Comprehensive guide Chat GPT 2.0 Flashcards
AAL
Authentication Assurance Level - AAL levels define the strength of authentication methods used in systems.
AAA
Authentication, Authorization, and Accounting - A framework for managing user access and accounting for resource usage.
AES
Advanced Encryption Standard - AES is used to encrypt sensitive data stored in cloud services.
ACL
Access Control List - A router has an ACL that allows only specific IP addresses to access certain network resources.
APT
Advanced Persistent Threat - APTs are sophisticated attacks that gain unauthorized access and remain undetected.
BYOD
Bring Your Own Device - A BYOD policy allows employees to use personal devices for work purposes.
BIA
Business Impact Analysis - Identifies critical business functions and the impact of disruptions.
CIA Triad
Confidentiality, Integrity, and Availability - The three core principles of information security.
CASB
Cloud Access Security Broker - A software tool that acts as a mediator between cloud service users and providers.
CCL
Common Control Line - CCL is used to define shared controls within organizations to manage risk.
CISO
Chief Information Security Officer - The CISO is responsible for developing and implementing the company’s information security strategy.
CI/CD
Continuous Integration/Continuous Deployment - Practices that enhance software development and deployment security.
CVE
Common Vulnerabilities and Exposures - CVE identifiers help track vulnerabilities in software.
CVSS
Common Vulnerability Scoring System - CVSS scores help prioritize vulnerabilities based on their severity.
DNSSEC
Domain Name System Security Extensions - A suite of extensions that add security to the DNS protocol.
DLP
Data Loss Prevention - A DLP system detects and prevents the transfer of sensitive data outside the organization.
DDoS
Distributed Denial of Service - An attack that overwhelms a server with traffic, making it unavailable.
EAP
Extensible Authentication Protocol - An authentication framework frequently used in wireless networks.
EDR
Endpoint Detection and Response - EDR solutions provide real-time monitoring and data collection from endpoints.
FIM
File Integrity Monitoring - FIM detects unauthorized changes to files and alerts administrators.
FIPS
Federal Information Processing Standards - FIPS are mandatory for federal agencies to ensure security in IT systems.
Fuzzing
A technique used to discover vulnerabilities by inputting random data into software.
GPO
Group Policy Object - A feature in Windows that allows for centralized management of user and computer settings.
GDPR
General Data Protection Regulation - GDPR requires organizations to protect personal data and privacy for EU citizens.
HIDS
Host Intrusion Detection System - HIDS checks a host for signs of malicious activity and reports them to the admin.
HIPS
Host Intrusion Prevention System - HIPS protects individual devices from attacks by monitoring system behavior.
HSM
Hardware Security Module - A physical device used to manage and secure digital keys and perform encryption.
IMSI
International Mobile Subscriber Identity - A unique identifier for a mobile user, used in cellular networks.
Incident Response Steps
- Preparation 2. Detection 3. Containment 4. Eradication 5. Recovery 6. Lessons Learned
ISO
International Organization for Standardization - ISO 27001 outlines requirements for establishing an information security management system.
IDS
Intrusion Detection System - An IDS monitors network traffic for suspicious activities and alerts administrators.
IPS
Intrusion Prevention System - An IPS can block malicious traffic in real time, preventing attacks.
MDM
Mobile Device Management - MDM solutions allow organizations to manage and secure employees’ mobile devices.
MITM
Man-In-The-Middle - MITM attacks intercept communications between two parties to eavesdrop or alter messages.
NAC
Network Access Control - A solution that enforces security policies on devices accessing the network.
NIDS
Network Intrusion Detection System - NIDS monitors network traffic and alerts on suspicious behavior.
NIPS
Network Intrusion Prevention System - NIPS actively blocks potentially harmful traffic on the network.
NIST
National Institute of Standards and Technology - NIST provides guidelines for improving the security of information systems across various industries.
PSTN
Public Switched Telephone Network - The traditional circuit-switched telephone network used for public telecommunication.
PKI
Public Key Infrastructure - PKI is used to issue digital certificates that validate user identities.
RAT
Remote Access Trojan - Malware that allows unauthorized remote access to a victim’s computer.
RPO
Recovery Point Objective - A business aims for an RPO of one hour, meaning data loss should not exceed one hour’s worth of transactions.
RTO
Recovery Time Objective - The RTO defines how quickly a system should be restored after a failure.
RADIUS
Remote Authentication Dial-In User Service - RADIUS is used to manage access for remote users connecting to a network.
Ransomware
A type of malware that encrypts files and demands payment for the decryption key.
Replay Attack
An attack where valid data transmission is maliciously or fraudulently repeated or delayed.
SAML
Security Assertion Markup Language - A standard for exchanging authentication and authorization data.
Sandboxing
Running untested code or applications in a controlled environment to prevent harm to the host system.
SHA
Secure Hash Algorithm - SHA is used to ensure data integrity by generating a unique hash for data.
SIEM
Security Information and Event Management - SIEM systems aggregate and analyze log data to detect security incidents.
SOC
Security Operations Center - A SOC monitors and analyzes security events in real-time to respond to incidents.
SOAR
Security Orchestration, Automation, and Response - Integrates security tools and processes to improve response times.