Acronyms Flashcards
FDE
Full-Disk Encryption - fully encrypts the hard drive on a computer
TPM
Trusted Platform Module - used for boot integrity
SDN
Software-Defined Networking - virtualized networking
DMZ
Demilitarized Zone - used to segment a network
CSR
Certificate Signing Request
CN
Common Name for a certificate for a system - typically the Fully Qualified Domain Name for a server
FQDN
Fully Qualified Domain Name
RFID
Radio Frequency Identification
CSO
Chief Security Officer
MDM
Mobile Device Management
DHCP
Dynamic Host Configuration Protocol
SSH
Secure Shell -secure protocol used to connect to command-line shells, and can be used to tunnel other protocols
TLS
Transport Layer Security
RBAC
Role-based Access Control - based on user’s position in the organization
MAC
Mandatory Access Control - permissions granted by security classifications
DAC
Discretionary Access Control - allows data owners to set permissions
ABAC
Attribute-based access control - considers various attributes such as location, time, computer, username, password, etc
SED
Self-encrypting drive
SIEM
Security Information and Event Management
XSS
Cross-site Scripting
UEM
Universal Endpoint Management - A universal endpoint management (UEM) tool can manage desktops, laptops, mobile devices, printers, and other devices. UEM tools often use applications deployed to mobile devices to configure and manage them
CASB
Cloud Access Security Broker
IPS
Intrusion Prevention System
IDS
Intrusion Detection System
NIPS
Network Intrusion Prevention System
NIDS
Network Intrusion Detection System
NTLM
New Technology LAN Manager - an older Windows authentication protocol
DMZ
De-militarized zone - provides limited access to public-facing servers for outside users, but blocks outside users from accessing systems inside the LAN.
VPC
Virtual datacenter?
CCMP
Counter Mode Block Chaining Message Authentication (CBC-MAC) Protocol, is AES-based, used by WPA2 to encapsulate traffic. Is the minimum acceptable encryption used by WPA3
CYOD
Choose Your Own Device - allows users to choose a device that is corporate-owned and paid for. Choices may be limited to a set of devices, or users may be allowed to choose essentially any device depending on the organization’s deployment decisions
BYOD
Bring Your Own Device
COPE
Corporate-Owned, Personally Enabled - provides devices to users that they can then use for personal use.
VDI
Virtual Desktop Infrastructure - used as an access layer for any security model where specialized needs or security requirements may require access to remote desktop or application services
WPS
Wi-fi Protected Setup
SSO
Single Sign-On
SAML
Security Assertion Markup Language - used by many identity providers to exchange authorization and authentication data with service providers
LDAP
Lightweight Directory Access Protocol
SSID
Service Set Identifier
RADIUS
Remote Authentication Dial-In User Service
VLAN
Virtual local area network - most often used to segment the internal network
TPM
Trusted Platform Module - a secure cryptoprocessor used to provide a hardware root of trust for systems. They enable secure boot and boot attestation capabilities and include a random number generator, the ability to generate cryptographic keys for specific uses, and the ability to bind and seal data used for processes the TPM supports.
NAC
Network Access Control
OTA
Over-the-air updates are used by cellular carriers as well as phone manufacturers to provide firmware updates and updated phone configuration data
MDM
Mobile Device Management
SAE
Simultaneous Authentication of Equals - used in WPA3 (wi-fi protocol) to improve on previous models - WPA3’s Personal mode replaces the pre-shared key mode found in WPA2 with simultaneous authentication of equals
ARP
Address Resolution Protocol
HIPS
host-based intrusion prevention system - can monitor network traffic to identify attacks, suspicious behavior, and known bad patterns using signatures
DLP
Data loss prevention - these tools allow sensitive data to be tagged and monitored so that if a user attempts to send it, they will be notified, administrators will be informed, and if necessary, the data can be protected using encryption or other protection methods before it is sent
-designed to protect data from being exposed or leaking from a network using a variety of techniques and technology
FTP
File Transfer Protocol
PSK
Pre-shared Key
SNMP
Simple Network Management Protocol - can provide information about the status and configuration of her network devices
SRTP
Secure version of the Real-Time Transport Protocol, used primarily for voice over IP (VoIP) and multimedia streaming or broadcast
ABAC
Attribute-based access control
UEFI
Unified Extensible Firmware Interface
BIOS
Basic input/output system
CHAP
Challenge Handshake Authentication Protocol - periodically has the client re-authenticate. This is transparent to the user but is done specifically to prevent session hijacking
PAP
Password Authentication Protocol - actually quite old
HSM
Hardware Security Module -provide many cryptographic functions, but they are not used for boot attestation (TPM). A physical device that safeguards and manages digital keys
OAuth
Open Authorization
TOTP
Time-based one-time passwords
HOTP
HMAC (hash-based message authentication code)-based one-time passwords
HMAC
Hash-based message authentication code
Xaas
Anything as a service
SCADA
Supervisory Control and Data Acquisition
TLS
Transport Layer Security - a reliable method of encrypting web traffic. It supports mutual authentication and is considered secure. Created in 1999 as the successor to SSL (secure sockets layer)
ECC
Elliptical-curve cryptography - faster than RSA-based cryptography because it can use a smaller key length to achieve levels of security similar to a longer RSA key (a 228-bit elliptical curve key is roughly equivalent to a 2,380-bit RSA key)
SAN
Storage Area Network