Cyber Security Flashcards

1
Q

SOC

A

Security Operations Center (SOC)
- centralized unit that monitors and manages an organization’s security posture on a 24/7 basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NIPS

A

Network Intrusion Prevention System (NIPS)
- monitors network traffic for suspicious activity and can take automated actions to block or prevent potential threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WAF

A

Web Application Firewall (WAF) with DDoS protection
- specifically designed to mitigate and block DDoS attacks by filtering and monitoring incoming traffic to a web application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PKI

A

Public Key Infrastructure (PKI)
- involves the use of asymmetric cryptography to provide secure communication and authentication, each device is assigned a unique key pair consisting of a public key and a private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IDS

A

Intrusion Detection System (IDS)
- designed to monitor network traffic for suspicious activities or patterns that may indicate unauthorized access, malware infections, or other security threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ACL

A

Access Control Lists (ACLs)
- used to control access to network resources by specifying which users of systems are allowed or denied access to specific resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TPM

A

Trusted Platform Module (TPM)
- dedicated microcontroller designed to secure hardware by integrated cryptographic keys into devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SAN Certificate

A

Subject Alternative Name (SAN) Certificate
- can secure multiple domains and subdomains by specifying them in the certificate’s SAN field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

VLAN

A

Virtual Local Area Network
- logical grouping of network devices that allows devices on different physical LANs to communicate as if they were on the same physical LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RSA

A

Rivest, Shamir, & Adleman
- an asymmetric algorithm used primarily for secure data transmission and digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HMAC

A

Hash-based Message Authentication Code (HMAC)
- used to verify the integrity and authenticity of a message, requires a shared secret key but does not provide a method for establishing or agreeing upon that key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AES

A

Advanced Encryption Standard (AES)
- a symmetric encryption algorithm used to encrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TLS

A

Transport Layer Security (TLS)
- security protocol that protects data and privacy when communicating over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SSL

A

Secure Socket Layer (SSL)
- standard technology for securing an internet connection by encrypting data sent between a website and a browser (or between two servers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CRL

A

Certificate Revocation List (CRL)
- list of digital corticates that have been revoked by the CA (Certificate Authority) before their expiration date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CSRF

A

Cross-Site Request Forgery (CSRF)
- web-based attack where an attacker tricks a user into performing actions on a web application without their consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

APT

A

Advanced Persistent Threat (APT)
- highly skilled, well-resourced, and persistent attackers, often associated with state-sponsored groups, that focus on long-term espionage or sabotage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ARP

A

Address Resolution Protocol (ARP)
- protocol or procedure that connects an ever-changing Internet Protocol (IP) address to a fixed physical machine address, also known as a media access control (MAC) address, in a local-area network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

WEP

A

Wired Equivalent Privacy (WEP)
- an outdated encryption standard known to have significant vulnerabilities that can be easily compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

WPA

A

Wi-Fi Protected Access (WPA)
- a security standard for wireless networks that protects data transmitted between devices and the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

PSK

A

Pre-Shared Key (PSK)
- a complex string of characters that is used to authenticate users on a network and secure wireless communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AES

A

Advanced Encryption Standard (AES)
- a symmetric block cipher chosen by the U.S. government to protect classified information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

NTLM

A

New Technology LAN Manager
- suite of Microsoft security protocols intended to provide authentication, integrity, and confidentiality to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

TOC

A

Time-of-check (TOC)
- refers to the moment when a system checks the state of a resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

TOU

A

Time-of-use (TOU)
- refers to the moment when a system uses a resource after it has been checked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

SSH

A

Secure Shell (SSH)
- a network protocol that allows secure communication between devices over an unsecured network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

HIPS

A

Host-based Intrusion Prevention System (HIPS)
- a security software that monitors and prevents malicious activity on a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

CVE

A

Common Vulnerability and Exposure (CVE)
- a system that identifies and tracks publicly known cybersecurity vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

EDR

A

Endpoint Detection and Response (EDR)
- focuses on identifying and addressing security threats at the endpoint level, such as laptops, desktops, and mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

RAT

A

Remote Access Trojan (RAT)
- re malware designed to allow an attacker to remotely control an infected computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

SCADA

A

Supervisory Control and Data Acquisition (SCADA)
- provide centralized control, data acquisition, and real-time monitoring of industrial processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

RTO

A

Recovery Time Objective (RTO)
- the maximum amount of time an organization can tolerate for restoring its systems, applications, and data after a cyber incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

AAA

A

Authentication, Authorization, and Accounting (AAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

AES-256

A

Advanced Encryption Standards 256-bits (AES-256)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

AH

A

Authentication Header (AH)
- an IPSec header used to verify that the contents of a packet have not been modified while the packet was in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

AIS

A

Automated Indicator Sharing (AIS)
- program enables organizations to share and receive machine-readable cyber threat indicators (CTIs) and defensive measures (DMs) in real-time for use in monitoring and defending their networks against known threats that are relevant to AIS participants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

ALE

A

Annualized Loss Expectancy (ALE)
- the total loss we can expect from a risk in a one-year timeframe and is calculated by multiplying SLE (Single Loss Expectancy) by ARO (Annualized Rate Occurrence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

APT

A

Advanced Persistent Threat (APT)
- a type of cyber attack that involves a prolonged, covert intrusion into a network or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

ARO

A

Annualized Rate Occurrence (ARO)
- the likelihood of a risk being compromised and is calculated by dividing the estimated number of incidents by the time frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

ASLR

A

Address Space Layout Randomization (ASLR)
- a technique that is used to increase the difficulty of performing a buffer overflow attack that requires the attacker to know the location of an executable in memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK)
- a comprehensive matrix of tactics and techniques used by cyber adversaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

AUP

A

Acceptable User Policy (AUP)
- sets rules related to an organization’s IT security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

BASH

A

Bourne Again Shell (BASH)
- default shell language in most server computing environments in Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

BCP

A

Business Continuity Planning (BCP)
- a proactive approach that prepares an organization to respond and recover from potential cyber threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

BGP

A

Border Gateway Protocol (BGP)
- a gateway protocol that enables the internet to exchange routing information between autonomous systems (AS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

BIA

A

Business Impact Analysis (BIA)
- a systematic process that helps organizations evaluate the potential impact of disruptions on their critical assets, processes, and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

BPA

A

Business Partners Agreement (BPA)
- legal agreements between partners, this is a legal agreement that outlines the terms, conditions, and expectations between the partners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

BPDU

A

Bridge Protocol Data Unit (BPDU)
- a message that helps switches exchange information and determine the best paths for data to travel through a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

BYOD

A

Bring Your Own Device (BYOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

CAPTCHA

A

Completely Automated Public Turing Test To Tell Computers and Humans Apart (CAPTCHA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

CAR

A

Corrective Action Report (CAR)
- a formal document used by organizations to address and rectify issues, errors, non-conformances, or deficiencies identified in processes, products, services, or systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

CASB

A

Cloud Access Security Broker (CASB)
- a security solution that monitors and enforces an organization’s security policies for cloud applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

CBC

A

Cipher Block Chain (CBC)
- a block mode of DES that XORs the previous encrypted block of ciphertext to the next block of plaintext to be encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

CCMP

A

Counter Mode/CBC-MAC Protocol (CCMP)
- a cryptographic protocol that uses the AES cipher to encrypt data and provide security services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

CERT

A

Computer Emergency Response Team (CERT)
- a group of information security experts who protect an organization’s cybersecurity

55
Q

CFB

A

Cipher Feedback (CFB)
- a block cipher mode of operation used in encryption algorithms to encrypt and transfer plaintext values

56
Q

CHAP

A

Challenge Handshake Authentication Protocol (CHAP)
- an identity checking protocol that periodically re-authenticates the user during an online session

57
Q

CIO

A

Chief Information Officer (CIO)

58
Q

CIRT

A

Computer Incident Response Team (CIRT)
- a group of experts who manage and respond to cyber security incidents and breaches

59
Q

COOP

A

Continuity of Operation Planning (COOP)
- a set of plans and procedures that ensure an organization can continue to perform essential functions during emergencies

60
Q

COPE

A

Corporate Owned, Personally Enabled (COPE)
- a business model where a company owns devices that employees can use for both business and personal purposes

61
Q

CP

A

Contingency Planning (CP)
- a set of procedures an organization initiates in the event of cyberattacks

62
Q

CRC

A

Cyclical Redundancy Check (CRC)
- a technique used for detecting errors in digital data transmission, commonly employed in network communication and data storage

63
Q

CSO

A

Chief Security Officer (CSO)

64
Q

CSP

A

Cloud Service Provider (CSP)

65
Q

CSR

A

Certificate Signing Request (CSR)
- a formal request to a Certificate Authority (CA) for a digital identity certificate, such as an SSL/TLS certificate

66
Q

CSU

A

Channel Service Unit (CSU)
- a hardware device that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa

67
Q

RTOS

A

Real-Time Operating System (RTOS)
- a specialized operating system used in critical embedded systems that requires fast, deterministic responses to events

68
Q

PDU

A

Power Distribution Unit (PDU)
- a device fitted with multiple outputs designed to distribute electric power, especially to racks of computers and networking equipment located within a data center

69
Q

PEAP

A

Protected Extensible Authentication Protocol (PEAP)
- a security protocol that protects wireless networks by encrypting authentication data during transmission, does not require client-side certificates

70
Q

LEAP

A

Lightweight Extensible Authentication Protocol (LEAP)
- a proprietary wireless LAN authentication method developed by Cisco Systems, considered insecure due to known vulnerabilities

71
Q

ESP

A

Encapsulating Security Payload (ESP)
- a member of the Internet Protocol Security (IPsec) set of protocols that encrypt and authenticate the packets of data

72
Q

DLP

A

Data Loss Prevention (DLP)
- the practice of detecting and preventing data breaches, exfiltration, or unwanted destruction of sensitive data

73
Q

UTM

A

Unified Threat Management (UTM)
- UTM devices are hardware or software that tie together network security features into one simple-to-use, easy-to-manage appliance

74
Q

IPSec

A

Internet Protocol Security (IPSec)
- a set of communication rules or protocols for setting up secure connections over a network

75
Q

SHA

A

Secure Hashing Algorithm (SHA)

76
Q

SASE

A

Secure Access Service Edge (SASE)
- a cloud-based architecture that combines network and security services into a single solution

77
Q

SD-WAN

A

Software-defined Wide Area Newtork (SD-WAN)
- a technique for using software to make wide area networks more intelligent and flexible

78
Q

NAC

A

Network Access Control (NAC)
- controls and manages access to a network, ensuring that only authorized devices and users can connect

79
Q

DMZ

A

Demilitarized Zone (DMZ)
- also known as a screened subnet, designed to add an extra layer of security by isolating the public-facing service from the internal network

80
Q

CVE

A

Common Vulnerabilities and Exposures (CVE)
- a list of publicly known cybersecurity vulnerabilities that affect software, hardware, and firmware

81
Q

IoC

A

Indicators of Compromise (IoC)
- are clues or evidence that a network or system has been compromised or attacked

82
Q

OSINT

A

Open-source Intelligence (OSINT)
- a method of gathering information from public or other open sources, which can be used by security experts, national intelligence agencies, or cybercriminals

83
Q

STIX

A

Structured Threat Information eXchange (STIX)
- a standardized language and data model that allows organizations to share cyber threat intelligence (CTI) in a consistent and readable format

84
Q

SAML

A

Security Assertion Markup Language (SAML)
- is used for single sign-in (SSO) and can be used for both authentication and authorization, especially in enterprise environments

85
Q

MAC

A

Mandatory Access Control (MAC)
- an access control model where access rights are regulated by central authority based on a multiple levels of security, users cannot change access policies

86
Q

DAC

A

Discretionary Access Control (DAC)
- access to resources is determined by the resource owner

87
Q

RBAC

A

Role-Based Access Control (RBAC)
- a cybersecurity method that limits access to applications and networks based on a user’s role and assigned permissions

88
Q

SNMPv3

A

Simple Network Management Protocol version 3 (SNMPv3)
- designed specifically to provide secure management and monitoring of network devices, it includes important security features such as authentication, encryption, and message integrity

89
Q

RADIUS

A

Remote Authentication Dial-In User Service (RADIUS)
- is used for authentication, authorization and accounting (AAA) services, particularly for network access

90
Q

SFTP

A

SSH File Transfer Protocol (SFTP)

91
Q

ABAC

A

Attribute-based Access Control (ABAC)
- uses various attributes, such as user role, time of access, and geographic location, to determine access rights

92
Q

CVSS

A

Common Vulnerability Scoring System (CVSS)
- standard for assessing the severity of security vulnerabilities

93
Q

FDE

A

Full Disk Encryption (FDE)

94
Q

SPF

A

Sender Policy Framework (SPF)
- an email authentication method designed to detect forging sender addresses during the delivery of the email, allows domain owners to specify which mail servers are permitted to send email on behalf of their domains by creating a specific SPF record in the DNS

95
Q

DKIM

A

Domain Keys Identified Mail (DKIM)
- provides a way to verify that an email was indeed sent and authorized by the owner of that domain, it does this by using a digital signature

96
Q

DMARC

A

Domain-based Message Authentication, Reporting & Conformance (DMARC)
- builds on SPF and DKIM to provide additional reporting and policy enforcement

97
Q

EF

A

Exposure Factor (EF)
- the percentage of an asset’s value that is exposed to be lost due to a specific incident of loss event

98
Q

CYOD

A

Choose Your Own Device (CYOD)

99
Q

PAM

A

Privileged Access Management (PAM)
- a cybersecurity strategy that helps organizations protect against cyber threats by monitoring and controlling access to critical resources

100
Q

GPO

A

Group Policy Objects (GPOs)
- a collection of settings that can be used to manage and configure systems, applications, and user settings in Active Directory

101
Q

ICS

A

Industrial Control System (ICS)
- a general term for any system used to control and manage industrial processes, including manufacturing, production and distribution

102
Q

SE Linux

A

Security-enhanced Linux (SE Linux)
- a security module integrated into the Linux kernel that provides mandatory access control (MAC) policies

103
Q

MSA

A

Master Service Agreement (MSA)
- a fundamental contract outlining the scope of the relationship between two parties, including terms and conditions for current and future activities and responsibilities

104
Q

MOA

A

Memorandum of Agreement (MOA)
- a written document describing a cooperative relationship between two parties wishing to work together on a project

105
Q

MOU

A

Memorandum of Understanding (MOU)
- a non-binding agreement that outlines the general intentions and understanding between parties

106
Q

MTBF

A

Mean Time Between Failures (MTBF)
- the average time between repairable failures of a technology product

107
Q

MTTR

A

Mean Time To Failure (MTTF)
- the average time between non-repairable failures of a technology product

108
Q

RPO

A

Recovery Point Objective (RPO)
- the maximum length of time permitted that data can be restored from

109
Q

SLA

A

Service Level Agreement (SLA)
- a formal agreement between a service provider and a client that defines the level of service expected

110
Q

DRP

A

Disaster Recovery Plan (DRP)
- process involves creating a strategy to restore IT systems and data after a disaster

111
Q

IRP

A

Incident Response Plan (IRP)
- a written document, formally approved by the senior leadership team, that helps your organization before, during, and after a confirmed or suspected security incident

112
Q

RDP

A

Remote Desktop Protocol (RDP)
- a protocol that enables users anywhere in the world to access and control a computer through a secure, reliable channel

113
Q

PII

A

Personally Identifiable Information (PII)
- a category of sensitive data that can be used to identify an individual

114
Q

SPIM

A

Spam Over Internet Messaging (SPIM)
- involves sending un

115
Q

HSM

A

Hardware Security Module (HSM)
- a physical device that protects cryptographic keys and other sensitive data in an organization

116
Q

OCSP

A

Online Certificate Status Protocol (OCSP)
- an alternative to the certificate revocation list (CRL) and is used to check whether a digital certificate is valid or if it has been revoked

117
Q

CMS

A

Content Management System (CMS)
- software suites that allow site administrators to easily manage the design, functionality, and operation of websites with minimal technical expertise

118
Q

CTM

A

Counter Mode (CTM)

119
Q

DEP

A

Data Execution Prevention (DEP)
- a technology built into Windows that helps protect you from executable code launching from places it’s not supposed to

120
Q

DES

A

Data Encryption Standard (DES)
- a symmetric-key algorithm for the encryption of digital data

121
Q

DHCP

A

Dynamic Host Configuration Protocol (DHCP)
- a networking protocol that automatically assigns IP addresses and other network parameters to devices connected to a network; responsible for setting up configurations when a computer first joins a local network

122
Q

DHE

A

Diffie-Hellman Ephemeral (DHE)

123
Q

DNAT

A

Destination Network Address Translation (DNAT)
- a networking technology that can be used to enhance network security and allow external users to access internal services

124
Q

DNS

A

Domain Name System (DNS)
- a critical part of the internet infrastructure that translates domain names into IP addresses so that computers can communicate with each other

125
Q

DPO

A

Data Privacy Officer (DPO)
- a role in an organization that ensures that the company is compliant with data protection laws and regulations when handling personal data

126
Q

DSA

A

Digital Signature Algorithm (DSA)
- a FIPS (Federal Information Processing Standard) and public-key cryptosystem that’s used for digital signatures

127
Q

DSL

A

Digital Subscriber Line (DSL)

128
Q

EAP

A

Extensible Authentication Protocol (EAP)
- used to pass the authentication information between the supplicant (the Wi-Fi workstation) and the authentication server (Microsoft IAS or other)

129
Q

ECB

A

Electronic Code Book (ECB)
- a block cipher mode of operation that encrypts messages by dividing them into blocks and encrypting each block separately

129
Q

ECC

A

Elliptic Curve Cryptography (ECC)
- a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller and more efficient cryptographic keys

130
Q

ECDHE

A

Elliptic Curve Diffie-Hellman Ephemeral (ECDHE)

131
Q

ECDSA

A

Elliptic Curve Digital Signature Algorithm (ECDSA)

132
Q

EFS

A

Encrypted File System (EFS)
- a Windows feature that encrypts files and folders to protect them from unauthorized access

133
Q
A