Comprehensive guide Chat GPT Flashcards
Acronym
Definition
AAL
Authentication Assurance Level - AAL levels define the strength of authentication methods used in systems.
AAA
Authentication, Authorization, and Accounting - A framework for managing user access and accounting for resource usage.
AES
Advanced Encryption Standard - AES is used to encrypt sensitive data stored in cloud services.
ACL
Access Control List - A router has an ACL that allows only specific IP addresses to access certain network resources.
APT
Advanced Persistent Threat - APTs are sophisticated attacks that gain unauthorized access and remain undetected.
BYOD
Bring Your Own Device - A BYOD policy allows employees to use personal devices for work purposes.
BIA
Business Impact Analysis - Identifies critical business functions and the impact of disruptions.
CIA Triad
Confidentiality, Integrity, and Availability - The three core principles of information security.
CASB
Cloud Access Security Broker - A software tool that acts as a mediator between cloud service users and providers.
CCL
Common Control Line - CCL is used to define shared controls within organizations to manage risk.
CISO
Chief Information Security Officer - The CISO is responsible for developing and implementing the company’s information security strategy.
CI/CD
Continuous Integration/Continuous Deployment - Practices that enhance software development and deployment security.
CVE
Common Vulnerabilities and Exposures - CVE identifiers help track vulnerabilities in software.
CVSS
Common Vulnerability Scoring System - CVSS scores help prioritize vulnerabilities based on their severity.
DNSSEC
Domain Name System Security Extensions - A suite of extensions that add security to the DNS protocol.
DLP
Data Loss Prevention - A DLP system detects and prevents the transfer of sensitive data outside the organization.
DDoS
Distributed Denial of Service - An attack that overwhelms a server with traffic, making it unavailable.
EAP
Extensible Authentication Protocol - An authentication framework frequently used in wireless networks.
EDR
Endpoint Detection and Response - EDR solutions provide real-time monitoring and data collection from endpoints.
FIM
File Integrity Monitoring - FIM detects unauthorized changes to files and alerts administrators.
FIPS
Federal Information Processing Standards - FIPS are mandatory for federal agencies to ensure security in IT systems.
Fuzzing
A technique used to discover vulnerabilities by inputting random data into software.
GPO
Group Policy Object - A feature in Windows that allows for centralized management of user and computer settings.
GDPR
General Data Protection Regulation - GDPR requires organizations to protect personal data and privacy for EU citizens.
HIDS
Host Intrusion Detection System - HIDS checks a host for signs of malicious activity and reports them to the admin.
HIPS
Host Intrusion Prevention System - HIPS protects individual devices from attacks by monitoring system behavior.
HSM
Hardware Security Module - A physical device used to manage and secure digital keys and perform encryption.