Acronyms "N, O, P" Flashcards
NAC
Network Access Control
- Provides visibility, access control, and compliance
- Can define and implement strict access management controls for networks
- Centralized solution to end-point security
- Uses IEEE 802.1X standard
- Usually works with TACACS or RADIUS to verify authentication
NAS
Network Attached Storage
NAT
Network Address Translation
NDA
Non-Disclosure Agreement
NFC
Near-Field Communications
- Used for mobile payments, key cards, smart cards
NFV
Network Functions Virtualization
- Virtualizes entire classes of network node functions into building blocks
NGFW
Next-Generation Firewall
NG-SWG
Next-Generation Secure Web Gateway
NIC
Network Interface Card
NIDS
Network Intrusion Detection System
NIPS
Network Intrusion Prevention System
NIST
National Institute of Standards & Technology
NOC
Network Operations Center
- Ensures that an organization’s IT infrastructure continues to function properly
NTFS
New Technology File System
NTLM
New Technology Lan Manager
- Replaced by Kerberos
- Used to authenticate user identity and protect the integrity and confidentiality of their activity
- SSO tool
- Relies on a challenge-response protocol to confirm the user without requiring them to submit a password
- NTLM has known vulnerabilities and is typically only still used for legacy clients and server
- NTLM relies on a three-way handshake between the client and server to authenticate a user, while Kerberos uses a two-part process that leverages a ticket granting service or key distribution center (KDC)
OAUTH
Open Authentication
- Token-based authentication
- Lets organizations share info across third-party services without exposing their users’ usernames/passwords
NTP
Network Time Protocol
OCSP
Online Certificate Status Protocol
- Used by CAs to check the revocation status of an X.509 digital certificate
OID
Object Identifier
- Standard for naming any object, concept, or thing
OS
Operating System
OSI
Open Systems Interconnection
OSPF
Open Shortest Path First
- Distributes routing information between routers
OSINT
Open Source Intelligence
OT
Operational Technology
- Hardware/software that detects or causes a change by directly monitoring and/or controlling industrial equipment, assets, processes, and events
OTG
On-The-Go
OTA
Over-The-Air
- Pushing updates for software, configuration settings, or even encryption keys, on remote devices
OVAL
Open Vulnerable Assessment Language
- Community standard to promote open and publicly available security content, and to standardize the transfer of this information
OWASP
Open Web Application Security Project
P12
PKCS#12
- Archive file format for storing cryptography objects as a single file
- Used to bundle a private key with its X.509 certificate, or to bundle the members of a chain of trust
- Think of it as a container for X.509 public key certs, private keys, CRLs, and generic data
P2P
Peer-to-Peer
PaaS
Platform as a Service
PAC
Proxy Auto Configuration
- Used to define how web browsers and other user agents can automatically choose the appropriate proxy server for fetching URLs
- Contains a JavaScript function that returns a string with one or more access method specifications
PAM
Privileged Access Management
- Safeguarding identities with special access or admin capabilities
PAM (Authentication)
Pluggable Authentication Modules
- Used to separate the tasks of authentication from applications
- Apps can call PAM libraries to check permissions
PAP
Password Authentication Protocol
- Two-way handshake to provide the peer system with a simple method to establish its identity
PAT
Port Address Translation
PBKDF2
Password-based Key Derivation Function 2
- Key derivation functions with a sliding computation cost, which is used to reduce vulnerabilities of brute-force attacks
- Applies a pseudorandom function (like HMAC) to the input password along with a salt value, and repeats this process multiple times to produce a derived key
- Derived key can then be used as a cryptographic key
PCI DSS
Payment Card Industry Data Security Standard
- Security standards to use when accepting, processing, storing, or transmitting credit card information
PDU
Power Distribution Unit
- Provides multiple electric power outputs
PE
Portable Executable
PEAP
Protected Extensible Authentication Protocol
- Provides a method to transport securely authenticated data including legacy password-based protocols, via 802.11 wifi
- Uses tunneling between PEAP clients and an auth server
PED
Portable Electronic Device
- Devices like phones, laptops, pagers, radios, etc..
PEM
Privacy Enhanced Mail
- File format for storing and sending cryptographic keys, certificates, and other data
- For example, when using SSH, you will often use a .pem file
- Encodes the binary data using base64
- Starts with
-----BEGIN
a label and then-----
PFS
Perfect Forward Secrecy
- Feature of specific key agreement protocols that give assurances that session keys will not be compromised, even if long-term secrets used in the session key exchange are compromised
- ie: for HTTPS, the long-term secret is usually the private key of the server
PGP
Pretty Good Privacy
- Encryption program used to provide cryptographic privacy and authentication for data communication
- Useful for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions
PHI
Personal Health Information
PII
Personally Identifiable Information
PIN
Personal Identification Number
PIV
Personal Identity Verification
- MFA on a smartcard
- Used for identity proofing
PKCS
Public Key Cryptography Standards
- Group of standards for public keys
PKI
Public Key Infrastructure
- Roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption
POP
Post Office Protocol
- Most commonly used message request protocol for transferring messages from e-mail servers to e-mail clients
PoC
Proof of Concept
POTS
Plain Old Telephone Service
PPP
Point-to-Point Protocol
- Communication between two routers directly without any hosts or other networks in between
- Data Link Layer
PPTP
Point-to-Point Tunneling Protocol
- Obsolete method of implementing virtual private networks
- Port 1723
PSK
Pre-Shared Key
- Shared secrets sent using a secure channel before it needs to be used
PTZ
Pan-Tilt-Zoom
- Camera that can be remotely controlled, including zoom and directional control
PUP
Potentially Unwanted Program
PBX
Private Branch Exchange
- Telephone system that switches calls between users on local line
- Multiline telephone system
PCAP
Packet Capture
- Collects and records packet data from a network which can then be analyzed