acronyms A-DPO Flashcards

1
Q

3DES

A

Triple DES

replacement for DES. It essentially applies DES three times with three different keys, thus the name 3DES.

In cryptography, Triple DES (3DES or TDES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

Device authentication methods: digital certificate, IP addresses, and MAC addresses. People authentication methods: UN/PW, Biometrics, MFA. TACACS+ and RADIUS also provide AAA functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute-based Access Control

Policies that are driven by the attributes of the users. Complex to manage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List
Allow or deny lists (time-based, dynamic)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES

A

Advanced Encryption Standards
For symmetric keys. It can have one of three key sizes: 128, 192, or 256 bits. Current version is 256 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AFF

A

Advanced Forensics Format

The Advanced Forensic Format (AFF) is on-disk format for storing computer forensic information. Critical features of AFF include: AFF allows you to store both computer forensic data and associated metadata in one or more files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AH

A

Authentication Header

hashing + shared secret key = IP payload is secured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AIS

A

Automated Indicator Sharing

Automated Indicator Sharing (AIS) is a service the Cybersecurity and Infrastructure Security Agency (CISA) provides to enable real-time exchange of machine-readable cyber threat indicators and defensive measures between public and private-sector organizations. AIS helps to protect the participants of the service and ultimately reduce the prevalence of cyberattacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ALE

A

Annualized Loss Expectancy

SLE * ARO, amount of damage expected each year

Single loss expectancy*Average rate of occurrence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Amplified Dos

A

Amplified DoS Attacks

taking advantage of small query —> large result (ex: DNS query)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

API

A

Application Programmable Interface

Relies on rate limiting, inputting filtering, appropriate monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

APT

A

Advanced Persistent Threat

Usually, nations state attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARO

A

Annualized Rate of Occurance

ARO 2.0 means 2X per year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ARP

A

Address Resolution Protocol

Links MAC addresses with IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARPANET

A

Advanced Research Projects Agency Network

Started in 1966, the first wide-area packet-switched network with distributed control and one of the first computer networks to implement the TCP/IP protocol suite. Both technologies became the technical foundation of the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ASLR

A

Address Space Layout Randomization

memory protection process for OSes that guards against buffer-overflow attacks by randomizing location for executables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ASV

A

Approved Scanning Vendor

An Approved Scanning Vendor, often known simply as an ASV, is an organization that uses a set of data security services and tools to determine if a company is compliant with PCI DSS external scanning requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ATT&CK

A

Adverbial Tactics, Techniques, and Common Knowledge

Developed MITRE, Modern way of looking at cyberattacks

MITRE is a non-profit organization that provides engineering and technical guidance to the federal government, known for developing the MITRE ATT&CK framework, a knowledge base of adversarial tactics, techniques, and common knowledge (TTPs) used in cyberattacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AV

A

Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BASH

A

Bourne-Again Shell

a Unix shell and command language written by Brian Fox for the GNU Project as a free software replacement for the Bourne shell.[15][16] The shell’s name is an acronym for Bourne-Again SHell, a pun on the name of the Bourne shell that it replaces[17] and the notion of being “born again”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BC

A

Business Continuity.

making sure business can continue despite the incident, important for larger incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BEC

A

Business Email Compromise

Compromised accounts, spoofed email, typo squatting domain, malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BGP

A

Border Gateway Protocol

Enables the internet exchange routing information between autonomous systems (insecure). Susceptible to BGP hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BIA
Business Impact Analysis
26
BIAS
Bluetooth Impersonation AttackS Exploiting mutual authentication
27
BIOS
Basic Input/Output System
28
BPA
Business partner agreements when two organizations agree to do business together, could potentially specify responsibilities and division of profits
29
BPDU
Bridge Protocol Data Unit Protects STP from sending messages it should not, prevents looping
30
BYOD
Bring your own device
31
C
Cipher Text In cryptography, ciphertext refers to the scrambled or encrypted form of plaintext (the original, readable message) that is produced by an encryption process, and can only be understood with the correct decryption key
32
C2
Command & Control Servers C2 servers facilitate data exfiltration by instructing the compromised device to send specific data to the server. This data can include stolen credentials, sensitive documents, or other valuable information.
33
CA
Certificate Authority Issues digital certificates to provide assurance people are who they claim to be
34
CAM
Content-addressable memory AKA associative memory or associative storage, computer memory used in very high-speed searching applications
35
CAPTCHA
Completely Automated Turing Test to Tell Computers and Humans Apart a type of challenge–response test used in computing to determine whether the user is human in order to deter bot attacks and spam.
36
CAR
Corrective Action Report an official document issued when an element of a plan hasn't been implemented or executed properly
37
CASB
Cloud Access Security Brokers
38
CBC
Cipher Block Chaining Cipher block chaining (CBC) is a mode of operation for a block cipher -- one in which a sequence of bits are encrypted as a single unit, or block, with a cipher key applied to the entire block. Cipher block chaining uses what is known as an initialization vector (IV) of a certain length. By using this along with a single encryption key, organizations and individuals can safely encrypt and decrypt large amounts of plaintext.
39
CCMP
Counter Mode/CBC-MAC Protocol uses AES to provide confidentiality. Provides authentication for user and access control capabilities
40
CCTV
Closed-circuit Television
41
CERT
Computer Emergency Response Team
42
CFB
Cipher Feedback The cipher feedback (CFB) mode, in its simplest form uses the entire output of the block cipher. In this variation, it is very similar to CBC, turning a block cipher into a self-synchronizing stream cipher
43
CHAP
Challenge Handshake Authentication Protocol
44
CIA
Confidentiality, Integrity, Availability
45
CIO
Chief Information Officer
46
CIRT
Computer Incident Response Team
47
CMS
Content Management System
48
COOP
Continuity of Operation Planning
49
COPE
Corporate Owned, Personally Enabled
50
CP
Contingency Planning
51
CRC
Cyclical Redundancy Check Error-detecting code used in digital networks to detect accidental changes to digital data
52
CRL
Certificate Revocation List
53
CSO
Chief Security Officer
54
CSP
Cloud Service Provider
55
CSR
Certificate Signing Request Providing CA with your public key to initiate the CSR
56
CSRF
Cross-site Request Forgery Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website or web application where unauthorized commands are submitted from a user that the web application trusts
57
CSU
Channel Service Unit
58
CTM
Counter Mode converts a block cipher into a stream cipher. It combines an IV with a counter and uses the result to encrypt each plaintext block. Each block uses the same IV, but CTM combines it with the counter value, resulting in a different encryption key for each block. Multiprocessor systems can encrypt or decrypt multiple blocks at the same time, allowing the algorithm to be quicker on multiprocessor or multicore systems. CTM is widely used and respected as a secure mode of operation.
59
CTO
Chief Technology Officer
60
CVE
Common Vulnerability Enumeration
61
CVSS
Common Vulnerability Scoring System
62
CYOD
Choose Your Own Device
63
DAC
Discretionary Access Control More common, access control scheme to control home PCs (ex: Linux file permissions)
64
DBA
Database Administrator
65
DDoS
Distributed Denial of Service
66
DEP
Data Execution Prevention
67
DES
Digital Encryption Standard
68
DHCP
Dynamic Host Configuration Protocol
69
DHE
Diffie-Hellman Ephemeral When a key exchange uses Ephemeral Diffie-Hellman a temporary DH key is generated for every connection and thus the same key is never used twice. This enables Forward Secrecy (FS), which means that if the long-term private key of the server gets leaked, past communication is still secure.
70
DKIM
DomainKeys Identified Mail Signature header to verify email sender and prevent email spoofing
71
DLL
Dynamic Link Library
72
DLP
Data Loss Prevention
73
DMARC
Domain Message Authentication Reporting and Conformance determine whether you should refuse or accept email message
74
DNAT
Destination Network Address Translation is a technique that translates destination IP address generally when connecting from public IP address to private IP address. It is generally used to redirect packets destined for specific IP address or specific port on IP address, on one host simply to a different address mostly on different host.
75
DNS
Domain Name System
76
DoS
Denial of Service
77
DPO
Data Privacy Officer Official role required by GDPR The General Data Protection Regulation (GDPR)
78