{ "@context": "https://schema.org", "@type": "Organization", "name": "Brainscape", "url": "https://www.brainscape.com/", "logo": "https://www.brainscape.com/pks/images/cms/public-views/shared/Brainscape-logo-c4e172b280b4616f7fda.svg", "sameAs": [ "https://www.facebook.com/Brainscape", "https://x.com/brainscape", "https://www.linkedin.com/company/brainscape", "https://www.instagram.com/brainscape/", "https://www.tiktok.com/@brainscapeu", "https://www.pinterest.com/brainscape/", "https://www.youtube.com/@BrainscapeNY" ], "contactPoint": { "@type": "ContactPoint", "telephone": "(929) 334-4005", "contactType": "customer service", "availableLanguage": ["English"] }, "founder": { "@type": "Person", "name": "Andrew Cohen" }, "description": "Brainscape’s spaced repetition system is proven to DOUBLE learning results! Find, make, and study flashcards online or in our mobile app. Serious learners only.", "address": { "@type": "PostalAddress", "streetAddress": "159 W 25th St, Ste 517", "addressLocality": "New York", "addressRegion": "NY", "postalCode": "10001", "addressCountry": "USA" } }

Comprehensive guide Chat GPT Flashcards

(70 cards)

1
Q

Acronym

A

Definition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAL

A

Authentication Assurance Level - AAL levels define the strength of authentication methods used in systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AAA

A

Authentication, Authorization, and Accounting - A framework for managing user access and accounting for resource usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A

Advanced Encryption Standard - AES is used to encrypt sensitive data stored in cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ACL

A

Access Control List - A router has an ACL that allows only specific IP addresses to access certain network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

APT

A

Advanced Persistent Threat - APTs are sophisticated attacks that gain unauthorized access and remain undetected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BYOD

A

Bring Your Own Device - A BYOD policy allows employees to use personal devices for work purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BIA

A

Business Impact Analysis - Identifies critical business functions and the impact of disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIA Triad

A

Confidentiality, Integrity, and Availability - The three core principles of information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CASB

A

Cloud Access Security Broker - A software tool that acts as a mediator between cloud service users and providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CCL

A

Common Control Line - CCL is used to define shared controls within organizations to manage risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CISO

A

Chief Information Security Officer - The CISO is responsible for developing and implementing the company’s information security strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CI/CD

A

Continuous Integration/Continuous Deployment - Practices that enhance software development and deployment security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CVE

A

Common Vulnerabilities and Exposures - CVE identifiers help track vulnerabilities in software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CVSS

A

Common Vulnerability Scoring System - CVSS scores help prioritize vulnerabilities based on their severity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DNSSEC

A

Domain Name System Security Extensions - A suite of extensions that add security to the DNS protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DLP

A

Data Loss Prevention - A DLP system detects and prevents the transfer of sensitive data outside the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DDoS

A

Distributed Denial of Service - An attack that overwhelms a server with traffic, making it unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

EAP

A

Extensible Authentication Protocol - An authentication framework frequently used in wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

EDR

A

Endpoint Detection and Response - EDR solutions provide real-time monitoring and data collection from endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

FIM

A

File Integrity Monitoring - FIM detects unauthorized changes to files and alerts administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

FIPS

A

Federal Information Processing Standards - FIPS are mandatory for federal agencies to ensure security in IT systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Fuzzing

A

A technique used to discover vulnerabilities by inputting random data into software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

GPO

A

Group Policy Object - A feature in Windows that allows for centralized management of user and computer settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
GDPR
General Data Protection Regulation - GDPR requires organizations to protect personal data and privacy for EU citizens.
26
HIDS
Host Intrusion Detection System - HIDS checks a host for signs of malicious activity and reports them to the admin.
27
HIPS
Host Intrusion Prevention System - HIPS protects individual devices from attacks by monitoring system behavior.
28
HSM
Hardware Security Module - A physical device used to manage and secure digital keys and perform encryption.
29
IMSI
International Mobile Subscriber Identity - A unique identifier for a mobile user, used in cellular networks.
30
Incident Response Steps
1. Preparation 2. Detection 3. Containment 4. Eradication 5. Recovery 6. Lessons Learned
31
ISO
International Organization for Standardization - ISO 27001 outlines requirements for establishing an information security management system.
32
IDS
Intrusion Detection System - An IDS monitors network traffic for suspicious activities and alerts administrators.
33
IPS
Intrusion Prevention System - An IPS can block malicious traffic in real time, preventing attacks.
34
MDM
Mobile Device Management - MDM solutions allow organizations to manage and secure employees' mobile devices.
35
MITM
Man-In-The-Middle - MITM attacks intercept communications between two parties to eavesdrop or alter messages.
36
NAC
Network Access Control - A solution that enforces security policies on devices accessing the network.
37
NIDS
Network Intrusion Detection System - NIDS monitors network traffic and alerts on suspicious behavior.
38
NIPS
Network Intrusion Prevention System - NIPS actively blocks potentially harmful traffic on the network.
39
NIST
National Institute of Standards and Technology - NIST provides guidelines for improving the security of information systems across various industries.
40
PSTN
Public Switched Telephone Network - The traditional circuit-switched telephone network used for public telecommunication.
41
PKI
Public Key Infrastructure - PKI is used to issue digital certificates that validate user identities.
42
RAT
Remote Access Trojan - Malware that allows unauthorized remote access to a victim's computer.
43
RPO
Recovery Point Objective - A business aims for an RPO of one hour, meaning data loss should not exceed one hour’s worth of transactions.
44
RTO
Recovery Time Objective - The RTO defines how quickly a system should be restored after a failure.
45
RADIUS
Remote Authentication Dial-In User Service - RADIUS is used to manage access for remote users connecting to a network.
46
Ransomware
A type of malware that encrypts files and demands payment for the decryption key.
47
Replay Attack
An attack where valid data transmission is maliciously or fraudulently repeated or delayed.
48
SAML
Security Assertion Markup Language - A standard for exchanging authentication and authorization data.
49
Sandboxing
Running untested code or applications in a controlled environment to prevent harm to the host system.
50
SHA
Secure Hash Algorithm - SHA is used to ensure data integrity by generating a unique hash for data.
51
SIEM
Security Information and Event Management - SIEM systems aggregate and analyze log data to detect security incidents.
52
SOC
Security Operations Center - A SOC monitors and analyzes security events in real-time to respond to incidents.
53
SOAR
Security Orchestration, Automation, and Response - Integrates security tools and processes to improve response times.
54
SPF
Sender Policy Framework - An email authentication method to prevent spoofing.
55
SSL
Secure Sockets Layer - SSL certificates secure web traffic between a user’s browser and a web server.
56
SSL/TLS
Secure Sockets Layer/Transport Layer Security - Protocols that encrypt data sent over the internet.
57
TACACS+
Terminal Access Controller Access-Control System Plus - TACACS+ provides centralized authentication for network devices.
58
TFA
Two-Factor Authentication - An extra layer of security requiring two forms of verification.
59
TLS
Transport Layer Security - TLS encrypts data transmitted over the internet, securing online communications.
60
TPM
Trusted Platform Module - A hardware chip that provides cryptographic functions to secure hardware.
61
TTT
Tactics, Techniques, and Procedures - Understanding an attacker’s TTP helps in designing better defenses.
62
USB
Universal Serial Bus - A standard for connecting devices that may pose security risks if not managed properly.
63
VLAN
Virtual Local Area Network - A subgroup within a network that combines multiple physical networks.
64
WAF
Web Application Firewall - A WAF protects web applications from common attacks like SQL injection.
65
WEP
Wired Equivalent Privacy - An outdated wireless security protocol that is no longer considered secure.
66
WPA
Wi-Fi Protected Access - A security protocol for wireless networks that is more secure than WEP.
67
WPA2
Wi-Fi Protected Access 2 - An enhancement to WPA that uses AES encryption for improved security.
68
XSS
Cross-Site Scripting - A vulnerability allowing attackers to inject scripts into web pages viewed by users.
69
XSRF
Cross-Site Request Forgery - An attack that tricks a user into executing unwanted actions on a web application.
70
Zero-Day
A vulnerability that is unknown to the vendor, with no patch available at the time of discovery.