Day 10 COPY Flashcards
This protocol is used by the client to validate the status of a received certificate.
OCSP
Online Certificate Status Protocol
This is a value, commonly associated with SNMP that is used to identify aspects of a managed device or system.
OID
Object Identifier
The software on a system initially loaded that regulates access to resources and facilitates the execution of applications.
OS
Operating System
A seven layer scheme that identifies commonly implemented features involved in networked applications and systems.
OSI
Open Systems Interconnection
Accessing data stores of information that enable one to collect, analyze and discern useful information from publicly available resources.
OSINT
Open-source Intelligence
An open standard routing protocol capable of dynamic routing and the secure transfer of routing table information.
OSPF
Open Shortest Path First
Associated with industrial controls and processes, this refers to systems that identify changes, perform monitoring and control industrial equipment resources.
OT
Operational Technology
A general technology category of systems that use wireless and cellular means to obtain new data or updates.
OTA
Over The Air
A technical specification for USB devices that allow them to act as hosts and facilitate connections from other USB devices, such as mice and keyboards.
OTG
On-The-Go
Implement the authentication with a secret that expires upon initial access.
OTP
One-time Password
Involves a key that is as long as the message, but may only be used once.
OTP
One-time Pad
A derivative of the SCAP program to automate vulnerability detection and management.
OVAL
Open Vulnerability Assessment Language
A nonprofit international organization that facilitates education, secure development, documentation, tools and other technologies to enhance web applications.
OWASP
Open Web Application Security Project
This format allows for the storage of both public and private keys in open or encrypted form.
P12
PKCS #12
A headless file sharing system that has no centralized point of control and facilitates wide-open file sharing.
P2P
Peer to Peer
A form of access that allows an organization to create and run its own applications on the cloud.
PaaS
Platform as a Service
A JavaScript based technology that regulates the configuration of browsers and their use of web proxies.
PAC
Proxy Auto Configuration
Dynamically, loadable authentication libraries used on Linux.
PAM
Pluggable Authentication Modules
This is an insecure authentication protocol, sometimes used between routers.
PAP
Password Authentication Protocol
Address translation that multiplexes many internal addresses through one or a few external address, linking connections based upon the source port.
PAT
Port Address Translation
An application designed to identify compliance deviations and variance from a baseline, and then rectify it.
Patch Management
Configuration and baseline maintenance
This cryptographic function, processes, and otherwise insecure secret through repeated rounds of hashing to create a longer key value.
PBKDF2
Password-based Key Derivation Function 2
The point of interface between the public switched telephone network and an organization’s internal telephony.
PBX
Private Branch Exchange
Sniffing and recording network data into a file for later analysis.
PCAP
Packet Capture