Acronyms "T, U, V" Flashcards
TACAS+
Terminal Access Controller Access Control System
- Port 49
- Authentication protocol used for remote communication with any server in a UNIX network or terminals
- Uses allow/deny mechanisms with auth keys that correspond to usernames and passwords
- Primarily used for device administration, but can technically be used for some network management
- Encrypts the entire packet
- Separates authentication and authorization
TAXII
Trusted Automated eXchange of Indicator Information
- Aims to enable robust, secure, and high-volume exchanges of cyber threat information
TCP/IP
Transmission Control Protocol / Internet Protocol
TGT
Ticket Granting Ticket
- Files created by the key distribution center (KDC) portion of the Kerberos authentication protocol
- Used to grant users access to network resources
- Once the user has the TGT, they use it to obtain a service ticket from the Ticket Granting Service (TGS), at which point the user is granted access
TKIP
Temporal Key Integrity Protocol
- Security protocol used in IEEE 802.11 wireless networking standard
TLS
Transport Layer Security
- Successor of deprecated SSL
- Provides secure communications
TOTP
Time-based One Time Password
- String of dynamic digits of code who change values based on time
- Used for MFA
TPM
Trusted Platform Module
- Dedicated microcontroller/chip designed to secure hardware with integrated crypto keys
TSIG
Transaction Signature
Computer-networking protocol, primarily enables DNS to authenticate updates to a DNS database
TTP
Tactics, Techniques, Procedures
- Behaviors, methods, tools, and strategies that cyber threat actors and hackers use to plan and execute cyber attacks on business networks
UAT
User Acceptance Testing
- Last phase of the software testing process
- Actual software users test the software to make sure it can handle necessary, real-world tasks and scenarios, according to specifications
- Aka User Acceptability Testing or End-User testing
UAV
Unmanned Aerial Vehicle
UDP
User Datagram Protocol
UEFI
Unified Extensible Firmware Interface
- Specification that defines a software interface between an OS and platform firmware
- Replaces the legacy BIOS firmware interface, but provides legacy BIOS services
- UEFI can support remote diagnostics and repair of computers, even if no OS is installed
UEM
Unified Endpoint Management
- Allows you to manage, secure, and deploy resources and apps on any device from a single console
- Goes beyond just MDM since it can also control PCs, or IoT devices, for example
UPS
Un-iterruptable Power Supply
- Provides an emergency power to a load in the event of power failure
URI
Uniform Resource Identifier
- Identifier for a specific resource
- Used in some URL’s
URL
Universal Resource Locator
- All URLs are URIs, but not all URIs are URLs
- If the protocol (http, https, ftp, etc) is present or implied, then it’s a URL
USB
Universal Serial Bus
USB OTG
USB On The Go
- Allows USB devices to act as a host, allowing other USB devices to attack to them
- Those devices can then switch back and forth between the roles of host and device
- For example, a phone may read from the removal media as the host, but then act as a mass storage device
UTM
Unified Threat Management
- When a single hardware or software provides multiple security functions
- This is in contrast of having individual solutions for each security function
UTP
Unshielded Twisted Pair
VBA
Visual Basic
- Event-driven programming language from Microsoft
VDE
Virtual Desktop Environment
VDI
Virtual Desktop Infrastructure
- When the desktop and application software is separated from the hardware
VLAN
Virtual Local Area Network
- A partitioned and isolated part of a LAN created with logic (not physical separation
VLSM
Variable Length Subnet Masking
- A design where subnets can have varying sizes
VM
Virtual Machine
VoIP
Voice Over IP
VPC
Virtual Private Cloud
- On-demand pool of shared resources in a public cloud environment
- Provides isolation between organization and resources
- Lets you essentially carve out a piece of the public cloud to host your private resources
VPN
Virtual Private Network
- Encrypted connection over the Internet from a device to a network
- Helps ensure that you can communicate with remote systems securely and prevents eavesdropping on the traffic
VTC
Video Teleconferencing