COD

A

Certificate of Destruction
- document that states receipt and destruction of confidential data

43
Q

PTZ

A

Pan Tilt Zoom camera

44
Q

TACACS+

A

Terminal Access Controller Access Control Server
- Provides 3 protocols
- authentication
- authorization
- accounting
Uses
- TCP 49
Encrypts entire data packet contents

45
Q

RBAC

A

Role-based Access Control

46
Q

DAC

A

Discretionary Access Control
- Access assigned directly to subjected based on the discretion of the data owner

47
Q

MAC (access control)

A

Mandatory Access Control
- labels both users who need access (subjects) and resources w/ controlled access (objects)

48
Q

DACL

A

Discretionary Access Control
- Objects have a discretionary access control list w/ entries for each subject

49
Q

SOAR

A

Security Orchestration, Automation, Response
- assess, detect, intervene, or search through incidents and processes without the consistent need for human interaction

50
Q

ALE

A

Annualized Loss Expectancy
-Formula:
Asset value * exposure factor *ARO (annualized rate of occurrence)

51
Q

PAP

A

Password Authentication Protocol
- Transmits passwords in clear text

52
Q

DRM

A

Digital Rights Management

53
Q

IRM

A

Information Rights Mangement

54
Q

HSM

A

Hardware Security Module
- Physical security device
- manages and safe guards digital keys and performs encryptions and decryption

55
Q

APT

A

Advanced Persistent Threat
- threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period

56
Q

TAXII

A

Trusted Automated eXchange of Intelligence of Information
- enables exchange of threat intelligence

57
Q

SED

A

Self-encrypting Drive

58
Q

IP

A

Intellectual Property

59
Q

ANT

A

Advanced and Adaptive Network Technology
- similar to bluetooth
- designed for more specialized devices

60
Q

iPaaS

A

Integration Platform as a Service
- set of automated tools that integrate software applications that are deployed in different environments

61
Q

MaaS

A

Monitoring as a Service

62
Q

AaaS

A

Analytics as a Service

63
Q

FWaaS

A

Firewall as a Service

64
Q

EBS

A

Enterprise Service Bus
- Set of rules and principles for integrating numerous applications together

65
Q

PDS

A

Protected Distribution System
- Protects classified network data by using physical security
- best way to protect data in transit when strong cryptography is not feasible
- keeps cabling secure while also preventing electronic emissions

66
Q

COOP

A

Continuity of operations plan
- same as BCP (Business continuity plan)
- term favored by public and government entities

67
Q

BIA

A

Business Impact Analysis
-predicts the consequences of disruption of a business function

68
Q

PFS

A

Perfect Forward Secrecy
- Requires more computer power
- Browser must support it
- Uses ECDHE (Elliptical Curve or Diffie-Helman Ephemeral)
- Every sessions uses a different private key

69
Q

ECB

A

Electronic Codebook
- Simplest encryption mode
- Each block is encrypted w/ same key

70
Q

CBC

A

Cipher Block Chaining
- Each plaintext block is XORed w/ previous cypher block
- Uses an initial vector block

71
Q

CTR

A

Counter
- Uses incremental counter

72
Q

GCM

A

Galois/Counter Mode
- Encryption w/ authentication
- Commonly used in networks (SSH, TLS)

73
Q

VFA

A

Virtual Firewall Appliance
- provides packet filtering and monitoring