COMP TIA Acronyms 1 Flashcards
Is the type of cryptography where block cipher algorithms are applied three times to each data block. The key size increased in Triple-DES to ensure additional security through encryption capabilities
Triple Data Encryption Standard (3DES)
A framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services
Authentication, Authorization, and Accounting (AAA)
An authorization methodology that sets and enforces policies based on characteristics, such as department, location, manager, and time of day
Attribute Based Access Control (ABAC)
Made up of rules that either allow access to a computer environment or deny it. In a way, an ACL is like a guest list at an exclusive club
Access Control (ACL)
Is a database and set of services that connect users with the network resources they need to get their work done. The database (or directory) contains critical information about your environment, including what users and computers there are who’s allowed to do what
Active Directory (AD)
Is the specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST)
Advanced Encryption Standard (AES)
Verifies origin of data and also payload to confirm if there has been modification done in between during transmission between source and destination
Authentication Header (AH)
Is a service the Cybersecurity and Infrastructure Security Agency (CISA) provides to enable real-time exchange of machine-readable cyber threat indicators and defensive measures between public and private sector organizations
Automated Indicator Sharing (AIS)
Is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is expressed as ALE=ARO X SLE
Annualized Loss Expectancy
A stand alone device or computer that allows wireless devices (such as laptop computers) to connect to and communicate with a wired computer network
Access Point (AP)
Mechanism that enable two software components to communicate with each other using a set of definitions and protocols.
Application Programming Interface (API)
A prolonged and targeted cyber attack in which an intruder gains access to a network and remains undetected for an extended period
Advanced Persistent Threat (APT)
The probability that a risk will occur in a particular year
Annualized Rate of Occurrence (ARO)
Is a protocol or procedure that connects an ever-changing Internet Protocol (IP) address to a fixed physical machine address, also known as a media access control (MAC) address, in a local area network (LAN)
Address Resolution Protocol (ARP)
A technique that is used to increase the difficulty of performing a buffer overflow attack that requires the attacker to know the location of an executable in memory
Address Space Layout Randomization (ASP)
Enables web servers to dynamically generate webpages and create interactive web applications by using server-side scripting technology. The use of ASP pages with Microsoft Internet Information Services (IIS) is currently supported in all supported version
Active Server Pages (ASP)
Is a guideline for classifying and describing cyberattacks and intrusions. It was created by the Mitre Corporation and released in 2013
Adversarial Tactics, Techniques and Common Knowledge (ATT&CK)
A document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources
Acceptable Use Policy (AUP)
Designed to detect and destroy computer viruses
Antivirus (AV)
Is a Unix shell and command language used for scripting. It provides command-based programming to interpret and execute user commands
Bourne Again Shell (BASH)