Acronyms "N, O, P" Flashcards

1
Q

NAC

A

Network Access Control

  • Provides visibility, access control, and compliance
  • Can define and implement strict access management controls for networks
  • Centralized solution to end-point security
  • Uses IEEE 802.1X standard
  • Usually works with TACACS or RADIUS to verify authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NAS

A

Network Attached Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NAT

A

Network Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NDA

A

Non-Disclosure Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NFC

A

Near-Field Communications

  • Used for mobile payments, key cards, smart cards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NFV

A

Network Functions Virtualization

  • Virtualizes entire classes of network node functions into building blocks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NGFW

A

Next-Generation Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NG-SWG

A

Next-Generation Secure Web Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NIC

A

Network Interface Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NIDS

A

Network Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NIPS

A

Network Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NIST

A

National Institute of Standards & Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NOC

A

Network Operations Center

  • Ensures that an organization’s IT infrastructure continues to function properly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NTFS

A

New Technology File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NTLM

A

New Technology Lan Manager

  • Replaced by Kerberos
  • Used to authenticate user identity and protect the integrity and confidentiality of their activity
  • SSO tool
  • Relies on a challenge-response protocol to confirm the user without requiring them to submit a password
  • NTLM has known vulnerabilities and is typically only still used for legacy clients and server
  • NTLM relies on a three-way handshake between the client and server to authenticate a user, while Kerberos uses a two-part process that leverages a ticket granting service or key distribution center (KDC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OAUTH

A

Open Authentication

  • Token-based authentication
  • Lets organizations share info across third-party services without exposing their users’ usernames/passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

NTP

A

Network Time Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

OCSP

A

Online Certificate Status Protocol

  • Used by CAs to check the revocation status of an X.509 digital certificate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

OID

A

Object Identifier

  • Standard for naming any object, concept, or thing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

OS

A

Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

OSI

A

Open Systems Interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

OSPF

A

Open Shortest Path First

  • Distributes routing information between routers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

OSINT

A

Open Source Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

OT

A

Operational Technology

  • Hardware/software that detects or causes a change by directly monitoring and/or controlling industrial equipment, assets, processes, and events
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

OTG

A

On-The-Go

26
Q

OTA

A

Over-The-Air

  • Pushing updates for software, configuration settings, or even encryption keys, on remote devices
27
Q

OVAL

A

Open Vulnerable Assessment Language

  • Community standard to promote open and publicly available security content, and to standardize the transfer of this information
28
Q

OWASP

A

Open Web Application Security Project

29
Q

P12

A

PKCS#12

  • Archive file format for storing cryptography objects as a single file
  • Used to bundle a private key with its X.509 certificate, or to bundle the members of a chain of trust
  • Think of it as a container for X.509 public key certs, private keys, CRLs, and generic data
30
Q

P2P

A

Peer-to-Peer

31
Q

PaaS

A

Platform as a Service

32
Q

PAC

A

Proxy Auto Configuration

  • Used to define how web browsers and other user agents can automatically choose the appropriate proxy server for fetching URLs
  • Contains a JavaScript function that returns a string with one or more access method specifications
33
Q

PAM

A

Privileged Access Management

  • Safeguarding identities with special access or admin capabilities
34
Q

PAM (Authentication)

A

Pluggable Authentication Modules

  • Used to separate the tasks of authentication from applications
  • Apps can call PAM libraries to check permissions
35
Q

PAP

A

Password Authentication Protocol

  • Two-way handshake to provide the peer system with a simple method to establish its identity
36
Q

PAT

A

Port Address Translation

37
Q

PBKDF2

A

Password-based Key Derivation Function 2

  • Key derivation functions with a sliding computation cost, which is used to reduce vulnerabilities of brute-force attacks
  • Applies a pseudorandom function (like HMAC) to the input password along with a salt value, and repeats this process multiple times to produce a derived key
  • Derived key can then be used as a cryptographic key
38
Q

PCI DSS

A

Payment Card Industry Data Security Standard

  • Security standards to use when accepting, processing, storing, or transmitting credit card information
39
Q

PDU

A

Power Distribution Unit

  • Provides multiple electric power outputs
40
Q

PE

A

Portable Executable

41
Q

PEAP

A

Protected Extensible Authentication Protocol

  • Provides a method to transport securely authenticated data including legacy password-based protocols, via 802.11 wifi
  • Uses tunneling between PEAP clients and an auth server
42
Q

PED

A

Portable Electronic Device

  • Devices like phones, laptops, pagers, radios, etc..
43
Q

PEM

A

Privacy Enhanced Mail

  • File format for storing and sending cryptographic keys, certificates, and other data
  • For example, when using SSH, you will often use a .pem file
  • Encodes the binary data using base64
  • Starts with -----BEGIN a label and then -----
44
Q

PFS

A

Perfect Forward Secrecy

  • Feature of specific key agreement protocols that give assurances that session keys will not be compromised, even if long-term secrets used in the session key exchange are compromised
  • ie: for HTTPS, the long-term secret is usually the private key of the server
45
Q

PGP

A

Pretty Good Privacy

  • Encryption program used to provide cryptographic privacy and authentication for data communication
  • Useful for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions
46
Q

PHI

A

Personal Health Information

47
Q

PII

A

Personally Identifiable Information

48
Q

PIN

A

Personal Identification Number

49
Q

PIV

A

Personal Identity Verification

  • MFA on a smartcard
  • Used for identity proofing
50
Q

PKCS

A

Public Key Cryptography Standards

  • Group of standards for public keys
51
Q

PKI

A

Public Key Infrastructure

  • Roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption
52
Q

POP

A

Post Office Protocol

  • Most commonly used message request protocol for transferring messages from e-mail servers to e-mail clients
53
Q

PoC

A

Proof of Concept

54
Q

POTS

A

Plain Old Telephone Service

55
Q

PPP

A

Point-to-Point Protocol

  • Communication between two routers directly without any hosts or other networks in between
  • Data Link Layer
56
Q

PPTP

A

Point-to-Point Tunneling Protocol

  • Obsolete method of implementing virtual private networks
  • Port 1723
57
Q

PSK

A

Pre-Shared Key

  • Shared secrets sent using a secure channel before it needs to be used
58
Q

PTZ

A

Pan-Tilt-Zoom

  • Camera that can be remotely controlled, including zoom and directional control
59
Q

PUP

A

Potentially Unwanted Program

60
Q

PBX

A

Private Branch Exchange

  • Telephone system that switches calls between users on local line
  • Multiline telephone system
61
Q

PCAP

A

Packet Capture

  • Collects and records packet data from a network which can then be analyzed