Acronyms Flashcards

1
Q

3DES

A

Triple Data Encryption Standard

  • Variant of DES that uses 3 different keys to perform the encryption process. (3 separate passes through the data)
  • Symmetrical
  • No longer use 3DES either
  • (AES is the workhorse encryption standard today)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, Accounting

  • Proving who you are
  • Deciding what you have access to
  • ## Keeping track of who authenticated onto network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute Based Access Control

  • An access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together.
  • The policies can use any type of attributes (user attributes, resource attributes, environment attribute etc.).
  • Ex: Permit managers to **, provided that **, if ** or ** unless **
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

  • set of permissions that are then assigned to an object
  • Used in firewalls, switches, routers, and OS
  • All of them to some degree allow/restrict access to certain parts of the network or to an OS
  • They can be very specific (to ports) and / or very complex
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AD

A

Active Directory

  • Directory servers that runs on Microsoft Windows Server
  • Main function is to enable administrators to manage permissions and control access to network resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

Advanced Encryption Standard

  • Most popular SYMMETRIC encryption in use today
  • Standard of the US Federal Government
  • Added to FIPS 197 in 2001 (It took five years to standardize and eventually replace DES)
  • 128 cipher block encryption (in a single pass)
  • Supports 128, 192, and 256 bit key sizes
  • Ex: A wireless network where all information is encrypted with WPA2 uses AES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES256

A

Advanced Encryption Standard 256bit

  • largest key size for AES (symmetric)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AH

A

Authentication Header

  • Can provide data integrity (Ex: in IPSec)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AIS

A

Automated Indicator Sharing

  • A way to automate the process of gathering and disseminating threat information that’s secure
  • A way to process and move the information between organizations over the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ALE

A

Annualized Loss Expectancy

  • ARO X SLE = ALE
  • The total number in dollars if an event occurs based on its frequency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AP

A

Access Point

  • Most APs allow you to configure MAC- level filtering to the AP itself
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARO

A

Annualized Rate of Occurrence

  • The number of times / year something happens
  • ARO X SLE = ALE
  • can be based on historical data, how often a threat would be successful exploiting a vulnerability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARP

A

Address Resolution Protocol

  • A way to translate IP address to MAC address.
  • Purpose is to find out the MAC address of a device on the LAN
  • used when IPV4 is used over ethernet
  • Helps resolve an address of a specific computer by sending a piece of information from the local computer to a remote computer where the server process is executed. This piece of information allows the server to identify the network system and provide the address
  • See also DHCP and DNS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ASLR

A

Address Space Layout Randomization

  • Method used by programmers to randomly arrange the different address spaces used by a program or process to prevent buffer overflow exploits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ASP

A

Active Server Pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ATT&CK

A

Adversarial Tactics, Techniques and Common Knowledge

  • MITRE framework
  • Identify broad categories of attacks, find exact intrusions and how they are occurring and how attackers are moving around after the attack and identify security techniques that can help you block future attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AUP

A

Acceptable Use Policy

  • Many organizations have them
  • Detailed documentation that covers how all of the different technologies in your environment should be used
  • Covers internet, telephones, computers, mobile devices
  • A way for employer to set expectations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BCP

A

Business Continuity Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BGP

A

Border Gateway Protocol

  • allows different autonomous systems on the internet to share routing information
  • more flexible than OSPF and can be used on larger networks
  • emphasis on determining the best path (OSPF, the fastest)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BASH
Bourne Again Shell
26
BIOS
Basic Input Output Systems
27
BPA
Business Partnership Agreement
28
BPDU
Bridge Protocol Data Unit - Primary protocol used by the Spanning tree protocol
29
BSSID
Basic Service Set Identifier
30
BYOD
Bring Your Own Device
31
CA
Certificate Authority
32
CAPTCHA
Completely Automated Public Turning Test to Tell Computers and Humans Apart
33
CAR
Corrective Action Report
34
CASB
Cloud Access Security Broker
35
CBC
Cipher Block Chaining
36
CCMP
Counter-Mode/CBC-MAC Protocol
37
CCTV
Closed Circuit Television
38
CERT
Computer Emergency Response Team
39
CFB
Cipher Feedback
40
CHAP
Challenge-Handshake Authentication Protocol - Used to provide authentication by using the user's password to encrypt a challenge string of random numbers - PAP and CHAP are mostly used with dial-up - MS-CHAP = Microsoft's versions
41
CIO
Chief Information Officer
42
CIRT
Computer Incident Response Team
43
CIS
Center for Internet Security - Non profit organization focused on developing globally-recognized best practices for securing IT systems and data against cyber attacks
44
CMS
Content Management System
45
CN
Common Name
46
COOP
Continuity of Operations Planning
47
COPE
Corporate-owned Personally Enabled
48
CP
Contingency Planning
49
CRC
Cyclic Redundancy Check
50
CSP
Cloud Service Provider
51
CSR
Certificate Signing Request
52
CSRF
Cross-Site Request Forgery
53
CSU
Channel Service Unit - hardware that concerts digital data frames from LAN into frames for WAN and vice versa - received and transmits signals to and from the WAN line and provided a barrier for electrical interference from either side of the unit - can echo loop back signals for testing purposes - connects the network provider side - CSU/DSU (Data service Unit). The DSU connects to your Data Terminal Equipment (often a router)
54
CTM
Counter-Mode
55
CTO
Chief Technology Officer
56
CVE
Common Vulnerabilities and Exposures
57
CVSS
Common Vulnerability Scoring System
58
CYOD
Choose Your Own Device
59
DAC
Discretionary Access Control
60
DBA
Database Administrator
61
DDoS
Distributed Denial of Service
62
DEP
Data Execution Prevention
63
DER
Distinguished Encoding Rules - most popular way to store X.509 file certificates - DER encoding certificates are supported by almost all applications - Ex: OpenSSL and keytool
64
DES
Data Encryption Standard - Created by the NSA and IBM b/n 1972 -1977, used to be the most popular symmetric encryption algorithm in use - Part of FIPs - Used 64-bit block cypher (encrypted 64 bits of data at a time) - Used a 56-bit key, which is small so now it is easy to brute force. - No longer practically used today as a result
65
DHCP
Dynamic Host Configuration Protocol - Network protocol that dynamically (automatically) assigns IP addresses to the computers or other devices on each LAN network - Can assign an IP address from within a given range - See also ARP and DNS - DHCP snooping = switch configured with a series of trusted interfaces that may have routers, switches and other DHCP servers on it, but it would have other interfaces that are not trusted, the switch is constantly monitoring the conversations
66
DHE
Diffie-Hellman Ephemeral
67
DKIM
Domain Keys Identified Mail
68
DLL
Dynamic-link Library
69
DLP
Data Loss Prevention
70
DMARC
Domain Message Authentication Reporting and Conformance
71
DNAT
Destination Network Address Translation
72
DNS
Domain Name System - Maps the IP addresses into a human-readable name and vice versa - Ex: IP address 1234... = professormesser.com - See also ARP and DHCP
73
DNSSEC
Domain Name System Security Extension
74
DoS
Denial of Service
75
DPO
Data Protection Officer
76
DRP
Disaster Recovery Plan
77
DSA
Digital Signature Algorithm
78
DSL
Digital Subscriber Line
79
EAP
Extensible Authentication Protocol - A framework of protocols that allows for numerous methods of authentication including passwords, digital certificates and public key infrastructure - EAP-MD5 uses simple passwords for challenge-authentication - EAP-TLS uses digital certificates for mutual authentication - EAP-TTLS uses server-side digital certificate and a client-side password for mutual authentication - EAP-FAST provides flexible authentication via secure tunneling (FAST) by using a protected access credential instead of a certificate for mutual authentication - Protected EAP - supports mutal authentication by using server certificates and Active Director to authenticate a client's passcode
80
ECB
Electronic Code Book
81
ECC
Elliptic-curve Cryptography
82
ECDHE
Elliptic-curve Diffie-Hellman Ephemeral
83
ECDSA
Elliptic-curve Digital Signature Algorithm
84
EDR
Endpoint Detection and Response
85
EFS
Encrypted File System
86
EIP
Extended Instructions Pointer - tracks the address of the current instruction running in an application - holds the address to (points to) the first byte of the next instruction to be executed
87
EOL
End of Life
88
EOS
End of Service
89
ERP
Enterprise Resource Planning
90
ESP
Encapsulation Security Payload - member of IPSec - encrypts and authenticated packed if data between computers using a VPN - one of two layers of protection for IP sec (other is AH) - ESP + Ah can operate in two modes transport (less secure) and tunnel (more secure)
91
ESSID
Extended Service Set Identifier
92
FACL
File-system Access Control List
93
FDE
Full Disk Encryption
94
FIM
File Integrity Monitoring
95
FPGA
Field Programmable Gate Array - A processor that can be programmed to perform a specific function by a customer rather than at the time of manufacture - End customer can configure the programming logic to run a specific application instead of using ASIC (application-specific integrated circuit) - (IoT) - considered an anti-tamper mechanism
96
FRR
False Rejection Rate
97
FTP
File Transfer Protocol
98
FTPS
File Transport Protocol Secure
99
ESN
Electronic Serial Number
100
GCM
Galois/Counter Mode
101
GDPR
General Data Protection Regulation
102
GPG
GNU Privacy Guard
103
GPO
Group Policy Object
104
GPS
Global Positioning System
105
GPU
Graphics Processing Unit
106
GRE
Generic Routing Encapsulation
107
HA
High Availability
108
HDD
Hard Disk Drive
109
HIDS
Host-based Intrusion Detection System
110
HIPS
Host-based Intrusion Prevention System
111
HMAC
Hash-based Message Authentication Code
112
HOTP
HMAC based One-time Password - A password is computed from a shared secret and is synchronized between the client and server - This was the original standard - Uses a counter, that increments with each new validation - It's still used but companies like Google use TOTP
113
HSM
Hardware Security Module - An appliance for generating and storing cryptographic keys that is less susceptible to tampering and insider threats than software based storage
114
HSMaaS
Hardware Security Module as a Service
115
HTML
Hypertext Markup Language
116
HTTP
Hyper Text Transfer Protocol
117
HTTPS
Hyper Text Transfer Protocol Secure
118
HVAC
Heating, Ventilation, Air-conditioning
119
IaaS
Infrastructure as a Service
120
IAM
Identity and Access Management
121
ICMP
Internet Control Message Protocol
122
ICS
Industrial Control Systems - A network that manages embedded devices - Used for electrical power stations, water suppliers, health services, telecommunications, manufacturing and defense needs
123
IDEA
International Data Encryption Algorithm
124
IDF
Intermediate Distribution Frame
125
IdP
Identity Provider - a trusted third-party service for validating user identity in a federated identity system
126
IDS
Intrusion Detection System
127
IEEE
Institute of Electrical and Electronics Engineers
128
IKE
Internet Key Exchange
129
IM
Instant Messaging
130
IMAP4
Internet Message Access Protocol v4
131
IoC
Indicators of Compromise - A specific activity that could indicate that someone is now inside your network - Ex: Increase traffic, could be normal or could indicate data exfiltration - Ex: files that should have constant hash values, are now different (hacker is modifying trusted documents)
132
IoT
Internet of Things
133
IP
Internet Protocol - IPv4 32-bit addressing scheme that provides over 4B possible unique addresses - commonly represented in dotted decimal format - 3 ways of transmitting data through networks: unicast, multicast (1 to few), broadcast (1 to many) - IPv6 128 bit that provides over 340 undecillion possible unique addresses (eventually this will over take IPv4 as IPv4 is currently running out.) - Commonly represented in comma separated hexadecimal - Unicast, multicast and anycast (to replace broadcast)
134
IPS
Intrusion Prevention System
135
IPsec
Internet Protocol Security
136
IR
Incident Response
137
IRC
Internet Relay Chat
138
IRP
Incident Response Plan
139
ISA
Interconnection Security Agreement - Document that regulates security-relevant aspects of an intended connection between an agency and an external system. - Supports / usually proceeded by a MOU / MOA
140
ISFW
Internal Segmentation Firewall
141
ISO
International Organization for Standardization
142
ISP
Internet Service Provider
143
ISSO
Information Systems Security Officer
144
ITCP
IT Contingency Plan
145
IV
Initialization Vector
146
KDC
Key Distribution Center
147
KEK
Key Encryption Key
148
L2TP
Layer 2 Tunneling Protocol
149
LAN
Local Area Network
150
LDAP
Lightweight Directory Access Protocol - A databased used to centralize information about clients and objects on the network - Port 389 Unecrypted - Port 636 encrypted - (Active Directory is Microsoft's version)
151
LEAP
Lightweight Extensible Authentication Protocol - proprietary to Cisco based networks
152
MaaS
Monitoring as a Service
153
MAC
Media Access Control - Address of a network card, the physical address (every adaptor has a different MAC address) - 46 bits long (6 bytes) - 1st section, is the OUI (manufacturer portion) 2nd section is the Serial Number - Switches interpret the MAC addresses - MAC flooding turns switch into a hub - One issue with MAC filtering, easy to circumvent, you just need a packet capturing device to see which MAC addresses are allowed to communicate and then simply spoof that address (MAC filtering attempts security through obscurity but is really not effective at all)
154
MAM
Mobile Application Management
155
MAN
Metropolitan Area Network
156
MBR
Master Boot Record
157
MD5
Message Digest 5
158
MDF
Main Distribution Frame
159
MDM
Mobile Device Management
160
MFA
Multifactor Authentication
161
MFD
Multifunction Device
162
MFP
Multifunction Printer
163
ML
Machine Learning
164
MMS
Multimedia Message Service
165
MOA
Memorandum of Agreement
166
MOU
Memorandum of Understanding
167
MPLS
Multiprotocol Label Switching
168
MSA
Measurement Systems Analysis - provides a way for a company to evaluate and assess the quality of the process used in their measurement systems. - ex six sigma - will assess the measurement itself and then be able to calculate any uncertainty that may be in place during the measurement process - Specifies generic terms to simplify negotiation of future contracts
169
MS-CHAP
Microsoft Challenge-Handshake
170
MSP
Managed Service Provider - Delivers services (like network, application, infrastructure and security) via ongoing and regular support and active administration on customers premise.
171
MSSP
Managed Security Service Provider - Provides outsourced monitoring and management of security devices and systems. - Common services: managed firewall, IDS, VPN, vulnerability scanning and anti viral services. - use high availability security operation centers to provide 24/7 services designed to reduce the number of operational security personnel an enterprise needs
172
MTBF
Mean Time Between Failures
173
MTTF
Mean Time to Failure
174
MTTR
Mean Time to Repair
175
MTU
Maximum Transmission Unit
176
NAC
Network Access Control - Method of controlling who or what gains access to a wired or wireless network - Most cases NAC uses a combination of 802.1x security and some form of posture assessment for a device attempting to log into the network - (a posture assessment considers the state of the requesting device (the device must meet a minimum set of standards before it is allowed access to the network. Ex: type of device, OS, patch level, presence of anti malware and is software up to date)
177
NAS
Network-attached Storage = A storage appliance that is placed on the network. - Specially designed to store data more efficiently than standard data methods - (Note a SAN often includes many NAS. A SAN = storage area network, which is a an actual network of devices that have the sole purpose of storing data efficiently)
178
NAT
Network Address Translation - Process of changing an IP address while it transits across a router - NAT can help hide network IPs
179
NDA
Non-disclosure Agreement
180
NFC
Near-field Communication
181
NFV
Network Function Virtualization
182
NGFW
Next-generation Firewall
183
NG-SWG
Next-generation Secure Web Gateway
184
NIC
Network Interface Card
185
NIDS
Network-based Intrusion Detection System
186
NIPS
Network-based Intrusion Prevention System
187
NIST
National Institute of Standards & Technology - CSF = NIST's voluntary framework outlining best practices for computer security
188
NOC
Network Operations Center
189
NTFS
New Technology File System
190
NTLM
New Technology LAN Manager
191
NTP
Network Time Protocol - Protocol used to synchronize computer clock times in a network. - One of the oldest parts of the TCP/IP protocol suite - ensures the reliability of the Kerberos authentication process
192
OCSP
Online Certificate Status Protocol - allows the browser to check for certificate revocation
193
OID
Object Identifier
194
OS
Operating System
195
OSI
Open Systems Interconnection
196
OSINT
Open-source Intelligence
197
OSPF
Open-source Intelligence
198
OT
Operational Technology - A communications network designed to implement an industrial control system rather than data networking - Industrial Systems prioritize availability and integrity over confidentiality - (ICS, SCADA vulnerabilities)
199
OTA
Over-The-Air
200
OTG
On-The-Go - technology enables establishing direct communication links between two USB devices (ex: mobile phone to usb port)
201
OVAL
Open Vulnerability and Assessment Language
202
OWASP
Open Web Application Security Project
203
P12
PKCS #12
204
P2P
Peer-to-Peer
205
PaaS
Platform as a Service
206
PAC
Proxy Auto Configuration
207
PAM
Privileged Access Management
208
PAM
Pluggable Authentication Modules
209
PAP
Password Authentication Protocol - Used to provide authentication but is not considered secure since it transmits login credentials in the clear
210
PAT
Port Address Translation - Router keeps track of requests from internal hosts by assigning them random high number ports for each request
211
PBKDF2
Password-based Key Derivation Function 2
212
PBX
Private Branch Exchange
213
PCAP
Packet Capture
214
PCI DSS
Payment Card Industry Data Security Standard
215
PDU
Power Distribution Unit
216
PE
Portable Executable
217
PEAP
Protected Extensible Authentication Protocol
218
PED
Protected Extensible Authentication Protocol
219
PEM
Privacy Enhanced Mail
220
PFS
Perfect Forward Secrecy
221
PGP
Pretty Good Privacy
222
PHI
Personal Health Information
223
PII
Personally Identifiable Information
224
PIN
Personal Identification Number
225
PIV
Personal Identity Verification
226
PKCS
Public Key Cryptography Standards
227
PKI
Public Key Infrastructure
228
PoC
Proof of Concept
229
POP
Post Office Protocol
230
POTS
Plain Old Telephone Service
231
PPP
Point-to-Point Protocol
232
PPTP
Point-to-Point Tunneling Protocol
233
PSK
Pre-shared Key
234
PTZ
Pan-Tilt-Zoom
235
PUP
Potentially Unwanted Program
236
QA
Quality Assurance
237
QoS
Quality of Service
238
RA
Registration Authority
239
RAD
Rapid Application Development
240
RADIUS
Remote Authentication Dial-in User Service - Provides centralized administration of dial-up, VPN, and wireless authentication services for 802.1x and the Extensible Authentication Protocol (EAP) - Operates at the application layer - Authentication = Port 1812 or 1645 - Authorization = Port 1813 or 1646 - Standard ports vs proprietary
241
RAID
Redundant Array of Inexpensive Disks
242
RAM
Random Access Memory
243
RAS
Remote Access Server
244
RAT
Remote Access Server
245
RC4
Rivest Cipher version 4 - A legacy symmetric encryption algorithm - Rivest Cipher 4 (Ron Rivest) - Part of the original WEP standard (no longer in use in today's wireless) - Also part of the SSL Standard (But when TLS replaced SSL, RC4 was also replaced) - One problem: Biased output - Uncommon today
246
RCS
Rich Communication Services - a technology designated as a successor to SMS and MMS
247
RFC
Request for Comments
248
RFID
Radio Frequency Identification
249
RIPEMD
RACE Integrity Primitives | Evaluation Message Digest
250
ROI
Return on Investment
251
RPO
Recovery Point Objective - maximum tolerable point in time to which systems and data must be recovered after an outage
252
RSA
Rivest, Shamir, & Adleman
253
RTBH
Remotely Triggered Black Hole
254
RTO
Recovery Time Objective - Maximum tolerable period of time required for restoring business functions after a failure or disaster
255
RTOS
Real-time Operating System
256
RTP
Real-time Transport Protocol
257
S/MIME
Secure/Multipurpose Internet Mail Extensions
258
SaaS
Software as a Service
259
SAE
Simultaneous Authentication of Equals
260
SAML
Security Assertions Markup Language
261
SCADA
Supervisory Control and Data Acquisition - A type of industrial control system that manages large-scale, multiple-site devices and equipment spread over geographical region - Typically run as software on ordinary computers to gather data from and manage plant devices and equipment with embedded PLCs (Programmable Logic Controller - a type of computer designed for deployment in an industrial / outdoor setting that can automate and monitor mechanical systems)
262
SCAP
Security Content Automation Protocol
263
SCEP
Simple Certificate Enrollment Protocol
264
SDK
Software Development Kit
265
SDLC
Software Development Life Cycle
266
SDLM
Software Development Life-cycle Methodology
267
SDN
Software-defined Networking
268
SDP
Service Delivery Platform
269
SDV
Software-defined Visibility
270
SED
Self-Encrypting Drives - Can provide whole disk encryption - The controller can automatically encrypt data that is written to it on the disk drive
271
SEH
Structured Exception Handling - Provides control over what the application should do when faced with a runtime or syntax error
272
SFTP
SSH File Transfer Protocol
273
SHA
Secure Hashing Algorithm
274
SIEM
Security Information and Event Management
275
SIM
Subscriber Identity Module
276
SIP
Session Initiation Protocol - Protocol used for managing real-time sessions that include voice, video, application sharing or IM services
277
SLA
Service-level Agreement - Agreement between a service provider and users defining the nature, availabilty, quality and scope of the service to be provided - Specifies performance requirements for a vendor (and penalties)
278
SLE
Single Loss Expectancy - Describes how much money we will lose if a single event occurs - ARO X SLE = ALE
279
SMB
Server Message Block
280
S/MIME
Secure/Multipurpose Internet Mail Extensions
281
SMS
Short Message Service
282
SMTP
Simple Mail Transfer Protocol
283
SMTPS
Simple Mail Transfer Protocol Secure
284
SNMP
Simple Network Management Protocol
285
SOAP
Simple Object Access Protocol
286
SOAR
Security Orchestration, Automation, Response
287
SoC
System on Chip - A processor that integrates the platform functionality of multiple logical controllers onto a single chip - They are power efficient and used with embedded systems (IoT)
288
SOC
Security Operations Center
289
SPF
Sender Policy Framework
290
SPIM
Spam over Instant Messaging
291
SQL
Structured Query Language
292
SQLi
SQL Injection
293
SRTP
Secure Real-time Transport Protocol
294
SSD
Solid State Drive
295
SSH
Secure Shell
296
SSID
Service Set Identifier
297
SSL
Secure Sockets Layer
298
SSO
Single Sign-on - A default user profile for each user is created and linked with all of the resources needed - Compromised SSO credentials are a big security breach
299
STIX
Structured Threat Information eXpression - Standardized format for threats - Includes motivations, abilities, capabilities and response information - Part of AIS
300
STP
Shielded Twisted Pair
301
SWG
Secure Web Gateway
302
TACACS+
Terminal Access Controller Access Control System - Cisco's proprietary version of RADIUS - Port 49 (TCP) - Encrypts the entire payload of the access-request packet - Primarily used for device administration - Separates authentication and authorization - part of 802.1x (along with RADIUS)
303
TAXII
Trusted Automated eXchange of Intelligence Information - The trusted transportation to securely exchange STIX information
304
TCP/IP
Transmission Control Protocol/Internet Protocol
305
TGT
Ticket Granting Ticket
306
TKIP
Temporal Key Integrity Protocol
307
TLS
Transport Layer Security - Cryptographic protocol to encrypt online communications. - Uses certificates and asymmetrical cryptography to authenticate hosts and exchange security keys - Better option than SSL which functions similarly
308
TOTP
Time-based One Time Password - A password is computed from a shared secret and current time
309
TPM
Trusted Platform Module - A specification for hardware based storage of digital certificates, keys, hashed passwords, and other user and platform identification information - A TPM can be managed in Windows via the tpm.msc console or group policy
310
TSIG
Transaction Signature
311
TTP
Tactics, Techniques, and Procedures
312
UAT
User Acceptance Testing
313
UDP
User Datagram Protocol
314
UEBA
User and Entity Behavior Analytics
315
UEFI
Unified Extensible Firmware Interface - A type of system firmware providing support for a 64-bit CPU operation at boot, full GUI and mouse operation at boot and better boot security
316
UEM
Unified Endpoint Management
317
UPS
Uninterruptible Power Supply
318
URI
Uniform Resource Identifier
319
URL
Universal Resource Locator
320
USB
Universal Serial Bus
321
USB OTG
USB On-The-Go
322
UTM
Unified Threat Management
323
UTP
Unshielded Twisted Pair
324
VBA
Visual Basic for Applications
325
VDE
Virtual Desktop Environment
326
VDI
Virtual Desktop Infrastructure
327
VLAN
Virtual Local Area Network
328
VLSM
Variable-length Subnet Masking
329
VM
Virtual Machine
330
VoIP
Voice over IP
331
VPC
Virtual Private Cloud
332
VPN
Virtual Private Network - Allows end users to create a tunnel over an untrusted network and connect remotely and securely back into the enterprise network - Client to Site VPN or Remote Access VPN - VPN Concentrator = Specialized hardware device that allows for hundreds of simultaneous VPN connections for remote workers
333
VTC
Video Teleconferencing
334
WAF
Web Application Firewall
335
WAP
Wireless Access Point - It's a bridge - Switch configuration that's taking traffic from the wireless network and switching it on to the Ethernet network - Very similar to a switch as a layer 2 device on a network - Some let you control the power to the WAP (which controls its range) - Different than the wireless router at home
336
WEP
Wired Equivalent Privacy
337
WIDS
Wireless Intrusion Detection System
338
WIPS
Wireless Intrusion Prevention System
339
WORM
Write Once Read Many
340
WPA
WiFi Protected Access
341
WPS
WiFi Protected Setup
342
XaaS
Anything as a Service
343
XML
Extensible Markup Language - Markup language similar to HTML, but without predefined tags to use - Instead you define your own tags for your needs - powerful way to store data in a format that can be stored, searched, and shared - Stores and transfers data (Whereas HTML displays data and describes the structure of a webpage), standard language which can define other computer languages
344
XOR
Exclusive OR - Compares two input bits and generates one output bit - if bits are the same, result = 0, if bits are different result = 1 - A way to make data less readable, it's a cipher
345
XSRF
Cross-site Request Forgery - aka one click attack or session-riding - Takes advantage of the trust that a web browswer and web site have with each other
346
XSS
Cross-site Scripting - Occurs when an attacker embeds malicious scripting commands on a trusted website - Stored / Persistent = attempts to get data provided by the attacker to be saved on the webserver (so that anyone who visits will be infected) - Reflected = Attempts to have a non-persistent effective, it's activated by a victim clicking on a link - DOM - based = AAtemptse to xeloit the vvictim'sweb browswer