Acronyms Flashcards
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
Overall Explanation:
The Elliptic Curve Diffie-Hellman Ephemeral, or ECDHE, option is the only method for sharing encryption keys over a public network. Cipher Block Chaining is a mode of operation for a block cipher. Triple DES (3DES) is a symmetric encryption algorithm, and RSA is an asymmetric encryption algorithm. When seeing DH as part of this one, try to remember the Diffie-Hellman key exchange.
OCSP
Online Certificate Status Protocol
Overall Explanation:
The online certificate status protocol allows for interactively checking a certificate’s status. Another method used to validate a certificate’s status is a certificate revocation list, or CRL, which downloads the list of revoked certificates from the certificate authority. While she would be deploying a certificate authority, the question is really which method she will use for certificate status checking.
AAA
Authentication, Authorization, Accounting
and….
Accounting, Aggregation, Auditing
SASE
Secure Access Service Edge
Is a cloud-delivered framework that combines networking and security functions into a single platform, streamlining access and enhancing security for users and applications regardless of location.
A form of cloud architecture that combines a number of services as a single service. By providing services like Software-defined wide are network (SD-WAN), firewalls as a service, secure web gateways, and zero-trust network access, SASE will reduce cost and simplify management while improving security. The integrated nature of the architecture means the technologies used will work together efficiently. It may include a packet analyzer, but that isn’t the focus of the architecture.
KRI
Key Risk Indicators
Overall explanation:
OBJ: 5.2 - KRIs are metrics that provide early warnings of increasing risk exposures, enabling organizations’ leadership to manage these risks proactively.
OSI
Open Systems Interconnection
Is a conceptual framework that divides network communication functions into seven layers to help understand how applications communicate over a network.
“Please Do Not Throw Sausage Pizza Away”
The 7 Layers of the OSI Model:
Physical Layer 1:
This is the lowest layer, responsible for transmitting raw data bits over a physical medium (e.g., cables, wireless signals).
Function: Handles the physical transmission of data, including encoding, signal levels, and physical connections.
Protocols: IEEE 802.3, IEEE 802.11, RS-232, V.35, USB, DSL
Data Link Layer 2:
Provides reliable data transfer between two directly connected network nodes, including error detection and correction.
Function: Frames data for transmission and manages access to the physical medium.
Protocols: Wi-Fi, PPP, HDCL, Ethernet (MAC)
Network Layer 3:
Responsible for routing data packets across networks, using logical addressing (e.g., IP addresses).
Function: Determines the best path for data packets to travel from source to destination.
Protocols: IP, IPv6
Transport Layer 4:
Provides reliable and efficient data transfer between applications, including error control and flow control.
Function: Ensures data arrives at the destination in the correct order and without errors.
Protocols: TCP, UDP, SSH, SCTP, DCCP
Session Layer 5:
Establishes, manages, and terminates sessions between applications.
Function: Facilitates communication between applications, including authentication and authorization.
Protocols: NetBIOS, RPC, PPTP, SMB, AFP
Presentation Layer 6:
Handles data formatting, encryption, and compression to ensure data is presented in a usable format.
Function: Ensures data is presented in a way that applications can understand.
Protocols: ASCII, EBCDIC, SSL/TLS
Application Layer 7:
Provides network services to applications, allowing them to access network resources.
Function: The interface for applications to interact with the network, including protocols like HTTP and FTP.
Protocols: HTTP, SMTP, FTP, DNS, POP3, IMAP, Telnet, SQL
NAC
Network Access Control
A security technology that provides visibility and control over devices accessing a corporate network, ensuring only authorized and compliant devices are allowed access.
PMK
Pairwise Master Key
A cryptographic key shared between a wireless client and an access point (AP) for secure communication, is derived from the network’s passphrase and used to generate session-specific keys.
ECC
Elliptic Curve Cryptography
ECC offers comparable security to algorithms like RSA and DSA with shorter key lengths, resulting in faster and more efficient cryptographic operations, especially in resource-constrained environments.
Elliptic Curve Cryptography (ECC)
● Efficient, secure and uses an algebraic structure of elliptical curves
● Commonly used in mobile devices and low-power computing
● Six times more efficient than RSA for equivalent security
● Variants include
○ ECDH (Elliptic Curve Diffie-Hellman)
○ ECDHE (Elliptic Curve Diffie-Hellman Ephemeral)
○ ECDSA (Elliptic Curve Digital Signature Algorithm)
SDLC
Software Development Life Cycle
Overall explanation:
OBJ: 5.1 - An SDLC ensures that security is a focal point in all stages of software development, from design to maintenance. While certain SDLC models, like Agile, prioritize quick deliveries, they don’t overlook security. SDLC integrates security throughout its phases, not just during testing. Even with a robust SDLC, software may still require updates and patches post-deployment.
Domain:
Security Program Management and Oversight
ALE
Annualized Loss Expectancy
● Expected annual loss from a risk
● Calculated as SLE x ARO
SLE
Single Loss Expectancy
● Monetary value expected to be lost in a single event
● Calculated as Asset Value x Exposure Factor (EF)
ARO
Annualized Rate of Occurrence
● Estimated frequency of threat occurrence within a year
● Provides a yearly probability
● Calculate as ALE / SLE ($10,000 a year / $250 per device) = 40 devices a year.
DAC
Discretionary Access Control
Is an authorization model where the owner of the resource decides who is allowed to access it.
MAC
Mandatory Access Control
Is an authorization model where access to resources is determined by a set of rules defined by a central authority.
RBAC
Role-Based Access Control
Is an authorization model that assigns permissions to roles, rather than individual users.
ABAC
Attribute Based Access Control
Determines access through a combination of contexts and system wide attributes.
WPS
Wi-Fi Protected Setup
It uses a very weak PIN as part of the connection configuration.
APT
Advanced Persistent Threat
In an advanced persistent threat, the actor is able to gain access to a system and then continues to maintain that access or increase their level of access to more resources with a goal of remaining undetected for as long as possible.
802.1x
Authentication
■ Provides port-based authentication for wired and wireless
networks.
■ Requires three roles
● Supplicant
● Authenticator
● Authentication server
■ Utilizes RADIUS or TACACS+ for actual authentication
■ Prevents rogue device access
DRP
Disaster Recovery Plan
● Focuses on plans and processes for disaster response
● Subset of the BC Plan
● Focuses on faster recovery after disasters
● Addresses specific events like hurricanes, fires, or flood
WAF
Web Application Firewall
● Focuses on inspecting HTTP traffic
● Prevents common web application attacks like cross-site scripting and SQL injections
● Can be placed
○ In-line (live attack prevention)
■ Device sits between the network firewall and the web servers
○ Out of band (detection)
■ Device receives a mirrored copy of web server traffic
HIPS
Host-based Intrusion Protection System
HIPS protects your system from malware and unwanted activity attempting to negatively affect your computer. HIPS utilizes advanced behavioral analysis coupled with the detection capabilities of network filtering to monitor running processes, files and registry keys.
BPDU Guard
Bridge Protocol Data Unit
A type of network packet used by the Spanning Tree Protocol (STP) to exchange information between switches, ensuring a loop-free network topology.
BPDU Guard:
BPDU Guard is a security feature that protects ports from receiving BPDUs, preventing rogue devices from potentially disrupting the spanning tree topology.
Overall explanation:
BPDU guard is a configuration setting on a switch that tells it that only end user devices should be connected to a particular port, so it will ignore any messages that switches use to communicate with each other, such as those used to determine the spanning tree configuration.
Domain:
3.2 - Given a scenario, apply security principles to secure