Acroynm Definitions Flashcards
Helps protect email domains from unauthorized use, such as email spoofing.
DMARC (Domain based message authentication reporting and conformance)
Provides a way to validate all digitally signed messages from a specific email server.
DKIM (Domain Keys Identified Mail)
A list of all authorized mail servers for a specific domain
SPF (sender policy framework)
A way to limit network access to only authorized users.
NAC (network access control)
Connects local area networks across large distances using controlling software that works with a variety of networking hardware. (Cloud based)
SD-WAN (software defined networking in a wide area network)
A formal document where both sides agree to a broad set of goals and objectives associated with the partnership.
MOA (memorandum of agreement)
Provided as a formal contract between two parties that documents the minimum terms for service provided.
SLA (service level agreement)
A detailed list of items to be completed as part of an overall project deliverables.
SOW (statement of work)
A confidentiality agreement between parties.
NDA (Non disclosure agreement)
A prediction of how often a repairable system will fail
MTBF (mean time between failures)
Define a set of objectives needed to restore a particular service level.
RTO (Recovery Time Objectives)
The amount of time it takes to repair a component.
MTTR (mean time to restore) (repair)
Describes the minimum data or operational state required to categorize a system as recovered.
RPO (recovery point objective)
An authentication framework commonly associated with network access control
EAP (extensible authentication protocol)
Watches traffic flow across the network
UTM (unified threat manager)
The address system of the Internet and has the core function of delivering packets of information from a source device to a target device.
IP (Internet Protocol)
Handles packet ordering and error checking
TCP (Transmission control protocol)
The collection of Internet connected gadgets such as cameras, refrigerators, and smart speakers
IoT (internet of things)
Used to diagnose network issues over the Internet
ICMP (Internet control message protocol)
A transport layer communication protocol, a very common protocol for voice and video traffic
UDP (user datagram protocol)
A trusted entity that issues digital certificates to verify the identity of websites, email, addresses, companies, or individuals.
CA (certificate authority)
A list of digital certificates that have been revoked by the certificate authority that issues them before their expiration date
CRL (certificate revocation list)
A specially formatted encrypted message sent from a secure sockets layer (SSL) digital certificate applicant to a certificate authority
CSR (certificate signing request)
An Internet protocol that certificate authorities use to determine the status of secure sockets layer/transport layer security (SSL/TLS) certificates
OCSP (online certificate status protocol)
An OS that guarantees real time applications a certain capability within a specified deadline
RTOS (real time operating system)
A system of devices, networks, and controls that work together to manage industrial processes
ICS (industrial control system)
An approach to network management that enables dynamic and programmatically efficient network configuration to improve network performance and monitoring in a manner more akin to cloud computing than to traditional network management
SDN (software defined networking)
A security solution that identifies and helps prevent unsafe or inappropriate sharing, transfer, or use of sensitive data
DLP (data loss prevention)
A systems ability to operate continuously, with minimal or no downtime, and at a high level of performance
HA (High Availability)
Hardened, tamper resistant hardware devices that secure cryptographic processes by generating, protecting, and managing keys used for encrypting and decrypting data and creating digital signatures and certificates
HSM (Hardware security module)
A security program that monitors a single device for suspicious activity and prevents threats to the device’s integrity
HIPS (host based intrusion prevention system)
A method of managing user access to systems, networks, or resources based on their role within an organization
RBAC (Role based access control)
The practice of collecting and analyzing publicly available data to produce actionable intelligence
OSINT (open source intelligence)