Acronyms F-L Flashcards

1
Q

FAR

A

False Acceptance Rate

Metric used to measure the likelihood of granting access to an unauthorized user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FDE

A

Full Disk Encryption

Security technique that encrypts all data stored on a disk or storage device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FISMA

A

Develop, document, and implement an agency-wide program for information security

Covers information and systems that support the operations and assets of the agency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FRR

A

False Rejection Rate

Metric used to measure the likelihood of denying access to an authorized user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FTP

A

File Transfer Protocol

A protocol used to transfer files between computers over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

GDPR

A

Data protection and privacy for individuals within the EU and EEA

Regulation that came into effect on May 25, 2018.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

GPS

A

Global Positioning System

A system of satellites used to determine the location of a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

GRE

A

Generic Routing Encapsulation

A protocol used to encapsulate one type of packet within another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

GBAC

A

Group Based Access Control

Gives access to a group of individuals to the resources they need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HMAC

A

Hash-based Message Authentication Code

A cryptographic authentication technique that uses a hash function and a secret key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HIDS

A

Host Intrusion Detection System

Represents an application monitoring a computer or network for suspicious activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HIPAA

A

Health Insurance Portability And Accountability Act

Federal law enacted in 1996 to protect the privacy and security of patients’ personal health information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HOTP

A

HMAC-based One-Time Password

Algorithm used to generate one-time passwords for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HSM

A

Hardware Security Module

Specialized hardware device designed to securely store and manage digital keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HSTS

A

HTTP Strict Transport Security

Web security policy mechanism used to protect against protocol downgrade attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HTML

A

Hypertext Markup Language

The standard markup language for creating web pages.

17
Q

HTTP

A

Hypertext Transfer Protocol

Foundation of the World Wide Web used to load webpages.

18
Q

HTTPS

A

Secure version of HTTP

Uses encryption to protect data in transit.

19
Q

IaaS

A

Infrastructure as a Service

A cloud computing model providing infrastructure resources by a third-party provider.

20
Q

IAM

A

Identity and Access Management

Cybersecurity practice that restricts access to organizational resources.

21
Q

ICMP

A

Internet Control Message Protocol

Network layer protocol used to diagnose network communication issues.

22
Q

IDS

A

Intrusion Detection System

Monitoring system that detects suspicious activities and generates alerts.

23
Q

IPS

A

Intrusion Prevention System

Network security technology that actively prevents identified threats.

24
Q

IEEE

A

Institute of Electrical and Electronics Engineers

The world’s largest technical professional society.

25
Q

IKE

A

Internet Key Exchange

Standard protocol used to set up a secure communication channel via VPN.

26
Q

IMAP

A

Internet Message Access Protocol

Protocol used by email clients to retrieve email messages from a mail server.

27
Q

IoT

A

Internet Of Things Devices

Physical devices connected to the internet that can exchange data.

28
Q

IP

A

Internet Protocol

Protocol for routing and addressing packets of data across networks.

29
Q

IPv4

A

Internet Protocol version 4

A 32-bit address usually represented in dotted decimal notation.

30
Q

What does IPv6 provide?

A

Larger address space for the internet

Uses 128-bit addresses, allowing for an almost unlimited number of unique addresses.

31
Q

ISA

A

Interconnection Security Agreement

Document regulating security aspects of a connection between an agency and an external system.

32
Q

ISO

A

International Organization for Standardization

An international standard-setting organization.

33
Q

ISP

A

Internet Service Provider

A company that provides Internet access to customers.

34
Q

JSON

A

JavaScript Object Notation

A lightweight data interchange format.

35
Q

LDAP

A

Lightweight Directory Access Protocol

Protocol for locating data about organizations, individuals, and resources in a network.

36
Q

LEAP

A

Lightweight Extensible Authentication Protocol

A network authentication mechanism for validating users’ identity for Wi-Fi access.

37
Q

HSM

A

Hardware Security Module - a specialized physical device designed to securely generate, store, and manage cryptographic keys used for encryption and decryption