Acronyms Flashcards
ACL
Access control list- rule that either permits or denies actions.
ARP
Address resolution protocol (ARP)-A protocol that provides translations between MAC addresses and IP addresses on a local network. 3
AI
The use of artificial intelligence techniques by attackers for malicious purposes.
TTP
Adversary tactics, techniques, and procedures (TTPs)-The study of the methods used by cyber security adversaries when engaging in attacks. 3
AUP
Acceptable Use Policy–A document that provides network and system users with a clear direction on permissible uses of information resources.
APT
Advance persistent Treats -Cybersecurity adversary characterized by a sophisticated series of related attacks taking placed over an extended period of time.3
ALE
Annualized loss expectancy (ALE)–The possible yearly cost of all instances of a specific realized threat against a specific asset. THE ALE is calculated using the formula ALE=Single loss expectancy (SLE) *Annualized rate of occurrence (ARO) 4
ARO
Annualized Rate of Occurrence ARO- The expected frequency that a specific threat or risk will occur within a single year.
API
Application programming interfaces (API)- API’s allow application developers to interact directly with a web service through function calls. 4
AV
Asset Value (AV)– A dollar value assigned to an asset based on actual cost and nonmonetary expenses. 4
AC
Attack Complexity Metric (AC)- A metric that describes the difficulty of exploiting a vulnerability. 5
AV
Attack Vector Metric (AV)- A metric that describes how an attacker would exploit a vulnerability.5
ABAC
Attribute based access control (ABAC)- An advance implementation of a rule based access control model that uses polices that include multiple attributes for rules. 5
A
Availability Metric (A) - A metric that describes the type of distribution that might occur if an attacker successfully exploits a vulnerability. 5
BEC
Business Email Compromise (BEC)-Relies on using apparently legitimate email addresses to conduct scams and other attacks. 8
BIA
Business Impact Analysis (BIA)- a formal process designed to identify the mission-essential functions within an organization and facilitate the identification of the critical systems that support those functions. 8
BPA
Business Partners agreement (BPA) Exists when 2 organizations agree to do business with each other in a partnership. 8
CTF
Capture The Flag (CTF) –An exercise that pits technologist against one another in an attempt to attack a system and achieve a specific goal, such as stealing a sensitive file. 8
CCMP
CCMP- (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) –Encryption technology used in the WPA2 protocol. It implements AES (Advance Encryption Standard) with a 128 bit key as a stream cipher.
AES
AES (Advance Encryption Standard)
CIS
Center For Internet Security (CIS) An industry organization that publishes hundreds of benchmarks for commonly used platforms. 8
CA
Certificate Authorities (CA) CA are the glue that binds the public key infrastructure together. These neural organizations offer notarization services for digital certificates. 9
CRL
Certificate Revocation List (CRL) used to ensure that the certificate was not revoked. 9
CSR
Certificate Signing Request (CSR)– Provides your public key to the certificate authority to create an X.509 digital certificate containing your identifying information and a copy of your public key. 9