Day 14 COPY Flashcards
An agreement on the characteristics of quality and performance between two parties.
SLA
Service Level Agreement
The value of an asset multiplied times the exposure factor.
SLE
Single Loss Expectancy
This is a core Microsoft protocol used for general access and authentication.
SMB
Server Message Block
Developed by RSA, this is a formatting standard originally created for implementing digital signatures and encryption with public key infrastructure.
S/MIME
Secure/Multipurpose Internet Mail Extensions
Protocol used by cell phones to exchange brief text-based messages.
SMS
Short Message Service
The vulnerable application responsible for forwarding email to a destination server or receiving it from a sender.
SMTP
Simple Mail Transfer Protocol
The secured application responsible for forwarding email to a destination server or receiving it from a sender.
SMTPS
Simple Mail Transfer Protocol Secure
A network-based application designed to discover device status, change configuration and receive errors and exceptions.
SNMP
Simple Network Management Protocol
The structured markup used to identify components of service oriented architecture messages.
SOAP
Simple Object Access Protocol
A software architecture designed to allow an organization to collect and analyze threat information from numerous sources and inputs, as well as respond to incidents
SOAR
Security Orchestration, Automation, Response
The minimization of an application and operating system to a state that will fit on an integrated circuit.
SoC
System on Chip
This is a hub of operations and communication that focuses on security incidents and management at a technical level.
SOC
Security Operations Center
An email validation architecture designed to detect and eliminate spoofing and spamming through approved mail exchangers.
SPF
Sender Policy Framework
Chat messages delivered as a hoax were to induce purchase.
SPIM
Spam over Internet Messaging
The use of SMS to deliver unwanted messages.
SPIT
Spam over Internet Telephony
A device, business process or person that is critical to a business and has no redundancy.
SPoF
Single Point of Failure
An industry-standard mass information repository retrieval system.
SQL
Structured Query Language
Manipulation of input to the front end of a server in order to gain access to the data repositories.
SQLi
SQL injection
A secure form of Internet protocol-based telephony.
SRTP
Secure Real-Time Protocol
Nonvolatile storage using persistent solid-state flash memory to store and retrieve information.
SSD
Solid State Drive
This protocol, runs over TCP/22 and encrypts its exchanges.
SSH
Secure Shell
An identifier for a wireless network.
SSID
Service Set Identifier
A certificate-based authentication and encryption application that would securely process any TCP-based layer 7 protocol.
SSL
Secure Sockets Layer
An authentication architecture that relies on a central system and it’s authentication to authorize users for other services using a single set of credentials.
SSO
Single Sign-on
Developed by OASIS and MITRE, this is an international standard for sharing intelligence and threat information
STIX
Structured Threat Information eXpression