Comprehensive guide Flashcards
Acronym
Definition
AAA
Authentication
ACL
Access Control List - A router has an ACL that allows only specific IP addresses to access certain network resources.
AES
Advanced Encryption Standard - AES is used to encrypt sensitive data stored in cloud services.
CIA
Confidentiality
DLP
Data Loss Prevention - A DLP system detects and prevents the transfer of sensitive data outside the organization.
IDS
Intrusion Detection System - An IDS monitors network traffic for suspicious activities and alerts administrators.
IPS
Intrusion Prevention System - An IPS can block malicious traffic in real time
MFA
Multi-Factor Authentication - A user logs into an account using a password and a one-time code sent to their phone.
PKI
Public Key Infrastructure - PKI is used to issue digital certificates that validate user identities.
VPN
Virtual Private Network - Employees use a VPN to securely connect to the company’s internal network from remote locations.
SIEM
Security Information and Event Management - SIEM systems aggregate and analyze log data to detect security incidents.
SSO
Single Sign-On - With SSO
RADIUS
Remote Authentication Dial-In User Service - RADIUS is used to manage access for remote users connecting to a network.
TACACS+
Terminal Access Controller Access-Control System Plus - TACACS+ provides centralized authentication for network devices.
TLS
Transport Layer Security - TLS encrypts data transmitted over the internet
SSL
Secure Sockets Layer - SSL certificates secure web traffic between a user’s browser and a web server.
WAF
Web Application Firewall - A WAF protects web applications from common attacks like SQL injection.
BYOD
Bring Your Own Device - A BYOD policy allows employees to use personal devices for work purposes.
NIDS
Network Intrusion Detection System - NIDS monitors network traffic and alerts on suspicious behavior.
NIPS
Network Intrusion Prevention System - NIPS actively blocks potentially harmful traffic on the network.
SOC
Security Operations Center - A SOC monitors and analyzes security events in real-time to respond to incidents.
FIM
File Integrity Monitoring - FIM detects unauthorized changes to files and alerts administrators.
RPO
Recovery Point Objective - A business aims for an RPO of one hour
RTO
Recovery Time Objective - The RTO defines how quickly a system should be restored after a failure.
HIPS
Host Intrusion Prevention System - HIPS protects individual devices from attacks by monitoring system behavior.
HIDS
Host Intrusion Detection System - HIDS checks a host for signs of malicious activity and reports them to the admin.
GDPR
General Data Protection Regulation - GDPR requires organizations to protect personal data and privacy for EU citizens.
CISO
Chief Information Security Officer - The CISO is responsible for developing and implementing the company’s information security strategy.
CSIRT
Computer Security Incident Response Team - A CSIRT is tasked with responding to and managing security incidents.
MDM
Mobile Device Management - MDM solutions allow organizations to manage and secure employees’ mobile devices.
APT
Advanced Persistent Threat - APTs are sophisticated attacks that gain unauthorized access and remain undetected.
CCL
Common Control Line - CCL is used to define shared controls within organizations to manage risk.
CVE
Common Vulnerabilities and Exposures - CVE identifiers help track vulnerabilities in software.
CVSS
Common Vulnerability Scoring System - CVSS scores help prioritize vulnerabilities based on their severity.