COMP TIA Acronyms 2 Flashcards
Is an ASN.1 subnet of Basic Encoding Rules, and give exactly one way to represent any ASN.1 value as an Octet String
Distinguished Encoding Rules (DER)
Is a symmetric key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cryptography
Data Encryption Standard (DES)
Is a network management protocol used on Internet Protocol network for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client-server architecture
Dynamic Host Configuration Protocol (DHCP)
A method used to securely exchange or establish secret keys across an insecure network.
Diffie-Hellman Ephermeral (DHE)
Is an email authentication method designed to detect forged sender addresses in email (email spoofing), a technique often used in phishing and email spam
Domain Keys Identified Mail (DKIM)
That contains code and data that can be used by more than one program at the same time
Dynamic Link Library (DLL)
A security solution that identifies and helps prevent unsafe or inappropriate sharing, transfer or use of sensitive data
Data Loss Prevention (DLP)
Is an email security protocol Verifies email senders by building on the Domain Name System (DNS), Domainkeys Identified Mail (DKIM) and Sender Policy Framework (SPF) protocols
Domain Message Authentication (DMARC)
Each IP datagram contains a Source Address and a Destination Address. Is used to route that datagram to its destination
Destination Network Address Transaction (DNAT)
Turns domain names into IP addresses, which allow browsers to get to websites and other internet sources
Domain Name System (DNS)
Creates a secure domain name system by adding cryptographic signatures to existing DNS records
Domain Name System Security Extensions (DNSSEC)
Is a type of cyber attack designed to disable, shut down or disrupt a network, website or service
Denial-of-Service (DoS)
Is to ensure that the organization processes the personal data of its staff, customers, providers or any other individuals
Data Protection Officer (DPO)
Is a formal document created by organizations that contains detailed instructions on how to respond to unplanned incidents such as natural disasters, power outages, cyber attacks and any other disruptive events
Disaster Recovery Plan (DRP)
Uses a key pair consisting of a public key and a private key. The private key is used to generate a digital signature for a message. Public key can be verified by using signers
Digital Signature Algorithm (DSA)
Is a modern technology that uses existing telephone lines to transport high-bandwidth data, such as multimedia and video, to service subscribers
Digital Subscriber Line (DSL)
Is used to pass the authentication information between the supplicant (the Wi-Fi workstation) and the authentication server (Microsoft IAS or other)
Extensible Authentication Protocol (EAP)
It uses no initialization vector or chaining Identical plaintexts with identical keys encrypt to identical ciphertexts
Electronic Code Book (ECB)
Is a key based technique for encrypting data.
Elliptic-Curve Cryptography (ECC)
Is the method used during the key exchange between the server and the client so that the result is a pre-master secret know to both parties
Elliptical-Curve Diffie-Hellman Ephemera (ECDSA)
Relies on elliptic curves defined over a finite field to generate and verify signatures
Elliptical-Curve Digital Signature Algorithm (ECDSA)
Also referred to as endpoint detection and threat response
Endpoint Detection and Response (EDR)
Provides an added layer of protection by encrypting files or folders on various versions of the Microsoft Windows OS
Encrypted File System (EFS)
Date of an Operating System or Application is the date of which the device will no longer be actively supported
End of Life (EOL)
Occurs when software updates, patches, and other forms of support are no longer offered, resulting in software becoming prone to future security vulnerabilities
End of Service (EOS)
Is a software system that helps you run your entire business, supporting automation and processes in financial, human resources, manufacturing, supply chain, services, procurement, and more
Enterprise Resource Planning (ERP)
Created by the U.S. Federal Communications Commission (FCC) to uniquely identify mobile devices, form the days of AMPS in the United States starting in the early 1980’s
Electronic Serial Number (ESN)
Is a member of the Internet Protocol Security (IPsec) set of protocols that encrypt and authenticate the packets of data between computers using a Virtual Private Network (VPN)
Encapsulating Security Payload (ESP)
All access points within the set broadcast the same SSID to let connected devices recognize others as belongings to the same network
Extended Service Set Identifier (ESSID)
Is a table that informs a computer operating system of the access privileges a user has to a system object, including a single file or a file directory
File System Access Control List (FACL)
A security method for protecting sensitive data at the hardware level by encrypting all data on a disk drive
Full Disk Encryption (FDE)
It examines the integrity of sensitive files, registry keys, and folders within the host operating system and checks whether files have been altered or compromised by tracking logs and comparing the current version to a known baseline
File Integrity Monitoring (FIM)
Semiconductor devices that are based around a matrix of configurable logic blocks (CLBs) connected via programmable interconnects
Field Programmable Gate Array (FPGA)
Probability that the system fails to detect a match between the input fingerprint template and a matching template in the database
False Rejection Rate (FRR)
Is a standard network protocol used for the transfer of files from one host to another over a TCP-based on network, such as the internet
File Transfer Protocol (FTP)
Is a network protocol that enables secure and encrypted file transfers between a client and a server
Secured File Transfer Protocol (FTPS)
Is a block cipher mode of operations that uses universal hashing over a binary field to provide authenticated encryption
Galois/Counter Mode (GCM)
Governs how the personal data of individuals in the EU may be processed and transferred
General Data Protection Regulation (GDPR)
Is any open source version of PGP that allows you to sign and also encrypt a file or an email message
GNU Privacy Guard (GPG)
U.S. owned utility that provides users with positioning, navigation, and timing (PNT) services
Global Positioning System (GPS)
Is an electronic circuit that can perform mathematical calculations at high speed
Graphics Processing Unit (GPU)
Is the process of adding additional information when data is traveling in OSI or TCP/IP models
Generic Routing Encapsulation (GRE)
Describes systems that are dependable enough to operates continuously without failing
High Availability (HA)
Is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnetic material
Hard Disk Drive (HDD)
An intrusion detection system that monitors the computer infrastructure on which it is installed, analyzing traffic and logging malicious behavior
Host-Based Intrusion Detection System (HIDS)
An approach to security that relies on third-party software tools to identify and prevent malicious activities
Host-Based Intrusion Prevention System HIPS
Is a cryptographic authentication technique that uses a hash function and secret key.
Hash-Based Message Authentication Code (HMAC)
Is an event based OTP where the moving factor in each code is based on a counter. Each time is requested and validated, the moving factor is incremented based on a counter
HMAC-Based One Time Password (HOTP)
Are hardened, tamper-resistant hardware devices that secure cryptographic processes by generating, protecting, and managing keys used for encrypting and decrypting data and creating digital signatures and certificates
Hardware Security Module (HSM)
Is a subscription-based offering where customers can use a hardware security module in the cloud to generate, access, and protect their cryptographic key material, separately from sensitive data
Hardware Security Module as a Service (HSMaaS)
Is the data code that is used to structure a web page and its content
Hypertext Markup Language (HTML)
Is the secure version of HTTP, which is the primary protocol used to send data between a web browser and a website
Hypertext Transfer Protocol Secure (HTTPS)
A cloud computing model that provides on-demand access to computing resources such as servers, storage, networking, and virtualization
Infrastructure as a Service (IaaS)
Making sure that only the right people can access an organization’s data and resources
Identity and Access Management (IAM)
Is used for reporting errors and performing network diagnostics
Internet Control Message Protocol (ICMP)
Focuses on ensuring the security and safe function of industrial control systems
Industrial Control System (ICS)
Is a form of symmetric key block cipher encryption
International Data Encryption Algorithm (IDEA)
Is a free standing or wall-mounted rack for managing a interconnecting a telecommunications cable between end-user devices and the main distribution frame
Intermediate Distribution Frame (IDF)
Is a system that creates, stores and manages digital identities
Identity Provider (IdP)
A network security technology originally built for detecting vulnerability exploits against a target application or computer
Intrusion Detection System (IDS)
A security key management protocol that is used to set up a secure, authenticated communications channel between two devices
Internet Key Exchange (IKE)
A programming interface (API) from the IETF-that enables a user’s email program to access the mail server
Internet Message Access Protocol v4 (IMAP4)
Evidence left behind by an attacker or malicious software that can be used to identify a security incident
Indicators of Compromise (IoC)
The collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as between the devices themselves
Internet of Things (IoT)
A protocol, or set of rules, for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination
Internet Protocol (IP)
Is a network security tool (which can be hardware or software) that continuously monitors a network for malicious activity and takes action to prevent it, including reporting, blocking, or dropping it, when it does occur
Intrusion Prevention System (IPS)
Is the effort to quickly identify an attack, minimize its effects, contain damage, and remediate the cause to reduce the risk of future incidents
Incident Response (IR)
Is a text-based chat system for instant messaging
Internet Relay Chat (IRC)
Is a written document that helps your organization before, during and after a security incident
Incident Response Plan (IRP)
Is designed to sit between two or more points on the internal network to allow visibility, control and mitigation of traffic between those arguments
Internal Segmentation Firewall (ISFW)
Provides organizations with guidelines to consistently achieve university recognized standards
International Organization for Standardization (ISO)
A company that provides individuals and organizations access to the internet and other related services
Internet Service Provider (ISP)
Protects the IT infrastructure of companies, organizations, or agencies
Information Systems Security Officer (ISSO)
The plans, policies, procedures and technical measures that enable the recovery of IT operations after an unexpected incident
IT Contingency Plan (ITCP)
Is an input to a cryptographic primitive being used to provide the initial state
Initialization Vector (IV)
A part of a cryptosystem intended to reduce the risks inherent in exchanging keys
Key Distribution Center (KDC)
Is a virtual private network (VPN) protocol that creates a connection between your devices and a VPN server without encrypting your content
Layer 2 Tunneling Protocol (L2TP)
A computer network that links devices within a building or group of adjacent buildings
Local Area Network (LAN)
Helps users find data about organizations, persons, and more
Lightweight Directory Access Protocol (LDAP)
Is a proprietary wireless LAN authentication method developed by Cisco Systems
Lightweight Extensible Authentication Protocol (LEAP)
Is a cloud-based framework for the deployment of monitoring functionalities for various other services and applications within the cloud
Monitoring as a Service (MaaS)
The methods and protocols used to control access to a communication medium in a computer network
Media Access Control (MAC)
Provides coordination and control capabilities for an organization’s IT expert or team of administrators
Mobile Application Management (MAM)
Stores information on which primary partitions have been created on the hard disk so that it can then use this information to start the machine
Master Boot Record (MBR)
Is a cryptographic hash algorithm that can be used to create a 128-bit string value from an arbitrary length string
Message Digest 5 (MD5)
Is the main computer room for servers, hubs, routers, DSL’s, etc. to reside
Main Distribution Frame (MDF)
Is a proven methodology and toolset used to provide a workforce mobile productivity tools and applications while keeping corporate data secure
Mobile Device Management (MDF)
A multi-step account login process that requires users to enter more information than just a password
Multifactor Authentication (MFA)
Is a device that can perform multiple functions, such as printing, scanning, copying and faxing
Multifunction Device (MFD)
The use and development of computer systems that are able to learn and adapt without following explicit instructions, by algorithms and statistical models to analyze and draw inferences from patterns in data
Machine Learning (ML)