CASP+ Glossary Flashcards
2 Step Verification
An authentication method that uses out of band mechanisms and generates a token serverside that is sent to the user to provide for verification. This might be an SMS message with a code, a phone call, a push notification to a mobile phone or email
3D Printing
An emerging tech that uses special purpose printers that build 3D objects rather than printing on paper. Printing is done by adding layers on top of layers according to model using computer aided design (CAD) software. It allows for rapid design and the creation of just about anything
802.1x
An authentication protocol that uses Extensible Authentication Protocol (EAP) for wireless, ethernet, or VPN gateway to provide authentication
Access Control List (ACL)
A broad term that outlines how objects are allowed to interact with each other on a network or system. In networking, devices like switches or routers may grant or deny access based on their own ACLs. Similar to a firewall, it helps filters and route traffic
Access Space Layout Randomization (ASLR)
A buffer overflow prevention control that makes it difficult to guess the memory locations of executables stored in memory
Adversary Emulation
A discipline in cyber that involves using TTPs (tactics, techniques and procedures) of a specific threat actor in a realistic way to test current defenses
Agile Model
In this approach to software development, an interative process is used to release well tested code in smaller blocks. Development is continuous. It is adaptive to allow for changes throughout the process. It focuses on rapid development, sometimes at the expense of security
Air Gap
A host that is physically disconnected from any network so as to protect that network by being segmented from it (This is a form of segregation)
Aircrack-ng
A suite of tools for assessing and analyzing WiFi. It is used to monitor, attack, test and crack WiFi networks
Analytical Zone
A form of cloud based data zone where data is used for practical purposes
Annual Loss Expectancy (ALE)
The total cost of all the single loss events that happen over the course of a year - added together. ALE = SLE x ARO
Annual Rate of Occurrence (ARO)
The number of times in a year that a single loss event occurs
Anonymization
A process that removes data that could be used to uniquely identify a person. It is a common requirement in compliance laws.
AV Software
Software that detects and identifies malicious software on an endpoint. Originally, AV programs were signature based file scans that would detect viruses, but now they monitor when processes are launched, intercept them and look for signature matches
API CASB Configuration
A configuration of CASB (Cloud Access Security Broker) where an API brokers connection between the cloud provider and the customer