Acronyms M-R Flashcards
MAC
Media Access Control
A unique identifier assigned to a network interface controller (NIC).
What is Mandatory Access Control (MAC)?
Limiting access to resources based on the sensitivity of information.
MCSP
Managed Cloud Service Provider
Provides managed cloud services to customers.
MFA
Multi-Factor Authentication. A security feature that requires multiple forms of authentication to access a resource.
MITB
Man In The Browser
An attack that injects malicious software into a victim’s web browser.
MITM
Man-in-the-Middle. A type of cyber attack where an attacker intercepts communications between two parties.
MSSP
Managed Security Service Provider
Provides managed security services to customers, typically on a subscription basis.
MTBF
Mean Time Between Failures. Average amount of time between system failures.
MTTD
Mean Time To Detect
Average time it takes to detect a security incident or breach.
MTTR
Mean Time To Repair
Average time that it takes to fix a system.
NAC
Network Access Control. A system used to control access to a network based on the identity of the user or device.
NAT
Network Address Translation. A technique used to map private IP addresses to public IP addresses.
NDA
Non Disclosure Agreement
A contract that prevents any side from disclosing secrets.
NFC
Near Field Communication. Short-range wireless communication technology for data exchange between devices.
NIDS
Network Intrusion Detection System
A system used to detect unauthorized activity on a network.
NIPS
Network Intrusion Prevention System
A security system that detects and prevents unauthorized access.
NIST
National Institute of Standards and Technology. A U.S. government agency that develops standards for technology and engineering.
NGFW
Next-Generation Firewall. A security appliance that processes network traffic and applies rules to block dangerous traffic.
NTFS
New Technology File System
A file system used in Windows operating systems.
OAuth
Open Authorization . An open standard protocol for authorization and authentication between applications.
OCSP
Online Certificate Status Protocol
A protocol used to check the validity of a digital certificate.
OSI model
A conceptual framework used to standardize and describe communication functions.
PaaS
Platform as a Service
A cloud computing model offering a platform for developing applications.
PAM
Privileged Access Management. A security solution that helps manage access to privileged accounts.
PCI DSS
Payment Card Industry Data Security Standard
A set of security standards for protecting credit card data.
PEAP
Protected Extensible Authentication Protocol. A security protocol used to protect wireless networks.
PGP
Pretty Good Privacy
An encryption program for cryptographic privacy and authentication.
PMF
Protected Management Frames. A security feature used in Wi-Fi networks to protect against attacks.
POP3
Post Office Protocol version 3
A protocol used to retrieve email messages from a mail server.
PPP
Point-to-Point Protocol. A protocol used to establish a direct connection between two devices.
RAID
Redundant Array of Inexpensive Disks. A technique used to increase reliability and performance of data storage.
RADIUS
Remote Authentication Dial-In User Service
A protocol for centralized authentication, authorization, and accounting.
RAM
Random Access Memory. Computer’s short-term memory for currently used data.
RAT
Remote Access Trojan
A type of malware that allows remote control of a victim’s computer.
RDP
Remote Desktop Protocol. A protocol used to remotely access and control a desktop computer.
REST
Representational State Transfer. A software architectural style that describes web architecture.
RFID
Radio Frequency Identification
A technology for tracking and identifying objects using radio waves.
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
A cryptographic hash function.
RTO
Recovery Time Objective
The maximum time to recover data after a disaster.
RTOS
Real Time Operating System. An operating system commonly found in Internet of Things devices.
RBAC
Rule Based Access Control
High level rules that determine access to resources.