Acronyms Flashcards
FRR
False Rejection Rate
FAR
False Acceptance Rate
TGS
Ticket Granting Service
TGT
Ticket Granting Ticket
TGT
Ticket Granting Ticket
STIX
Structured Threat Information Expression
- a standardized XML programming language for conveying data about cybersecurity threats in a common language that can be easily understood by humans and security technologies
MSSP
Managed Security Service Provider
CAC
Common Access Cards
- Used by military personnel
PIV
Personal Identification Verification
- Used by US Federal Employees
ISA
Interconnection Security Agreement
- How the systems of each party will be connected
- How data will be shared
MSA
Measure System Analysis
- Sates measurements to be used to determine the quality and effectiveness of provided services
SIEM
Security Information & Event Management
- collects event log data from a range of sources, identifies activity that deviates from the norm with real-time analysis, and takes appropriate action
MOU
Memorandum of Understanding
- Provides a summary of which party is responsible for specific tasks
- Who is going to do what, when
BPO
Blanket Purchase Order
- agreement w/ 3rd party vendor to provide services on an ongoing basis
- typically negotiated to take advantage of a preset discounted pricing structure
SLA
Service Level Agreement
- Specifies services provided by 3rd party & what level of performance is guranteed
- may also define how disputes will be managed, warranties provided, specific disaster recovery procedures, and when agreement will be terminated
OCSP
Online Certificate Status Protocol
- used for obtaining the revocation status of an X.509 digital certificate
CSR
Certificate Signing Requests
- one of the first steps towards getting your own SSL/TLS certificate
PEM
Privacy Enhanced Mail
- used to store SSL certificates and their associated private keys
P7B
A format for sharing and achieving certificates without the private key
DER
Distinguished Encoding Rules
- digital certificate file that is created and stored in binary format
.cer
certificate files stored using a base-64 encoded X.509 certificate format
PFX
Personal Information Exchange
- used to signify a file carrying just a single certificate
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
- group of hash functions
- most popular is 160 bit
- also offers 128, 256, and 320 bit
MD5
Message Digest 5
- 128 bit hash
SHA-2
Secure Hashing Algorithm 2
- set of cryptographic hash functions
- variable length input into fixed-length hashes
- 224, 256, 384, 512 bit hashes
SHA-1
Secure Hashing Algorithm 1
- produces only 160 bit hash
RC4
Rivest Cypher 4
- Stream cipher
ECC
Elliptical Curve Cryptography
- Newer, complex mathematical approach to create relative short but very secure and high-performance keys
- used when device is low powered
OSINT
Open-source Intelligence
- collection and analysis of data gathered from open sources to produce actionable intelligence