Day 1 Flashcards
Performs encryption in 3 rounds of the same algorithm
3DES
Triple Digital Encryption Standard
Standard for controlling access to intranet infrastructure devices.
802.1x
Switch authentication
The principle of verifying identity, capability and use.
AAA
Authentication
Authorization, and
Accounting
Granting access based upon the characteristic of the subject, such as clearance level.
ABAC
Attribute-based Access Control
Restricting entry, based upon a listing of controls or permissions.
ACL
Access Control List
Rijndael was approved by the US government and given this title.
AES
Advanced Encryption Standard
The 256 bit version of this algorithm is its highest level and is deemed uncrackable by brute force methods.
AES256
Advanced Encryption Standards 256bit
This header transmits in clear text but authenticates and integrity checks each packet.
AH
Authentication Header
The simulation of human intelligence and thinking in a machine, including adaptive learning and problem-solving.
AI
Artificial Intelligence
Automated sharing of threat information between organizations to enhance detection and response.
AIS
Automatic Indicator Sharing
The single loss expectancy times the annualized rate of occurrence.
ALE
Annualized Loss Expectancy
This is a type of firewall able to inspect headers and payload in the upper protocol layers.
ALG
Application Layer Gateway
Infrastructure connection point for most wireless
networks.
AP
Access Point
These are development tools used by programmers that have prebuilt functions with desired utility.
API
Application Programming Interface
Applications with advanced targeting, zero days and exfiltration techniques that are aimed at particular organizations or industries.
APT
Advanced Persistent Threat