CompTIA Sec+ SY0-701 Acronyms V1 Flashcards
AAA
Authentication, Authorization, and
Accounting
Definition: AAA is a framework for controlling access to computer resources. Authentication verifies the identity of users, authorization determines what actions users are allowed to perform, and accounting tracks user activity.
Scenario: In a corporate network, a user attempts to access a sensitive database. AAA processes verify the user’s credentials (authentication), checks if the user has permission to access the database (authorization), and logs the user’s activity (accounting).
ACL
Access Control List
Definition: An ACL is a list of rules that defines permissions or restrictions for access to resources.
Scenario: A network administrator configures an ACL on a router to specify which IP addresses are allowed to access a particular server. The ACL denies access to unauthorized IP addresses while permitting access to authorized ones.
AES
Advanced Encryption Standard
Definition: AES is a widely used encryption algorithm that secures sensitive data by transforming it into ciphertext.
Scenario: An organization encrypts its confidential files using AES before transmitting them over the internet. This ensures that even if the data is intercepted, it remains secure and unreadable without the decryption key.
AES-256
Advanced Encryption Standards 256-bit
Definition: AES-256 is a specific implementation of the Advanced Encryption Standard with a key length of 256 bits, providing a high level of security.
Scenario: A government agency encrypts classified documents using AES-256 to protect them from unauthorized access. The longer key length enhances the security of the encryption, making it more difficult to decrypt without the correct key.
AH
Authentication Header
Definition: AH is a protocol used in IPsec to provide data integrity and authentication for IP packets.
Scenario: A company establishes a VPN connection between two branch offices. AH is used to ensure that packets exchanged between the offices are not altered or tampered with during transit, providing data integrity and authentication.
AI
Artificial Intelligence
Definition: AI refers to computer systems that can perform tasks that typically require human intelligence, such as learning, problem-solving, and decision-making.
Scenario: A cybersecurity firm employs AI-powered algorithms to analyze network traffic and detect abnormal patterns indicative of potential cyber threats. The AI system helps identify and respond to security incidents in real-time, enhancing the organization’s overall security posture.
AIS
Automated Indicator Sharing
Definition: AIS is a system that facilitates the sharing of cybersecurity threat indicators and intelligence among organizations and government agencies.
Scenario: Multiple financial institutions participate in an AIS program to exchange information about recent cyber attacks and malware campaigns targeting the banking sector. By sharing threat indicators and tactics, these institutions can better defend against common adversaries.
ALE
Annualized Loss Expectancy
Definition: ALE is a risk management metric that calculates the expected financial loss from a security incident over a one-year period.
Scenario: A company assesses the potential impact of a data breach and calculates the ALE based on factors such as the probability of occurrence, the estimated cost of recovery, and the value of the assets at risk. The ALE helps the company prioritize security investments and allocate resources effectively.
AP
Access Point
Definition: An AP is a networking hardware device that allows wireless devices to connect to a wired network using Wi-Fi.
Scenario: A coffee shop installs multiple access points throughout its premises to provide customers with Wi-Fi access. Each access point serves as a gateway for users to connect their laptops, smartphones, and other devices to the internet wirelessly.
API
Application Programming Interface
Definition: An API is a set of rules and protocols that allows different software applications to communicate and interact with each other.
Scenario: A social media platform provides an API that allows third-party developers to integrate features such as user authentication, posting updates, and retrieving user data into their own applications. Developers leverage the API to build new functionalities and enhance the user experience of their applications.
APT
Advanced Persistent Threat
Definition: APT refers to a prolonged and targeted cyber attack in which an unauthorized user gains access to a network and remains undetected for an extended period. APT attackers often use sophisticated techniques to infiltrate systems and extract sensitive information.
Scenario: A nation-state-sponsored group launches an APT campaign targeting a government agency. The attackers use advanced malware and social engineering tactics to compromise employee credentials and gain access to classified information over several months without detection.
ARO
Annualized Rate of Occurrence
Definition: ARO is a risk management metric that estimates the frequency with which a specific threat or event is expected to occur within a given timeframe, typically one year.
Scenario: A financial institution calculates the ARO for a potential data breach resulting from phishing attacks targeting its employees. Based on historical data and threat intelligence, the institution determines that the ARO for such incidents is approximately four times per year, allowing it to assess the likelihood and potential impact of future breaches.
ARP
Address Resolution Protocol
Definition: ARP is a communication protocol used to map IP addresses to physical MAC addresses within a local area network (LAN).
Scenario: When a device on a LAN needs to communicate with another device, it sends an ARP request to obtain the MAC address corresponding to the destination IP address. The ARP protocol facilitates the resolution of IP addresses to MAC addresses, enabling devices to communicate effectively within the network.
ASLR
Address Space Layout Randomization
Definition: ASLR is a security technique that randomizes the memory layout of software processes to mitigate the risk of memory-based attacks, such as buffer overflows and code injection.
Scenario: An operating system incorporates ASLR as a defense mechanism against exploit attempts by malicious actors. By randomizing the memory addresses of executable code and libraries, ASLR makes it difficult for attackers to predict the location of vulnerable functions and execute successful attacks.
ATT&CK
Adversarial Tactics, Techniques, and
Common Knowledge
Definition: ATT&CK is a knowledge base maintained by MITRE that documents common tactics, techniques, and procedures (TTPs) used by cyber adversaries during various stages of the cyber kill chain.
Scenario: A cybersecurity analyst references the ATT&CK framework to analyze recent cyber attacks targeting organizations in the healthcare sector. By correlating observed TTPs with entries in the ATT&CK matrix, the analyst gains insights into the behavior and strategies of threat actors, informing defensive measures and incident response strategies.
AUP
Acceptable Use Policy
Definition: AUP is a set of rules and guidelines established by an organization to define acceptable behaviors and practices regarding the use of its information technology resources.
Scenario: A company implements an AUP to govern the use of corporate email accounts and internet access by employees. The policy outlines prohibited activities, such as accessing inappropriate websites or sending unsolicited emails, and specifies disciplinary measures for violations.
AV
Antivirus
Definition: AV refers to software designed to detect, prevent, and remove malicious software (malware) from computer systems.
Scenario: A user installs antivirus software on their personal computer to protect against viruses, worms, Trojans, and other forms of malware. The antivirus program scans files, emails, and web downloads for suspicious patterns and behavior, quarantining or deleting identified threats to safeguard the system.
BASH
Bourne Again Shell
Definition: BASH is a command-line shell and scripting language commonly used in Unix-based operating systems, including Linux.
Scenario: A system administrator writes BASH scripts to automate routine tasks, such as file management, system monitoring, and software installation, on a Linux server. BASH provides powerful scripting capabilities, allowing administrators to streamline workflows and maintain system efficiency.
BCP
Business Continuity Planning
Definition: BCP is a proactive process that organizations undertake to ensure the resilience of critical business functions and minimize the impact of disruptions or disasters.
Scenario: A financial services firm develops a comprehensive BCP framework to prepare for potential disruptions, such as natural disasters, cyber attacks, or infrastructure failures. The BCP includes risk assessments, continuity strategies, recovery plans, and regular testing to maintain operational resilience and protect against business interruptions.
BGP
Border Gateway Protocol
Definition: BGP is a standardized exterior gateway protocol used to facilitate the exchange of routing information between autonomous systems (ASes) on the internet.
Scenario: Internet service providers (ISPs) use BGP to establish and maintain routing tables that guide the forwarding of data packets across the global internet infrastructure. BGP enables dynamic routing updates and route optimization, ensuring efficient and reliable data transmission between networks.
BIA
Business Impact Analysis
Definition: BIA is a process used to identify and assess the potential impacts of disruptions to business operations, including financial losses, operational downtime, and reputational damage.
Scenario: A manufacturing company conducts a BIA to evaluate the consequences of equipment failures, supply chain disruptions, and natural disasters on its production capabilities. By analyzing critical business processes and dependencies, the company identifies mitigation strategies and recovery priorities to minimize the impact of disruptions on its operations.
BIOS
Basic Input/Output System
Definition: BIOS is firmware embedded in computer hardware that initializes hardware components and provides basic input/output services during the boot process.
Scenario: When a user turns on a computer, the BIOS conducts a series of hardware tests and initializes system components, such as the CPU, memory, and storage devices. The BIOS then loads the operating system from the boot device, enabling the computer to start up and execute user applications.
BPA
Business Partners Agreement
Definition: BPA is a contractual agreement between business partners that defines the terms, conditions, and expectations governing their collaborative relationship.
Scenario: Two companies enter into a BPA to formalize their partnership for joint product development and marketing initiatives. The agreement outlines each party’s responsibilities, intellectual property rights, revenue-sharing arrangements, and dispute resolution mechanisms, fostering transparency and mutual trust in the partnership.
BPDU
Bridge Protocol Data Unit
Definition: BPDU is a data frame used in spanning tree protocol (STP) to exchange information between network switches and prevent network loops.
Scenario: In a switched network topology, network switches exchange BPDUs to elect a root bridge and calculate the most efficient spanning tree topology. BPDUs contain information about switch priorities, port costs, and topology changes, enabling switches to dynamically adapt to network topology changes and prevent broadcast storms.
BYOD
Bring Your Own Device
Definition: BYOD refers to a policy that allows employees to use their personal mobile devices, such as smartphones, tablets, and laptops, to access corporate networks and resources.
Scenario: A company implements a BYOD policy to accommodate employee preferences for using personal devices for work-related tasks. Employees enroll their devices in the company’s mobile device management (MDM) system, which applies security policies, such as device encryption, remote wipe, and application whitelisting, to protect corporate data and enforce compliance with security standards.
CA
Certificate Authority
Definition: CA is a trusted entity that issues digital certificates used to verify the identity of users, devices, and organizations in public key infrastructure (PKI) systems.
Scenario: A CA issues SSL/TLS certificates to website operators to authenticate their identities and encrypt data transmitted between web browsers and servers. The CA’s digital signature on the certificate ensures the integrity and authenticity of the website, providing users with confidence in the security of their online interactions.
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
Definition: CAPTCHA is a challenge-response test designed to distinguish between human users and automated bots by requiring users to complete a task that is easy for humans but difficult for computers.
Scenario: When creating an online account or submitting a web form, users may encounter a CAPTCHA prompt asking them to identify distorted characters, select images containing specific objects, or solve simple puzzles. CAPTCHA helps prevent automated bots from abusing online services, such as spamming forums, creating fake accounts, or conducting credential stuffing attacks.