CompTIA Sec+ SY0-701 Acronyms V2 Flashcards
DRP
Disaster Recovery Plan
Definition: DRP is a documented set of procedures and policies designed to recover and restore IT infrastructure, data, and operations after a disruptive event or disaster.
Scenario: A company implements a DRP to mitigate the impact of unforeseen disasters, such as natural calamities, cyber attacks, or equipment failures, on its business operations. The DRP outlines roles and responsibilities, recovery objectives, backup and restoration procedures, and communication protocols to ensure continuity of critical services and minimize downtime during recovery efforts.
DSA
Digital Signature Algorithm
Definition: DSA is a cryptographic algorithm used for generating and verifying digital signatures to ensure the authenticity, integrity, and non-repudiation of electronic documents and messages.
Scenario: A government agency uses DSA to sign and authenticate digital documents, contracts, and electronic communications exchanged with citizens, businesses, and other government entities. DSA helps prevent tampering, forgery, and unauthorized alterations to digital records, providing assurance of document integrity and legal validity.
DSL
Digital Subscriber Line
Definition: DSL is a broadband internet connection technology that uses existing telephone lines to transmit high-speed data signals for internet access.
Scenario: A residential user subscribes to DSL broadband service from a telecommunications provider to connect their home computer, smart devices, and streaming media players to the internet. DSL technology enables the user to browse the web, stream video content, and participate in online activities with faster download and upload speeds compared to traditional dial-up connections.
EAP
Extensible Authentication Protocol
Definition: EAP is an authentication framework used in wireless networks and point-to-point connections to enable diverse authentication methods, such as passwords, digital certificates, and token-based authentication.
Scenario: A corporate Wi-Fi network employs EAP to authenticate employee devices and users before granting access to network resources and services. EAP supports multiple authentication protocols, such as EAP-TLS (Transport Layer Security) and EAP-PEAP (Protected Extensible Authentication Protocol), allowing organizations to enforce strong authentication and encryption standards for wireless communications.
ECB
Electronic Code Book
Definition: ECB is a mode of operation for block ciphers that encrypts each block of plaintext data independently, resulting in identical ciphertext blocks for identical plaintext blocks.
Scenario: An application encrypts sensitive files using the AES encryption algorithm in ECB mode before storing them on disk or transmitting them over a network. Despite its simplicity, ECB mode is susceptible to certain cryptographic attacks, such as plaintext patterns and block replays, making it less secure than other encryption modes such as CBC (Cipher Block Chaining) or CTR (Counter Mode).
ECC
Elliptic Curve Cryptography
Definition: ECC is a public-key cryptography algorithm that uses elliptic curves over finite fields to generate cryptographic keys and perform encryption, decryption, digital signatures, and key exchange operations.
Scenario: A mobile messaging application implements ECC to secure end-to-end communication between users by generating ephemeral key pairs and elliptic curve parameters for key agreement and message encryption. ECC offers strong cryptographic security with shorter key lengths and faster computational efficiency compared to traditional algorithms like RSA.
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
Definition: ECDHE is a variant of the Diffie-Hellman key exchange algorithm that uses elliptic curve cryptography to establish a shared secret key between communicating parties for secure data transmission.
Scenario: A web server and client negotiate a secure TLS/SSL connection using ECDHE for key exchange during the initial handshake. ECDHE enables forward secrecy by generating ephemeral key pairs for each session, ensuring that past session keys remain secure even if long-term private keys are compromised.
ECDSA
Elliptic Curve Digital Signature Algorithm
Definition: ECDSA is a digital signature algorithm based on elliptic curve cryptography used to generate and verify digital signatures for electronic documents and messages.
Scenario: An e-commerce platform uses ECDSA to sign and authenticate online transactions and payment requests initiated by customers using digital wallets or credit cards. ECDSA ensures transaction integrity and non-repudiation by associating unique digital signatures with each transaction, preventing fraud, chargebacks, and disputes.
EDR
Endpoint Detection and Response
Definition: EDR is a cybersecurity technology that monitors and analyzes endpoint devices, such as desktops, laptops, and servers, for signs of malicious activity, unauthorized access, and security breaches.
Scenario: A security operations center (SOC) deploys EDR agents on endpoints across the organization’s network to collect telemetry data, detect suspicious behavior, and respond to security incidents in real-time. EDR solutions provide visibility into endpoint activities, facilitate threat hunting, and automate incident response workflows to enhance the organization’s overall security posture.
EFS
Encrypted File System
Definition: EFS is a feature in Microsoft Windows operating systems that encrypts files and folders stored on NTFS volumes to protect data against unauthorized access and disclosure.
Scenario: A user enables EFS encryption on sensitive documents and files containing confidential information, such as financial records, intellectual property, and personal data. EFS uses public-key cryptography to encrypt files with a unique file encryption key (FEK), which is then encrypted with the user’s public key and stored in the file’s metadata, ensuring data confidentiality and access control.
ERP
Enterprise Resource Planning
Definition: ERP is a business management software system that integrates core business processes, such as finance, human resources, supply chain, inventory, and customer relationship management, into a centralized platform.
Scenario: A multinational corporation deploys an ERP system to streamline and automate business operations across its global subsidiaries and departments. The ERP platform provides real-time visibility into key performance indicators, facilitates data-driven decision-making, and optimizes resource allocation to improve operational efficiency, productivity, and customer satisfaction.
ESN
Electronic Serial Number
Definition: ESN is a unique identifier assigned to mobile devices, such as cell phones and smartphones, to identify and authenticate devices on cellular networks.
Scenario: Mobile network operators use ESNs to track and manage device registrations, activations, and subscriptions on their networks. ESNs are stored in the device’s firmware and transmitted to the network during registration and authentication processes to validate device ownership and authorize network access.
ESP
Encapsulated Security Payload
Definition: ESP is a protocol used in IPsec (Internet Protocol Security) to provide confidentiality, integrity, and authentication for data packets transmitted over IP networks.
Scenario: Two routers establish an IPsec VPN tunnel between them using ESP to encrypt and protect sensitive data traffic flowing between corporate branch offices over the internet. ESP encapsulates IP packets with additional header and trailer fields containing cryptographic parameters and authentication information, ensuring secure transmission and delivery of data payloads.
FACL
File System Access Control List
Definition: FACL is a security mechanism used in Unix-like operating systems to define access permissions and control user and group privileges on files and directories using access control lists (ACLs).
Scenario: A system administrator configures FACLs on critical system files and directories to restrict access permissions and enforce security policies based on user roles, groups, and file attributes. FACLs allow granular control over file permissions, enabling administrators to specify read, write, and execute permissions for individual users and groups, enhancing file system security and data protection.
FDE
Full Disk Encryption
Definition: FDE is a data protection method that encrypts the entire storage device, such as a hard disk drive (HDD) or solid-state drive (SSD), to prevent unauthorized access to data stored on the disk.
Scenario: An organization deploys FDE software on company-issued laptops to encrypt the entire disk drive, including the operating system, applications, and user data. With FDE enabled, even if a laptop is lost or stolen, the encrypted data remains inaccessible without the decryption key, safeguarding sensitive information from unauthorized disclosure.
FIM
File Integrity Management:
Definition: FIM is a security technology that monitors and verifies the integrity of files and system configurations by comparing current states with predefined baselines or cryptographic checksums.
Scenario: A financial institution implements FIM software to monitor critical system files, directories, and configuration settings for unauthorized changes or tampering attempts. FIM agents continuously scan file attributes, permissions, and content hashes to detect anomalies and potential security breaches, helping to maintain data integrity and compliance with regulatory requirements.
FPGA
Field Programmable Gate Array
Definition: FPGA is an integrated circuit device that can be programmed and configured to perform specific logic functions and tasks, making it highly flexible and adaptable for various applications.
Scenario: A telecommunications company uses FPGAs to implement custom signal processing algorithms and protocols in network equipment, such as routers, switches, and base stations. FPGAs offer hardware acceleration capabilities and low-latency processing, enabling high-speed data transmission, network optimization, and protocol conversion in demanding telecommunications environments.
FRR
False Rejection Rate
Definition: FRR is a biometric authentication metric that measures the rate at which legitimate users are incorrectly rejected or denied access during the authentication process.
Scenario: A biometric access control system deployed at a secure facility uses fingerprint recognition technology to authenticate employees and grant access to restricted areas. The system calculates the FRR by comparing the number of valid fingerprint scans rejected by the system against the total number of legitimate access attempts, helping administrators fine-tune system parameters and improve user experience.
FTPS
Secured File Transfer Protocol
Definition: FTPS is an extension of FTP that adds support for Transport Layer Security (TLS) or Secure Sockets Layer (SSL) encryption to secure file transfers over untrusted networks.
Scenario: A financial institution employs FTPS to transmit sensitive financial data, customer records, and transaction logs securely between branch offices, data centers, and external partners. FTPS encrypts file transfers using strong cryptographic algorithms and digital certificates, ensuring data confidentiality and integrity during transit and storage.
FTP
File Transfer Protocol
Definition: FTP is a standard network protocol used for transferring files between a client and a server on a computer network.
Scenario: An IT administrator uses FTP to upload software patches, configuration files, and system updates to remote servers and network devices. FTP clients connect to FTP servers using TCP/IP connections to exchange files using commands such as PUT, GET, and LIST, facilitating efficient file management and data synchronization across distributed systems.
GCM
Galois Counter Mode
Definition: GCM is an authenticated encryption mode of operation that combines the Counter Mode (CTR) for encryption with Galois/Counter Mode (GCM) for authentication, providing both confidentiality and integrity protection for data.
Scenario: A cloud storage service uses GCM to encrypt and authenticate data stored in distributed storage clusters and data centers. GCM encrypts data blocks with a unique initialization vector (IV) and authentication tag, enabling data deduplication, compression, and encryption at rest while ensuring data integrity and protection against tampering and unauthorized access.
GDPR
General Data Protection Regulation
Definition: GDPR is a comprehensive data protection and privacy regulation enacted by the European Union (EU) to safeguard the rights and privacy of individuals’ personal data and regulate its processing and transfer.
Scenario: A multinational corporation operating in the EU implements GDPR compliance measures to protect customer data, employee records, and sensitive business information from unauthorized access, disclosure, and misuse. GDPR mandates organizations to obtain explicit consent for data processing, implement data protection measures, and report data breaches to regulatory authorities to ensure accountability and transparency in data handling practices.
GPG
Gnu Privacy Guard
Definition: GPG is an open-source implementation of the Pretty Good Privacy (PGP) encryption software used for encrypting, decrypting, and digitally signing electronic communications and files.
Scenario: A software developer uses GPG to sign and encrypt software releases, source code repositories, and communication channels to protect intellectual property and secure collaboration with contributors and users. GPG integrates with email clients, version control systems, and command-line utilities to provide end-to-end encryption and cryptographic verification of digital assets.
GPO
Group Policy Object
Definition: GPO is a collection of settings and configurations that define the behavior and security policies applied to user accounts and computer systems in a Windows Active Directory environment.
Scenario: An IT administrator creates GPOs to enforce security settings, software installation policies, and user access controls across domain-joined computers and network resources in an enterprise network. GPOs enable centralized management, enforcement, and enforcement of security policies, ensuring compliance with organizational standards and regulatory requirements.
GPS
Global Positioning System
Definition: GPS is a satellite-based navigation system that provides accurate positioning, velocity, and timing information to users worldwide for various applications, including navigation, mapping, and geolocation services.
Scenario: A smartphone equipped with GPS receivers and satellite navigation software uses signals from GPS satellites to determine its geographic location, altitude, and velocity in real-time. GPS technology powers location-based services such as mapping applications, ride-sharing platforms, and outdoor recreation tools, enabling users to navigate and explore their surroundings with precision and accuracy.
GPU
Graphics Processing Unit
Definition: GPU is a specialized processor designed to accelerate rendering, manipulation, and computation of graphics and visual effects in computer graphics applications, video games, and scientific simulations.
Scenario: A video game developer utilizes GPUs to render realistic 3D graphics, simulate physics effects, and enhance visual fidelity in immersive gaming experiences. GPUs parallelize rendering tasks across thousands of cores and shaders, enabling high-performance graphics rendering, real-time rendering, and interactive simulations on desktop computers, game consoles, and virtual reality platforms.
GRE
Generic Routing Encapsulation
Definition: GRE is a tunneling protocol used to encapsulate and transport arbitrary network protocols and traffic types over IP networks, enabling connectivity and interoperability between disparate networks.
Scenario: A corporate network establishes GRE tunnels between remote branch offices and the central data center to extend private network connectivity over the internet. GRE encapsulates Ethernet frames and IP packets with additional GRE headers, allowing seamless transmission of multicast traffic, routing protocols, and virtual private network (VPN) traffic across public and private networks.
HA
High Availability
Definition: HA is a system design approach that ensures continuous operation and uninterrupted service availability by minimizing single points of failure, implementing redundancy, and providing fault tolerance mechanisms.
Scenario: An e-commerce website deploys redundant servers, load balancers, and database clusters in geographically distributed data centers to achieve high availability and fault tolerance. HA architecture automatically redirects traffic, switches to standby systems, and replicates data across redundant components to maintain service uptime, withstand hardware failures, and scale resources dynamically to meet fluctuating user demand.
HDD
Hard Disk Drive
Definition: HDD is a non-volatile storage device that uses spinning magnetic disks and read/write heads to store and retrieve digital data on rotating platters.
Scenario: A personal computer uses an HDD as its primary storage device to store the operating system, software applications, and user files. HDDs offer large storage capacities, cost-effectiveness, and compatibility with a wide range of computing devices, making them suitable for desktops, laptops, servers, and external storage solutions.
HIDS
Host-based Intrusion Detection System
Definition: HIDS is a security system deployed on individual hosts or endpoints to monitor and analyze system events, processes, and file activities for signs of malicious behavior and security breaches.
Scenario: A server administrator installs HIDS agents on critical servers and workstations to detect unauthorized access attempts, malware infections, and suspicious activities indicative of advanced threats or insider attacks. HIDS agents collect system logs, audit trails, and file integrity data to generate alerts, log events, and initiate response actions to mitigate security risks and protect sensitive data assets.
HIPS
Host-based Intrusion Prevention System
Definition: HIPS is a security solution installed on individual hosts or endpoints to proactively detect, block, and mitigate security threats, vulnerabilities, and exploits in real-time.
Scenario: A network administrator deploys HIPS software on employee laptops and desktops to enforce security policies, block malicious activities, and prevent unauthorized system modifications. HIPS agents monitor system calls, network traffic, and application behavior to identify and block known and unknown threats, such as ransomware, zero-day exploits, and advanced persistent threats (APTs), before they can compromise system integrity and data confidentiality.
HMAC
Hashed Message Authentication Code
Definition: HMAC is a cryptographic message authentication code derived from a cryptographic hash function and a secret key, used to verify the integrity and authenticity of messages and data payloads.
Scenario: A web application uses HMAC to generate and validate authentication tokens and digital signatures for secure communication between clients and servers. HMAC algorithms, such as HMAC-SHA256 (Secure Hash Algorithm 256), calculate unique hash-based signatures using shared secret keys, preventing tampering, forgery, and replay attacks on data transmitted over insecure networks.
HOTP
HMAC-based One-time Password
Definition: HOTP is a one-time password algorithm that generates unique authentication codes based on the HMAC cryptographic function and a counter value, providing additional security for two-factor authentication (2FA) and user authentication workflows.
Scenario: A mobile banking application implements HOTP to generate and validate one-time passwords sent to customers’ registered mobile devices for secure login and transaction authentication. HOTP tokens are generated by combining a secret key with a counter value and computing HMAC-based hashes, ensuring that each authentication code is unique and time-bound, reducing the risk of account takeover and unauthorized access.
HSM
Hardware Security Module
Definition: HSM is a specialized hardware device used to generate, store, and manage cryptographic keys, perform secure cryptographic operations, and protect sensitive data in secure, tamper-resistant environments.
Scenario: A financial institution deploys HSMs to secure payment transactions, cryptographic keys, and digital certificates used in online banking, electronic funds transfer, and secure communications. HSMs provide hardware-based encryption, key management, and cryptographic processing capabilities, enabling compliance with industry standards, regulatory requirements, and data protection mandates.
HTML
Hypertext Markup Language:
Definition: HTML is a standard markup language used to create and structure web pages and web content by defining the layout, formatting, and presentation of text, images, and multimedia elements.
Scenario: A web developer uses HTML tags, attributes, and elements to design and construct static and interactive web pages for online publications, e-commerce stores, and social media platforms. HTML documents are rendered by web browsers, which interpret the markup instructions and display content in a visually appealing and accessible format to users across different devices and screen sizes.
HTTP
Hypertext Transfer Protocol
Definition: HTTP is an application protocol used for transmitting and exchanging hypertext documents and resources over the internet, defining the rules and conventions for client-server communication.
Scenario: A web browser sends HTTP requests to web servers to retrieve HTML documents, images, scripts, and other resources needed to render web pages and display content to users. HTTP facilitates the transfer of data between web clients and servers using standard methods, status codes, and header fields, enabling seamless interaction and navigation across websites and online services.