Day 1 Reversed Flashcards
3DES
Triple Digital Encryption Standard
Performs encryption in 3 rounds of the same algorithm
802.1x
Switch Authentication
Standard for controlling access to intranet infrastructure devices.
AAA
Authentication, Authorization, and Accounting
The principle of verifying identity, capability and use.
ABAC
Attribute-based Access Control
Granting access based upon the characteristic of the subject, such as clearance level.
ACL
Access Control List
Restricting entry, based upon a listing of controls or permissions.
AES
Advanced Encryption Standard
Rijndael was approved by the US government and given this title.
AES256
Advanced Encryption Standards 256bit
The 256 bit version of this algorithm is its highest level and is deemed uncrackable by brute force methods.
AH
Authentication Header
This header transmits in clear text but authenticates and integrity checks each packet.
AI
Artificial Intelligence
The simulation of human intelligence and thinking in a machine, including adaptive learning and problem-solving.
AIS
Automatic Indicator Sharing
Automated sharing of threat information between organizations to enhance detection and response.
ALE
Annualized Loss Expectancy
The single loss expectancy times the annualized rate of occurrence.
ALG
Application Layer Gateway
This is a type of firewall able to inspect headers and payload in the upper protocol layers.
AP
Access Point
Infrastructure connection point for most wireless networks.
API
Application Programming Interface
These are development tools used by programmers that have prebuilt functions with desired utility.
APT
Advanced Persistent Threat
Applications with advanced targeting, zero days and exfiltration techniques that are aimed at particular organizations or industries.
ARO
Annualized Rate of Occurrence
Most risk assessments track threats and attacks on an annualized basis.
ARP
Address Resolution Protocol
Given the IP address, this protocol will locate the MAC address.
ASLR
Address Space Layout Randomization
This randomizes the location of an application in memory making it harder for attackers to successfully perform the buffer overflow.
ASP
Application Service Provider
An organization provides access to its custom developed software, such as accounting or customer management.
ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge
A database of adversarial tactics and techniques that might be used to compromise systems organizations to enhance threat management.
Asymmetric Key
Public Key
The use of complementary values to disguise and then reveal information.
AUP
Acceptable Use Policy
This policy is legally required, if HR wants to fire someone for misuse.
AV
Antivirus
Designed to identify malware, primarily based upon known patterns.
AV
(Not Antivirus)
Asset Value
This can be the replacement cost or income derived from something.
AXFR
Zone Transfer
The synchronization of name resolution information between a primary and secondary DNS server.
BASH
Bourne Again Shell
A UNIX and Linux command interface and language.
BIA
Business Impact Analysis
This is the prerequisite for disaster recovery and continuity planning to identify potential losses.
Assessing the criticality of business activities and assets in order to determine the appropriate protection and recovery options.