Acronyms Flashcards
3DES
Triple Data Encryption Standard
- Variant of DES that uses 3 different keys to perform the encryption process. (3 separate passes through the data)
- Symmetrical
- No longer use 3DES either
- (AES is the workhorse encryption standard today)
AAA
Authentication, Authorization, Accounting
- Proving who you are
- Deciding what you have access to
- ## Keeping track of who authenticated onto network
ABAC
Attribute Based Access Control
- An access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together.
- The policies can use any type of attributes (user attributes, resource attributes, environment attribute etc.).
- Ex: Permit managers to **, provided that **, if ** or ** unless **
ACL
Access Control List
- set of permissions that are then assigned to an object
- Used in firewalls, switches, routers, and OS
- All of them to some degree allow/restrict access to certain parts of the network or to an OS
- They can be very specific (to ports) and / or very complex
AD
Active Directory
- Directory servers that runs on Microsoft Windows Server
- Main function is to enable administrators to manage permissions and control access to network resources
AES
Advanced Encryption Standard
- Most popular SYMMETRIC encryption in use today
- Standard of the US Federal Government
- Added to FIPS 197 in 2001 (It took five years to standardize and eventually replace DES)
- 128 cipher block encryption (in a single pass)
- Supports 128, 192, and 256 bit key sizes
- Ex: A wireless network where all information is encrypted with WPA2 uses AES
AES256
Advanced Encryption Standard 256bit
- largest key size for AES (symmetric)
AH
Authentication Header
- Can provide data integrity (Ex: in IPSec)
AI
Artificial Intelligence
AIS
Automated Indicator Sharing
- A way to automate the process of gathering and disseminating threat information that’s secure
- A way to process and move the information between organizations over the internet
ALE
Annualized Loss Expectancy
- ARO X SLE = ALE
- The total number in dollars if an event occurs based on its frequency
AP
Access Point
- Most APs allow you to configure MAC- level filtering to the AP itself
API
Application Programming Interface
APT
Advanced Persistent Threat
ARO
Annualized Rate of Occurrence
- The number of times / year something happens
- ARO X SLE = ALE
- can be based on historical data, how often a threat would be successful exploiting a vulnerability
ARP
Address Resolution Protocol
- A way to translate IP address to MAC address.
- Purpose is to find out the MAC address of a device on the LAN
- used when IPV4 is used over ethernet
- Helps resolve an address of a specific computer by sending a piece of information from the local computer to a remote computer where the server process is executed. This piece of information allows the server to identify the network system and provide the address
- See also DHCP and DNS
ASLR
Address Space Layout Randomization
- Method used by programmers to randomly arrange the different address spaces used by a program or process to prevent buffer overflow exploits
ASP
Active Server Pages
ATT&CK
Adversarial Tactics, Techniques and Common Knowledge
- MITRE framework
- Identify broad categories of attacks, find exact intrusions and how they are occurring and how attackers are moving around after the attack and identify security techniques that can help you block future attacks
AUP
Acceptable Use Policy
- Many organizations have them
- Detailed documentation that covers how all of the different technologies in your environment should be used
- Covers internet, telephones, computers, mobile devices
- A way for employer to set expectations
BCP
Business Continuity Plan
BGP
Border Gateway Protocol
- allows different autonomous systems on the internet to share routing information
- more flexible than OSPF and can be used on larger networks
- emphasis on determining the best path (OSPF, the fastest)
BIA
Business Impact Analysis
AV
Antivirus