Comprehensive guide Chat GPT Flashcards

1
Q

Acronym

A

Definition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAL

A

Authentication Assurance Level - AAL levels define the strength of authentication methods used in systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AAA

A

Authentication, Authorization, and Accounting - A framework for managing user access and accounting for resource usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A

Advanced Encryption Standard - AES is used to encrypt sensitive data stored in cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ACL

A

Access Control List - A router has an ACL that allows only specific IP addresses to access certain network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

APT

A

Advanced Persistent Threat - APTs are sophisticated attacks that gain unauthorized access and remain undetected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BYOD

A

Bring Your Own Device - A BYOD policy allows employees to use personal devices for work purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BIA

A

Business Impact Analysis - Identifies critical business functions and the impact of disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIA Triad

A

Confidentiality, Integrity, and Availability - The three core principles of information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CASB

A

Cloud Access Security Broker - A software tool that acts as a mediator between cloud service users and providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CCL

A

Common Control Line - CCL is used to define shared controls within organizations to manage risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CISO

A

Chief Information Security Officer - The CISO is responsible for developing and implementing the company’s information security strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CI/CD

A

Continuous Integration/Continuous Deployment - Practices that enhance software development and deployment security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CVE

A

Common Vulnerabilities and Exposures - CVE identifiers help track vulnerabilities in software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CVSS

A

Common Vulnerability Scoring System - CVSS scores help prioritize vulnerabilities based on their severity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DNSSEC

A

Domain Name System Security Extensions - A suite of extensions that add security to the DNS protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DLP

A

Data Loss Prevention - A DLP system detects and prevents the transfer of sensitive data outside the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DDoS

A

Distributed Denial of Service - An attack that overwhelms a server with traffic, making it unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

EAP

A

Extensible Authentication Protocol - An authentication framework frequently used in wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

EDR

A

Endpoint Detection and Response - EDR solutions provide real-time monitoring and data collection from endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

FIM

A

File Integrity Monitoring - FIM detects unauthorized changes to files and alerts administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

FIPS

A

Federal Information Processing Standards - FIPS are mandatory for federal agencies to ensure security in IT systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Fuzzing

A

A technique used to discover vulnerabilities by inputting random data into software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

GPO

A

Group Policy Object - A feature in Windows that allows for centralized management of user and computer settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

GDPR

A

General Data Protection Regulation - GDPR requires organizations to protect personal data and privacy for EU citizens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

HIDS

A

Host Intrusion Detection System - HIDS checks a host for signs of malicious activity and reports them to the admin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

HIPS

A

Host Intrusion Prevention System - HIPS protects individual devices from attacks by monitoring system behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

HSM

A

Hardware Security Module - A physical device used to manage and secure digital keys and perform encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

IMSI

A

International Mobile Subscriber Identity - A unique identifier for a mobile user, used in cellular networks.

30
Q

Incident Response Steps

A
  1. Preparation 2. Detection 3. Containment 4. Eradication 5. Recovery 6. Lessons Learned
31
Q

ISO

A

International Organization for Standardization - ISO 27001 outlines requirements for establishing an information security management system.

32
Q

IDS

A

Intrusion Detection System - An IDS monitors network traffic for suspicious activities and alerts administrators.

33
Q

IPS

A

Intrusion Prevention System - An IPS can block malicious traffic in real time, preventing attacks.

34
Q

MDM

A

Mobile Device Management - MDM solutions allow organizations to manage and secure employees’ mobile devices.

35
Q

MITM

A

Man-In-The-Middle - MITM attacks intercept communications between two parties to eavesdrop or alter messages.

36
Q

NAC

A

Network Access Control - A solution that enforces security policies on devices accessing the network.

37
Q

NIDS

A

Network Intrusion Detection System - NIDS monitors network traffic and alerts on suspicious behavior.

38
Q

NIPS

A

Network Intrusion Prevention System - NIPS actively blocks potentially harmful traffic on the network.

39
Q

NIST

A

National Institute of Standards and Technology - NIST provides guidelines for improving the security of information systems across various industries.

40
Q

PSTN

A

Public Switched Telephone Network - The traditional circuit-switched telephone network used for public telecommunication.

41
Q

PKI

A

Public Key Infrastructure - PKI is used to issue digital certificates that validate user identities.

42
Q

RAT

A

Remote Access Trojan - Malware that allows unauthorized remote access to a victim’s computer.

43
Q

RPO

A

Recovery Point Objective - A business aims for an RPO of one hour, meaning data loss should not exceed one hour’s worth of transactions.

44
Q

RTO

A

Recovery Time Objective - The RTO defines how quickly a system should be restored after a failure.

45
Q

RADIUS

A

Remote Authentication Dial-In User Service - RADIUS is used to manage access for remote users connecting to a network.

46
Q

Ransomware

A

A type of malware that encrypts files and demands payment for the decryption key.

47
Q

Replay Attack

A

An attack where valid data transmission is maliciously or fraudulently repeated or delayed.

48
Q

SAML

A

Security Assertion Markup Language - A standard for exchanging authentication and authorization data.

49
Q

Sandboxing

A

Running untested code or applications in a controlled environment to prevent harm to the host system.

50
Q

SHA

A

Secure Hash Algorithm - SHA is used to ensure data integrity by generating a unique hash for data.

51
Q

SIEM

A

Security Information and Event Management - SIEM systems aggregate and analyze log data to detect security incidents.

52
Q

SOC

A

Security Operations Center - A SOC monitors and analyzes security events in real-time to respond to incidents.

53
Q

SOAR

A

Security Orchestration, Automation, and Response - Integrates security tools and processes to improve response times.

54
Q

SPF

A

Sender Policy Framework - An email authentication method to prevent spoofing.

55
Q

SSL

A

Secure Sockets Layer - SSL certificates secure web traffic between a user’s browser and a web server.

56
Q

SSL/TLS

A

Secure Sockets Layer/Transport Layer Security - Protocols that encrypt data sent over the internet.

57
Q

TACACS+

A

Terminal Access Controller Access-Control System Plus - TACACS+ provides centralized authentication for network devices.

58
Q

TFA

A

Two-Factor Authentication - An extra layer of security requiring two forms of verification.

59
Q

TLS

A

Transport Layer Security - TLS encrypts data transmitted over the internet, securing online communications.

60
Q

TPM

A

Trusted Platform Module - A hardware chip that provides cryptographic functions to secure hardware.

61
Q

TTT

A

Tactics, Techniques, and Procedures - Understanding an attacker’s TTP helps in designing better defenses.

62
Q

USB

A

Universal Serial Bus - A standard for connecting devices that may pose security risks if not managed properly.

63
Q

VLAN

A

Virtual Local Area Network - A subgroup within a network that combines multiple physical networks.

64
Q

WAF

A

Web Application Firewall - A WAF protects web applications from common attacks like SQL injection.

65
Q

WEP

A

Wired Equivalent Privacy - An outdated wireless security protocol that is no longer considered secure.

66
Q

WPA

A

Wi-Fi Protected Access - A security protocol for wireless networks that is more secure than WEP.

67
Q

WPA2

A

Wi-Fi Protected Access 2 - An enhancement to WPA that uses AES encryption for improved security.

68
Q

XSS

A

Cross-Site Scripting - A vulnerability allowing attackers to inject scripts into web pages viewed by users.

69
Q

XSRF

A

Cross-Site Request Forgery - An attack that tricks a user into executing unwanted actions on a web application.

70
Q

Zero-Day

A

A vulnerability that is unknown to the vendor, with no patch available at the time of discovery.