Acronyms Flashcards
AAA
Authentication, Authorization, and Accounting: A framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
ACL
Access Control List: A table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file.
AES
Advanced Encryption Standard: A symmetric encryption algorithm widely used across the glove to secure data.
AES-256
Advanced Encryption Standards 256-bit: A version of AES using 256-bit key size for encryption, providing a higher level of security.
AH
Authentication Header: A part of the IPsec protocol suite that provides authentication and integrity to the data.
AI
Artificial Intelligence: The simulation of human intelligence processes by machines, especially computer systems.
AIS
Automated Indicator Sharing: A system that allows the exchange of cyber threat indicators between the public and private sectors.
ALE
Annualized Loss Expectancy: A risk management concept to estimate the monetary loss that can be expected for an asset due to a risk over a year.
AP
Access Point: A networking hardware device that allows other Wi-Fi devices to connect to a wired network.
API
Application Programming Interface: A set of functions and procedures allowing the creation of applications that access the features or data on an operating system, application, or other services.
APT
Advanced Persistent Threat: A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.
ARO
Annualized Rate of Occurrence: The expected frequency with which a specific event is likely to occur annually.
ARP
Address Resolution Protocol: A communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address.
ASLR
Address Space Layout Randomization: A computer security technique involved in preventing exploitation of memory corruption vulnerabilities.
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge: A knowledge base maintained by MITRE for listing and explaining cyber adversary behavior.
AUP
Acceptable Use Policy: A policy that sets out the rules and guidelines for the proper use of an organization’s information technology.
AV
Antivirus: Software designed to detect and destroy computer viruses.
BASH
Bourne Again Shell: A Unix shell and command language.