Acronyms (Page 1) Flashcards

1
Q

AAA

A

Authentication, Authorization, and Accounting

A framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List

A table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standard

A symmetric encryption algorithm widely used across the globe to secure data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES-256

A

Advanced Encryption Standard 256-bit

A version of the AES using a 256-bit key size for encryption, providing a higher level of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AH

A

Authorization Header

A part of the IPsec protocol suite that provides authentication and integrity to the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AI

A

Artificial Intelligence

The simulation of human intelligence processes by machines, especially computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AIS

A

Automated Indicator Sharing

A system that allows the exchange of cyber threat indicators between the public and private sectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE

A

Annualized Loss Expectancy

A risk management concept to estimate the monetary loss that can be expected for an asset due to a risk over a year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

Access Point

A networking hardware device that allows other Wi-Fi devices to connect to a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

API

A

Application Programming Interface

A set of functions and procedures allowing the creation of applications that access the features or data of an operating system, application, or other services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT

A

Advanced Persistent Threat

A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARO

A

Annualized Rate of Occurrence

The expected frequency with which a specific event is likely to occur annually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP

A

Address Resolution Protocol

A communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASLR

A

Address Space Layout Randomization

A computer security technique involved in preventing exploitation of memory corruption vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge

A knowledge base maintained by MITRE for listing and explaining cyber adversary behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly