Acronyms for Security + Flashcards
AAA
Authentication, Authorization, and Accounting
A framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
ACL
Access Control List
access rights each user has to a particular system object, such as a file directory or individual file.
AES
Advanced Encryption Standard
Symmetric Encryption algorithm
AES-256
Advanced Encryption Standards 256-bit
A version of the AES using a 256-bit key size for encryption,
AH
Authentication Header
part of the IPsec protocol that provides authentication and integrity to the data
AIS
Automation Indicator Sharing
system that allows exchange of cyber threat indicators between public and private sectors
ALE
Annualized Loss Expectancy
risk management concept to estimate the monetary loss
AP
Access Point
Network hardware device that allows other WIFI devices to connect to a wired network
APT
Advanced Persistent Threat
Cyberattack where intruder gains access to a network and remains undetected for a long time
ARO
Annualized Rate of Occurrence
Frequency which a event is likely to occur annually
ARP
Address Resolution Protocol
Communication protocol used for discovering link layer address (mac)
Port 219
ASLR
Address Space Layout Randomization
Security Technique preventing memory corruption vulnerabilities
ATT&CK
Adversarial Tactics, Techniques and common Knowledge
maintained by MITRE
AUP
Acceptable Use Policy
AV
Antivirus
BASH
Unix shell command language
BCP
Business Continuity Planning
prevention and recovery from potential threats to a company
BGP
Border Gateway Protocol
Protocol used to route information across the internet
BIA
Business Impact Analysis
evalutes potential effects of natural and man-made events on business operation
BPA
Business Partners Agreement
contract between parties who agreed to share resources to undertake a specific project
BPDU
Bridge Protocol Data Unit
network message transmitted by LAN bridge
BYOD
Bring Your Own Device
CA
Certificate Authority
CAR
Corrective Action Report
report outlines the corrective actions necessary to rectify a detected non-conformance
CASB
Cloud Access Security Broker
security policy enforcement points placed between cloud service consumers and cloud service providers
CBC
Cipher Block Chaining
provides confidentiality but not
message intergrity
CCMP
Counter mode/CBC-MAC Protocol
encryption protocol used in WIFI Networks
CCTV
Closed-circuit Television
CERT
Computer Emergency Response Team
CFB
Cipher Feedback
mode operation for block cipher
CHAP
Challenge Handshake Authentication Protocol
CIA
Confidentiality, Integrity, Availability
CIO
Chief Information Officer
CIRT
Computer Incident Response Team
contact when security breach emergency occurs
CMS
Content Management System
software creates, manages content on a website
COOP
Continuity of Operation Planning
process by gov agencies to ensure critical functions continue during wide range of emergencies
COPE
Corporate Owned, Personally Enabled
corpo owned IT devices for personal use
CP
Contingency Planning
action that helps organization respond to significant future event or situations
CRC
Cyclical Redundancy Check
code - detect accidental changes to raw data
CRL
Certificate Revocation List
revoked by issuing certificate authority
CSO
Chief Security Officer
CSP
Cloud Service Provider
company that offers some component of cloud computing
CSR
Certificate Signing Request
applying for digital identity Certificate
CSRF
Cross-site Request Forgery
malicious exploit of website where unauthorized commands are transmitted from a user that the web application trusts
CSU
Channel Service Unit
device used in digital data transmission for interfacing a digital data terminal with a digital transmission medium
CTM
Counter Mode
mode of operation in cryptography for block ciphers
CTO
Chief Technology Officer
CVE
Common Vulnerability Enumeration
list of publicly disclosed cybersecurity vulnerabilities
CVSS
Common Vulnerability Scoring System
industry standard for assessing the severity of computer system security vulnerabilities
CYOD
Choose Your Own Device
DAC
Discretionary Access Control
access control defined by ACL where access rights are assigned to users by the system
DBA
Database Administrator
DDoS
Distributed Denial of Service
DEP
Data Execution Prevention
security feature that helps prevent damage to the computer from virus and other threats
DES
Digital Encryption Standard
Encryption of data
DHCP
Dynamic Host Configuration Protocol
assigns IP addresses automatically to each device on network
DHE
Diffie-Hellman Ephermal
secure exchange cryptographic keys over public channel
DKIM
Domain Keys Identified Mail
email authentication method designed to detect forage sender addresses in emails
DLL
Dynamic Link Library
feature on windows that allow mulitple software programs to share same functionality
DLP
Data Loss Prevention
set of tools and processes used to ensure that sensitive data is not loss misused or accessed by unauth users
DMARC
Domain Message Authentication Reporting and Conformance
email authentication protocol, prevent email spoofing
DNAT
Destination Network Address Translation
technique for transparently changing the destination IP address of an end route packet
DNS
Domain Name Service
DoS
Denial of Service
DPO
Data Privacy Officer
DRP
Disaster Recovery Plan
DSA
Digital Signature Algorithm
DSL
Digital Subscriber Line
EAP
Extensible Authentication Protocol
authentication framework used for wireless networks
ECB
Electronic Code Book
mode of operation for a block cipher
ECC
Elliptic Curve Cryptography
approach to public key cryptography
ECDHE
Elliptic Curven Diffie-Hellman Ephemeral
ECDHE is one of the three main algorithms used for the initial TLS handshake, are classified as asymmetric algorithms because one party has a secret key and the other party has a public key.
ECDSA
Elliptic Curve Digital Signature Algorithm
used on bitcoin
EDR
Endpoint Detection and Response
cybersecurity technology that addresses need for continuous monitoring
EFS
Encrypted File System
feature on Microsoft Windows that provides filesystem - level encryption
ERP
Enterprise Resource Planning
business process management software that allows organizations to use a system of integrated applications
ESN
Electronic Serial Number
ESP
Encapsulated Security Payload
component of IPsec used for confidentiality
FACL
File System Access Control List
data structure that controls access to files and folders
FDE
Full Disk Encryption
FIM
File Integrity Management
FPGA
Field Programmable Gate Array
FRR
False Rejection Rate
likelihood that biometric security system will incorrectly reject access attempt by auth user
FTP
File Transfer Protocol
Network Protocol used for transfer of computer files between a client and server on a computer network
FTPS
File Transfer Protocol Secure
GCM
Galosis Counter mode
mode of operation for symmetric key cryptographic block ciphers
GDPR
General Data Protection Regulation
in the Europe
GPG
GNU Privacy Guard
free software to encrypt data
GPO
Group Policy Object
feature of Windows that provides centralized mangement
GPS
Global Positioning System
GPU
Graphics Processing Unit
GRE
Generic Routing Encapsulation
tunneling protocol, encapsulate layers of network protocols
HA
High Availability
Refers to systems that are durable
HDD
Hard Disk Drive
HIDS
Host-based Intrusion Detection System
HIPS
Host-based Intrusion Prevention system
HMAC
Hashing Message Authentication Code
HOTP
HMAC-based One-time Password
HSM
Hardware Security Module
HTML
Hypertext Markup Language
HTTP
Hypertext Transfer Protocol
HTTPS
Hypertext Transfer Protocol Secure
IaaS
Infrastructure as a Service
IaC
Infrastructure as Code
IAM
Identity and Access Management
framework of business processes, policies, and tech
ICMP
Internet Control Message Protocol
sends error messages
ICS
Industrial Control Systems
IDEA
International Data Encryption Algorithm
symmetric key block cipher
IDF
Intermediate Distribution Frame
cable rack that interconnects telecom wiring
IdP
Identity Provider
provides principal authentication to other service providers within a federation or distrubuted network
IDS
Intrusion Detection System
IEEE
Institute of Electrical and Electronics Engineers
IKE
Internet Key Exchange
protocol used on IPsec for establishing SA
IM
Instant Message
IMAP
Internet Message Access Protocol
used by email clients to retrieve messages from a mail server over TCP/IP
IoC
Indicators of Compromise
IoT
Internet of Things
IP
Internet Protocol