Acronyms "A" Flashcards
1
Q
3DES (Triple Data Encryption Standard)
A
- Deprecated and considered insecure. Replaced by AES
- Symmetric
- Applies the DES cipher algorithm 3 times to each data block
2
Q
- AAA (Authentication, Authorization, and Accounting)
A
- Often used to describe RADIUS, or some other form of networking protocol that provides Authentication, Authorization, and Accounting
3
Q
- ABAC (Attribute-based Access Control)
A
- Rights granted through policies that combine attributes together
4
Q
Active Directory
A
- Database and identity service used to provide identity management
5
Q
ACL (Access Control List)
A
- Set of rules that allow/deny any traffic flow through routers
- Looks at the packet to determine whether it should be allowed or denied
- Works at layer 3 toprovide security by filtering & controlling the flow of trafficfrom one router to another
6
Q
- AES (Advanced Encryption Standard)
A
- Industry-standard for data security
- 128-bit, 192-bit, or 256-bit (strongest) implementations
7
Q
- AH (Authentication Header)
A
- Used to authenticate origins of datagrams — packets of data transmitted
8
Q
- AI (Artificial Intelligence)
A
- For the exam, be aware of what’s called data poisoning (or tainted training) & adversarial AI
9
Q
AIS (Automated Indicator Sharing)
A
- DHS and CISA free program
- Enables organizations to share and receive machine-readable cyber threat indicators (CTIs) and defensive measures (DMs) in real-time
- Useful to monitor and defend networks against known threats
10
Q
ALE (Annualized Loss Expectancy)
A
- ie: can expect x number of devices to fail per year
11
Q
- AP (Access Point)
A
- Networking hardware device that provides Wi-Fi access, typically then connected via wire to the router, or directly integrated in the router itself
12
Q
- API (Application Programming Interface)
A
- APIs are used to allow applications to talk to one another
13
Q
- APT (Advanced Persistent Threat)
A
- Stealthy threat actor (usually nation-state or state-sponsored group) that gains unauthorized access to a system and remains undetected for a period of time
14
Q
- ARO (Annualized Rate of Occurrence)
A
- The calculated probability that a risk will occur in a given year
15
Q
- ARP (Address Resolution Protocol)
A
- Helps connect IP devices to MAC addresses
16
Q
- ASLR (Address Space Layout Randomization)
A
- Prevent exploitation of memory corruption vulnerabilities
17
Q
- ASP (Active Server Page)
A
- Microsoft server-side scripting language and engine to create dynamic web pages
- Superseded by ASP.NET in 2002
18
Q
- ATT&CK Adversarial Tactics, Techniques, and Common Knowledge
A
- Knowledge base framework of adversary tactics and techniques based on real-world observations
- Helpful to build effective threat models and defenses against real threats
19
Q
- AUP (Acceptable Use Policy)
A
- Terms that users must accept in order to use a network, system, website, etc…
20
Q
- AV (Antivirus)
A
Antivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer.