Acronyms (Page 1) Flashcards
AAA
Authentication, Authorization, and Accounting
A framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
ACL
Access Control List
A table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file.
AES
Advanced Encryption Standard
A symmetric encryption algorithm widely used across the globe to secure data.
AES-256
Advanced Encryption Standard 256-bit
A version of the AES using a 256-bit key size for encryption, providing a higher level of security.
AH
Authorization Header
A part of the IPsec protocol suite that provides authentication and integrity to the data.
AI
Artificial Intelligence
The simulation of human intelligence processes by machines, especially computer systems.
AIS
Automated Indicator Sharing
A system that allows the exchange of cyber threat indicators between the public and private sectors.
ALE
Annualized Loss Expectancy
A risk management concept to estimate the monetary loss that can be expected for an asset due to a risk over a year.
AP
Access Point
A networking hardware device that allows other Wi-Fi devices to connect to a wired network.
API
Application Programming Interface
A set of functions and procedures allowing the creation of applications that access the features or data of an operating system, application, or other services.
APT
Advanced Persistent Threat
A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.
ARO
Annualized Rate of Occurrence
The expected frequency with which a specific event is likely to occur annually.
ARP
Address Resolution Protocol
A communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address.
ASLR
Address Space Layout Randomization
A computer security technique involved in preventing exploitation of memory corruption vulnerabilities.
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge
A knowledge base maintained by MITRE for listing and explaining cyber adversary behavior.