Acronyms Flashcards
3DES
Triple Digital Encryption Standard
- Deprecated and considered insecure. Replaced by AES
- Symmetric
- Applies the DES cipher algorithm 3 times to each data block
AAA
-Authentication, Authorization, and Accounting)
- Often used to describe RADIUS, or some other form of networking protocol that provides Authentication, Authorization, and Accounting
ABAC
Attribute Based Access Control
Rights granted through policies that combine attributes together
Active Directory
Database and identity service used to provide identity management
ACL
Access Control List
- Set of rules that allow/permit or deny any traffic flow through routers
- Looks at the packet to determine whether it should be allowed or denied
- Works at layer 3 toprovide security by filtering & controlling the flow of trafficfrom one router to another
AES
Advanced Encryption Standard
- Industry-standard for data security
- 128-bit, 192-bit, or 256-bit (strongest) implementations
AES256
Advanced Encryption Standard 256 bits
AH
Authentication Header
- Used to authenticate origins of packets of data transmitted
- These headers don’t hide any data from attackers, but they do provide proof that the data packets are from a trusted source and that the data hasn’t been tampered with
- Helps protect against replay attacks
AIS
Automated Indicator Sharing
- DHS and CISA free program
- Enables organizations to share and receive machine-readable cyber threat indicators (CTIs) and defensive measures (DMs) in real-time
- Useful to monitor and defend networks against known threats
ALE
Annualized Loss Expectancy
ie: can expect x number of devices to fail per year
AP
Access Point
Networking hardware device that provides Wi-Fi access, typically then connected via wire to the router, or directly integrated in the router itself
APT
Advanced Persistent Threat
Stealthy threat actor (usually nation-state or state-sponsored group) that gains unauthorized access to a system and remains undetected for a period of time
ARO
Annualized Rate of Occurrence
The calculated probability that a risk will occur in a given year
ARP
Address Resolution Protocol
Connects IP address with MAC address
ASLR
Address Space Layout Randomization
Prevent exploitation of memory corruption vulnerabilities
ASP
Active Server Page
- Microsoft server-side scripting language and engine to create dynamic web pages
- Superseded by ASP.NET in 2002
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge
Knowledge base framework of adversary tactics and techniques based on real-world observations
AUP
Acceptable Use Policy
Terms that users must accept in order to use a network, system, website, etc…
AV
Antivirus
- Antivirus software
- Typically uses signature-based detection
- Not effective against zero-days or polymorphic malware
BASH
Born Again Shell
Powerful UNIX shell and command language
BCP
Business Continuity Planning
- Plan used to create processes and systems of both prevention and recovery to deal with threats that a company faces
- This plan outlines how a business can continue delivering products and services if crap hits the fan
BIA
Business Impact Analysis
Used to predict the consequences a business would face if there were to be a disruption
BGP
Border Gateway Protocol
- “The postal service of the Internet”
- BGP finds the best route for data to travel to reach its destination
BIOS
Basic Input Output System
- Firmware that performs hardware initialization when systems are booting up, and to provide runtime services for the OS and programs
- First software to run when you power on a device
BPA
Business Partnership Agreement
Defines a contract between two or more parties as to how a business should run
BPDU
Bridge Protocol Data Unit
- Frames that have spanning tree protocol information
- Switches send BPDUs with a unique source MAC address to a multicast address with a destination MAC
BYOD
Bring your own device
CA
Certificate Authority
An organization that validates the identities of entities through cryptographic keys by issuing digital certificates
CAC
Common Access Card
Smart card for active duty personnel
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
CAR
Corrective Action Report
Lists defects that need to be rectified
CASB
Cloud Access Security Broker
- Acts as an intermediary between the cloud and on-prem
- Monitors all activity
- Enforces security policies
CBC
Cipher Block Chaining
- CBC is a mode of operation for block ciphers
- Block ciphers (for encryption) by themselves would only work for a single block of data…a mode of operation like CBC can be used to give instructions on how to apply encryption to multiple blocks of data
- CBC helps prevent issues of identical blocks, even if you have identical inputs. It does that by using an operation called XOR (exclusive-OR)
CBT
Computer Based Training
CCMP
Counter-Mode/CBC-Mac Protocol
Encryption protocol designed for Wireless LAN products
CCTV
Closed Circuit Television
CERT
Computer Emergency Response Team
CIRT
Computer Incident Response Team
CFB
Cipher Feedback
When a mode of operation uses the ciphertext from the previous block in the chain
CHAP
Challenge Handshake Authentication Protocol
- Authenticates a user or network host to an authenticating entity
- Provides protection against replay attacks
- Requires that both the client and server know the plaintext of the secret, but it’s never sent over the network
CIO
Chief Information Officer
CTO
Chief Technology Officer
CSO
Chief Security Officer
CIS
Center of Internet Security
CMS
Content Management System
COOP
Continuity of Operation Planning
Effort for agencies to make sure they can continue operations during a wide range of emergencies
COPE
Corporate Owned Personal Enabled
Organization provides its employees with mobile computing devices
CP
Contingency Planning
CRC
Cyclical Redundancy Check
Used to detect accidental changes in digital networks and storage devices
CRL
Certificate Revocation List
CSP
Cloud Service Provider
CSR
Certificate Signing Request
- Contains information that the Certificate Authority (CA) will use to create your certificate
- Contains the public key for which the certificate should be issued, and other identifying information
CSRF
Cross Site Request Forgery
Unauthorized actions are performed on behalf of a legitimate user
CSU
Channel Service Unit
Device used for digital links to transfer data
CTM
Counter Mode
- Converts a block cipher into a stream cipher
CVE
Common Vulnerabilities Exposure
List of publicly disclosed computer security flaws
These security flaws get assigned a CVE ID number which people can use to reference them
CVSS
Common Vulnerability Scoring System
Public framework used to rate the severity of security vulnerabilities
CYOD
Choose your own device
DAC
Directory Access Control
Restriction of access based upon the identity of subjects and the groups they belong to
DBA
Database Administrator
DEP
Data Exclusion Prevention
- Microsoft security feature
- Monitor and protects pages or regions of memory
- Prevents data regions from executing (potentially malicious) code
DER
Distinguished Encoding Rules
DES
Digital Encryption Standard
DHE
Diffe Hellman Ephemeral
Way of securely exchanging cryptographic keys over public channels
DKIM
Domain Key Identified Mail
Email authentication technique - applies signatures by the mail server of the sender’s domain
DLL
Dynamic Link Library
- Library that contains code and data that can be used by programs to function in Windows
- DLL injections can run malicious code within an application by exploiting DLLs
DMARC
Domain Message Authentication Reporting and Conformance
- Authenticates emails with SPF and DKIM
- Used to prevent phishing and spoofing
DNAT
Destination Network Address Transcation
DPO
Data Privacy Officer
DRP
Disaster Recovery Plan
DSA
Digital Signature Algorithm
EAP
Extensible Authentication Protocol
Authentication framework used in LAN’s
ECB
Electronic Code Book
Doesn’t hide data patterns well, so it wouldn’t work to encrypt images for example
ECC
Elliptic Curve Cryptography
Good for mobile devices because it can use smaller keys
ECDHE
(Elliptic Curve Diffie-Hellman Ephemeral)
ECDSA
Elliptic Curve Digital Signature Algorithm
EDR
Endpoint Detection and Response
Technology that continuously monitors endpoints to mitigate cyber threats
EFS
Encrypted File System
EOL
End of Life
Date set where manufacturer will no longer create the product
EOS
End of Service
Original manufacturer no longer offers updates, support, or service
ERP
Enterprise Resource Planning
ESN
Electronic Serial Number
ESP
Encapsulated Security Payload
- Member of IPsec set of protocols
- Encrypts and authenticates packets of data between computers using VPNs
FACL
File System Access Control List
FDE
Full Disk Encryption