acronyms A-DPO Flashcards
3DES
Triple DES
replacement for DES. It essentially applies DES three times with three different keys, thus the name 3DES.
In cryptography, Triple DES (3DES or TDES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block.
AAA
Authentication, Authorization, and Accounting
Device authentication methods: digital certificate, IP addresses, and MAC addresses. People authentication methods: UN/PW, Biometrics, MFA. TACACS+ and RADIUS also provide AAA functionality
ABAC
Attribute-based Access Control
Policies that are driven by the attributes of the users. Complex to manage
ACL
Access Control List
Allow or deny lists (time-based, dynamic)
AES
Advanced Encryption Standards
For symmetric keys. It can have one of three key sizes: 128, 192, or 256 bits. Current version is 256 bit
AFF
Advanced Forensics Format
The Advanced Forensic Format (AFF) is on-disk format for storing computer forensic information. Critical features of AFF include: AFF allows you to store both computer forensic data and associated metadata in one or more files.
AH
Authentication Header
hashing + shared secret key = IP payload is secured
AIS
Automated Indicator Sharing
Automated Indicator Sharing (AIS) is a service the Cybersecurity and Infrastructure Security Agency (CISA) provides to enable real-time exchange of machine-readable cyber threat indicators and defensive measures between public and private-sector organizations. AIS helps to protect the participants of the service and ultimately reduce the prevalence of cyberattacks.
ALE
Annualized Loss Expectancy
SLE * ARO, amount of damage expected each year
Single loss expectancy*Average rate of occurrence.
Amplified Dos
Amplified DoS Attacks
taking advantage of small query —> large result (ex: DNS query)
API
Application Programmable Interface
Relies on rate limiting, inputting filtering, appropriate monitoring
APT
Advanced Persistent Threat
Usually, nations state attackers
ARO
Annualized Rate of Occurance
ARO 2.0 means 2X per year
ARP
Address Resolution Protocol
Links MAC addresses with IP addresses
ARPANET
Advanced Research Projects Agency Network
Started in 1966, the first wide-area packet-switched network with distributed control and one of the first computer networks to implement the TCP/IP protocol suite. Both technologies became the technical foundation of the Internet.
ASLR
Address Space Layout Randomization
memory protection process for OSes that guards against buffer-overflow attacks by randomizing location for executables
ASV
Approved Scanning Vendor
An Approved Scanning Vendor, often known simply as an ASV, is an organization that uses a set of data security services and tools to determine if a company is compliant with PCI DSS external scanning requirements.
ATT&CK
Adverbial Tactics, Techniques, and Common Knowledge
Developed MITRE, Modern way of looking at cyberattacks
MITRE is a non-profit organization that provides engineering and technical guidance to the federal government, known for developing the MITRE ATT&CK framework, a knowledge base of adversarial tactics, techniques, and common knowledge (TTPs) used in cyberattacks.
AUP
Acceptable Use Policy
AV
Asset Value
BASH
Bourne-Again Shell
a Unix shell and command language written by Brian Fox for the GNU Project as a free software replacement for the Bourne shell.[15][16] The shell’s name is an acronym for Bourne-Again SHell, a pun on the name of the Bourne shell that it replaces[17] and the notion of being “born again”.
BC
Business Continuity.
making sure business can continue despite the incident, important for larger incidents
BEC
Business Email Compromise
Compromised accounts, spoofed email, typo squatting domain, malware
BGP
Border Gateway Protocol
Enables the internet exchange routing information between autonomous systems (insecure). Susceptible to BGP hijacking