Acronyms F-L Flashcards
FAR
False Acceptance Rate
Metric used to measure the likelihood of granting access to an unauthorized user.
FDE
Full Disk Encryption
Security technique that encrypts all data stored on a disk or storage device.
FISMA
Develop, document, and implement an agency-wide program for information security
Covers information and systems that support the operations and assets of the agency.
FRR
False Rejection Rate
Metric used to measure the likelihood of denying access to an authorized user.
FTP
File Transfer Protocol
A protocol used to transfer files between computers over a network.
GDPR
Data protection and privacy for individuals within the EU and EEA
Regulation that came into effect on May 25, 2018.
GPS
Global Positioning System
A system of satellites used to determine the location of a device.
GRE
Generic Routing Encapsulation
A protocol used to encapsulate one type of packet within another.
GBAC
Group Based Access Control
Gives access to a group of individuals to the resources they need.
HMAC
Hash-based Message Authentication Code
A cryptographic authentication technique that uses a hash function and a secret key.
HIDS
Host Intrusion Detection System
Represents an application monitoring a computer or network for suspicious activities.
HIPAA
Health Insurance Portability And Accountability Act
Federal law enacted in 1996 to protect the privacy and security of patients’ personal health information.
HOTP
HMAC-based One-Time Password
Algorithm used to generate one-time passwords for authentication.
HSM
Hardware Security Module
Specialized hardware device designed to securely store and manage digital keys.
HSTS
HTTP Strict Transport Security
Web security policy mechanism used to protect against protocol downgrade attacks.
HTML
Hypertext Markup Language
The standard markup language for creating web pages.
HTTP
Hypertext Transfer Protocol
Foundation of the World Wide Web used to load webpages.
HTTPS
Secure version of HTTP
Uses encryption to protect data in transit.
IaaS
Infrastructure as a Service
A cloud computing model providing infrastructure resources by a third-party provider.
IAM
Identity and Access Management
Cybersecurity practice that restricts access to organizational resources.
ICMP
Internet Control Message Protocol
Network layer protocol used to diagnose network communication issues.
IDS
Intrusion Detection System
Monitoring system that detects suspicious activities and generates alerts.
IPS
Intrusion Prevention System
Network security technology that actively prevents identified threats.
IEEE
Institute of Electrical and Electronics Engineers
The world’s largest technical professional society.
IKE
Internet Key Exchange
Standard protocol used to set up a secure communication channel via VPN.
IMAP
Internet Message Access Protocol
Protocol used by email clients to retrieve email messages from a mail server.
IoT
Internet Of Things Devices
Physical devices connected to the internet that can exchange data.
IP
Internet Protocol
Protocol for routing and addressing packets of data across networks.
IPv4
Internet Protocol version 4
A 32-bit address usually represented in dotted decimal notation.
What does IPv6 provide?
Larger address space for the internet
Uses 128-bit addresses, allowing for an almost unlimited number of unique addresses.
ISA
Interconnection Security Agreement
Document regulating security aspects of a connection between an agency and an external system.
ISO
International Organization for Standardization
An international standard-setting organization.
ISP
Internet Service Provider
A company that provides Internet access to customers.
JSON
JavaScript Object Notation
A lightweight data interchange format.
LDAP
Lightweight Directory Access Protocol
Protocol for locating data about organizations, individuals, and resources in a network.
LEAP
Lightweight Extensible Authentication Protocol
A network authentication mechanism for validating users’ identity for Wi-Fi access.
HSM
Hardware Security Module - a specialized physical device designed to securely generate, store, and manage cryptographic keys used for encryption and decryption