Acronyms (Page 1) - Reverse Flashcards
A framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
AAA
Authentication, Authorization, and Accounting
A table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file.
ACL
Access Control List
A symmetric encryption algorithm widely used across the globe to secure data.
AES
Advanced Encryption Standard
A version of the AES using a 256-bit key size for encryption, providing a higher level of security.
AES-256
Advanced Encryption Standard 256-bit
A part of the IPsec protocol suite that provides authentication and integrity to the data.
AH
Authorization Header
The simulation of human intelligence processes by machines, especially computer systems.
AI
Artificial Intelligence
A system that allows the exchange of cyber threat indicators between the public and private sectors.
AIS
Automated Indicator Sharing
A risk management concept to estimate the monetary loss that can be expected for an asset due to a risk over a year.
ALE
Annualized Loss Expectancy
A networking hardware device that allows other Wi-Fi devices to connect to a wired network.
AP
Access Point
A set of functions and procedures allowing the creation of applications that access the features or data of an operating system, application, or other services.
API
Application Programming Interface
A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.
APT
Advanced Persistent Threat
The expected frequency with which a specific event is likely to occur annually.
ARO
Annualized Rate of Occurance
A communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address.
ARP
Address Resolution Protocol
A computer security technique involved in preventing exploitation of memory corruption vulnerabilities.
ASLR
Address Space Layout Randomization
A knowledge base maintained by MITRE for listing and explaining cyber adversary behavior.
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge