Acronyms M-R Flashcards

1
Q

MAC

A

Media Access Control

A unique identifier assigned to a network interface controller (NIC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Mandatory Access Control (MAC)?

A

Limiting access to resources based on the sensitivity of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MCSP

A

Managed Cloud Service Provider

Provides managed cloud services to customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MFA

A

Multi-Factor Authentication. A security feature that requires multiple forms of authentication to access a resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MITB

A

Man In The Browser

An attack that injects malicious software into a victim’s web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MITM

A

Man-in-the-Middle. A type of cyber attack where an attacker intercepts communications between two parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MSSP

A

Managed Security Service Provider

Provides managed security services to customers, typically on a subscription basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MTBF

A

Mean Time Between Failures. Average amount of time between system failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MTTD

A

Mean Time To Detect

Average time it takes to detect a security incident or breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MTTR

A

Mean Time To Repair

Average time that it takes to fix a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NAC

A

Network Access Control. A system used to control access to a network based on the identity of the user or device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NAT

A

Network Address Translation. A technique used to map private IP addresses to public IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NDA

A

Non Disclosure Agreement

A contract that prevents any side from disclosing secrets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NFC

A

Near Field Communication. Short-range wireless communication technology for data exchange between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NIDS

A

Network Intrusion Detection System

A system used to detect unauthorized activity on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NIPS

A

Network Intrusion Prevention System

A security system that detects and prevents unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

NIST

A

National Institute of Standards and Technology. A U.S. government agency that develops standards for technology and engineering.

18
Q

NGFW

A

Next-Generation Firewall. A security appliance that processes network traffic and applies rules to block dangerous traffic.

19
Q

NTFS

A

New Technology File System

A file system used in Windows operating systems.

20
Q

OAuth

A

Open Authorization . An open standard protocol for authorization and authentication between applications.

21
Q

OCSP

A

Online Certificate Status Protocol

A protocol used to check the validity of a digital certificate.

22
Q

OSI model

A

A conceptual framework used to standardize and describe communication functions.

23
Q

PaaS

A

Platform as a Service

A cloud computing model offering a platform for developing applications.

24
Q

PAM

A

Privileged Access Management. A security solution that helps manage access to privileged accounts.

25
Q

PCI DSS

A

Payment Card Industry Data Security Standard

A set of security standards for protecting credit card data.

26
Q

PEAP

A

Protected Extensible Authentication Protocol. A security protocol used to protect wireless networks.

27
Q

PGP

A

Pretty Good Privacy

An encryption program for cryptographic privacy and authentication.

28
Q

PMF

A

Protected Management Frames. A security feature used in Wi-Fi networks to protect against attacks.

29
Q

POP3

A

Post Office Protocol version 3

A protocol used to retrieve email messages from a mail server.

30
Q

PPP

A

Point-to-Point Protocol. A protocol used to establish a direct connection between two devices.

31
Q

RAID

A

Redundant Array of Inexpensive Disks. A technique used to increase reliability and performance of data storage.

32
Q

RADIUS

A

Remote Authentication Dial-In User Service

A protocol for centralized authentication, authorization, and accounting.

33
Q

RAM

A

Random Access Memory. Computer’s short-term memory for currently used data.

34
Q

RAT

A

Remote Access Trojan

A type of malware that allows remote control of a victim’s computer.

35
Q

RDP

A

Remote Desktop Protocol. A protocol used to remotely access and control a desktop computer.

36
Q

REST

A

Representational State Transfer. A software architectural style that describes web architecture.

37
Q

RFID

A

Radio Frequency Identification

A technology for tracking and identifying objects using radio waves.

38
Q

RIPEMD

A

RACE Integrity Primitives Evaluation Message Digest

A cryptographic hash function.

39
Q

RTO

A

Recovery Time Objective

The maximum time to recover data after a disaster.

40
Q

RTOS

A

Real Time Operating System. An operating system commonly found in Internet of Things devices.

41
Q

RBAC

A

Rule Based Access Control

High level rules that determine access to resources.