CompTIA Sec+ SY0-701 Acronyms V2 Flashcards
DRP
Disaster Recovery Plan
Definition: DRP is a documented set of procedures and policies designed to recover and restore IT infrastructure, data, and operations after a disruptive event or disaster.
Scenario: A company implements a DRP to mitigate the impact of unforeseen disasters, such as natural calamities, cyber attacks, or equipment failures, on its business operations. The DRP outlines roles and responsibilities, recovery objectives, backup and restoration procedures, and communication protocols to ensure continuity of critical services and minimize downtime during recovery efforts.
DSA
Digital Signature Algorithm
Definition: DSA is a cryptographic algorithm used for generating and verifying digital signatures to ensure the authenticity, integrity, and non-repudiation of electronic documents and messages.
Scenario: A government agency uses DSA to sign and authenticate digital documents, contracts, and electronic communications exchanged with citizens, businesses, and other government entities. DSA helps prevent tampering, forgery, and unauthorized alterations to digital records, providing assurance of document integrity and legal validity.
DSL
Digital Subscriber Line
Definition: DSL is a broadband internet connection technology that uses existing telephone lines to transmit high-speed data signals for internet access.
Scenario: A residential user subscribes to DSL broadband service from a telecommunications provider to connect their home computer, smart devices, and streaming media players to the internet. DSL technology enables the user to browse the web, stream video content, and participate in online activities with faster download and upload speeds compared to traditional dial-up connections.
EAP
Extensible Authentication Protocol
Definition: EAP is an authentication framework used in wireless networks and point-to-point connections to enable diverse authentication methods, such as passwords, digital certificates, and token-based authentication.
Scenario: A corporate Wi-Fi network employs EAP to authenticate employee devices and users before granting access to network resources and services. EAP supports multiple authentication protocols, such as EAP-TLS (Transport Layer Security) and EAP-PEAP (Protected Extensible Authentication Protocol), allowing organizations to enforce strong authentication and encryption standards for wireless communications.
ECB
Electronic Code Book
Definition: ECB is a mode of operation for block ciphers that encrypts each block of plaintext data independently, resulting in identical ciphertext blocks for identical plaintext blocks.
Scenario: An application encrypts sensitive files using the AES encryption algorithm in ECB mode before storing them on disk or transmitting them over a network. Despite its simplicity, ECB mode is susceptible to certain cryptographic attacks, such as plaintext patterns and block replays, making it less secure than other encryption modes such as CBC (Cipher Block Chaining) or CTR (Counter Mode).
ECC
Elliptic Curve Cryptography
Definition: ECC is a public-key cryptography algorithm that uses elliptic curves over finite fields to generate cryptographic keys and perform encryption, decryption, digital signatures, and key exchange operations.
Scenario: A mobile messaging application implements ECC to secure end-to-end communication between users by generating ephemeral key pairs and elliptic curve parameters for key agreement and message encryption. ECC offers strong cryptographic security with shorter key lengths and faster computational efficiency compared to traditional algorithms like RSA.
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
Definition: ECDHE is a variant of the Diffie-Hellman key exchange algorithm that uses elliptic curve cryptography to establish a shared secret key between communicating parties for secure data transmission.
Scenario: A web server and client negotiate a secure TLS/SSL connection using ECDHE for key exchange during the initial handshake. ECDHE enables forward secrecy by generating ephemeral key pairs for each session, ensuring that past session keys remain secure even if long-term private keys are compromised.
ECDSA
Elliptic Curve Digital Signature Algorithm
Definition: ECDSA is a digital signature algorithm based on elliptic curve cryptography used to generate and verify digital signatures for electronic documents and messages.
Scenario: An e-commerce platform uses ECDSA to sign and authenticate online transactions and payment requests initiated by customers using digital wallets or credit cards. ECDSA ensures transaction integrity and non-repudiation by associating unique digital signatures with each transaction, preventing fraud, chargebacks, and disputes.
EDR
Endpoint Detection and Response
Definition: EDR is a cybersecurity technology that monitors and analyzes endpoint devices, such as desktops, laptops, and servers, for signs of malicious activity, unauthorized access, and security breaches.
Scenario: A security operations center (SOC) deploys EDR agents on endpoints across the organization’s network to collect telemetry data, detect suspicious behavior, and respond to security incidents in real-time. EDR solutions provide visibility into endpoint activities, facilitate threat hunting, and automate incident response workflows to enhance the organization’s overall security posture.
EFS
Encrypted File System
Definition: EFS is a feature in Microsoft Windows operating systems that encrypts files and folders stored on NTFS volumes to protect data against unauthorized access and disclosure.
Scenario: A user enables EFS encryption on sensitive documents and files containing confidential information, such as financial records, intellectual property, and personal data. EFS uses public-key cryptography to encrypt files with a unique file encryption key (FEK), which is then encrypted with the user’s public key and stored in the file’s metadata, ensuring data confidentiality and access control.
ERP
Enterprise Resource Planning
Definition: ERP is a business management software system that integrates core business processes, such as finance, human resources, supply chain, inventory, and customer relationship management, into a centralized platform.
Scenario: A multinational corporation deploys an ERP system to streamline and automate business operations across its global subsidiaries and departments. The ERP platform provides real-time visibility into key performance indicators, facilitates data-driven decision-making, and optimizes resource allocation to improve operational efficiency, productivity, and customer satisfaction.
ESN
Electronic Serial Number
Definition: ESN is a unique identifier assigned to mobile devices, such as cell phones and smartphones, to identify and authenticate devices on cellular networks.
Scenario: Mobile network operators use ESNs to track and manage device registrations, activations, and subscriptions on their networks. ESNs are stored in the device’s firmware and transmitted to the network during registration and authentication processes to validate device ownership and authorize network access.
ESP
Encapsulated Security Payload
Definition: ESP is a protocol used in IPsec (Internet Protocol Security) to provide confidentiality, integrity, and authentication for data packets transmitted over IP networks.
Scenario: Two routers establish an IPsec VPN tunnel between them using ESP to encrypt and protect sensitive data traffic flowing between corporate branch offices over the internet. ESP encapsulates IP packets with additional header and trailer fields containing cryptographic parameters and authentication information, ensuring secure transmission and delivery of data payloads.
FACL
File System Access Control List
Definition: FACL is a security mechanism used in Unix-like operating systems to define access permissions and control user and group privileges on files and directories using access control lists (ACLs).
Scenario: A system administrator configures FACLs on critical system files and directories to restrict access permissions and enforce security policies based on user roles, groups, and file attributes. FACLs allow granular control over file permissions, enabling administrators to specify read, write, and execute permissions for individual users and groups, enhancing file system security and data protection.
FDE
Full Disk Encryption
Definition: FDE is a data protection method that encrypts the entire storage device, such as a hard disk drive (HDD) or solid-state drive (SSD), to prevent unauthorized access to data stored on the disk.
Scenario: An organization deploys FDE software on company-issued laptops to encrypt the entire disk drive, including the operating system, applications, and user data. With FDE enabled, even if a laptop is lost or stolen, the encrypted data remains inaccessible without the decryption key, safeguarding sensitive information from unauthorized disclosure.
FIM
File Integrity Management:
Definition: FIM is a security technology that monitors and verifies the integrity of files and system configurations by comparing current states with predefined baselines or cryptographic checksums.
Scenario: A financial institution implements FIM software to monitor critical system files, directories, and configuration settings for unauthorized changes or tampering attempts. FIM agents continuously scan file attributes, permissions, and content hashes to detect anomalies and potential security breaches, helping to maintain data integrity and compliance with regulatory requirements.
FPGA
Field Programmable Gate Array
Definition: FPGA is an integrated circuit device that can be programmed and configured to perform specific logic functions and tasks, making it highly flexible and adaptable for various applications.
Scenario: A telecommunications company uses FPGAs to implement custom signal processing algorithms and protocols in network equipment, such as routers, switches, and base stations. FPGAs offer hardware acceleration capabilities and low-latency processing, enabling high-speed data transmission, network optimization, and protocol conversion in demanding telecommunications environments.
FRR
False Rejection Rate
Definition: FRR is a biometric authentication metric that measures the rate at which legitimate users are incorrectly rejected or denied access during the authentication process.
Scenario: A biometric access control system deployed at a secure facility uses fingerprint recognition technology to authenticate employees and grant access to restricted areas. The system calculates the FRR by comparing the number of valid fingerprint scans rejected by the system against the total number of legitimate access attempts, helping administrators fine-tune system parameters and improve user experience.
FTPS
Secured File Transfer Protocol
Definition: FTPS is an extension of FTP that adds support for Transport Layer Security (TLS) or Secure Sockets Layer (SSL) encryption to secure file transfers over untrusted networks.
Scenario: A financial institution employs FTPS to transmit sensitive financial data, customer records, and transaction logs securely between branch offices, data centers, and external partners. FTPS encrypts file transfers using strong cryptographic algorithms and digital certificates, ensuring data confidentiality and integrity during transit and storage.
FTP
File Transfer Protocol
Definition: FTP is a standard network protocol used for transferring files between a client and a server on a computer network.
Scenario: An IT administrator uses FTP to upload software patches, configuration files, and system updates to remote servers and network devices. FTP clients connect to FTP servers using TCP/IP connections to exchange files using commands such as PUT, GET, and LIST, facilitating efficient file management and data synchronization across distributed systems.
GCM
Galois Counter Mode
Definition: GCM is an authenticated encryption mode of operation that combines the Counter Mode (CTR) for encryption with Galois/Counter Mode (GCM) for authentication, providing both confidentiality and integrity protection for data.
Scenario: A cloud storage service uses GCM to encrypt and authenticate data stored in distributed storage clusters and data centers. GCM encrypts data blocks with a unique initialization vector (IV) and authentication tag, enabling data deduplication, compression, and encryption at rest while ensuring data integrity and protection against tampering and unauthorized access.
GDPR
General Data Protection Regulation
Definition: GDPR is a comprehensive data protection and privacy regulation enacted by the European Union (EU) to safeguard the rights and privacy of individuals’ personal data and regulate its processing and transfer.
Scenario: A multinational corporation operating in the EU implements GDPR compliance measures to protect customer data, employee records, and sensitive business information from unauthorized access, disclosure, and misuse. GDPR mandates organizations to obtain explicit consent for data processing, implement data protection measures, and report data breaches to regulatory authorities to ensure accountability and transparency in data handling practices.
GPG
Gnu Privacy Guard
Definition: GPG is an open-source implementation of the Pretty Good Privacy (PGP) encryption software used for encrypting, decrypting, and digitally signing electronic communications and files.
Scenario: A software developer uses GPG to sign and encrypt software releases, source code repositories, and communication channels to protect intellectual property and secure collaboration with contributors and users. GPG integrates with email clients, version control systems, and command-line utilities to provide end-to-end encryption and cryptographic verification of digital assets.
GPO
Group Policy Object
Definition: GPO is a collection of settings and configurations that define the behavior and security policies applied to user accounts and computer systems in a Windows Active Directory environment.
Scenario: An IT administrator creates GPOs to enforce security settings, software installation policies, and user access controls across domain-joined computers and network resources in an enterprise network. GPOs enable centralized management, enforcement, and enforcement of security policies, ensuring compliance with organizational standards and regulatory requirements.