Day 6 Reversed Flashcards
GCM
Galois Counter Mode
Useful for protecting packet data as it has little latency and minimum operation overhead.
GDPR
General Data Protection Regulation
A law from the European Union that directs protection and privacy of personal information.
GPG
Gnu Privacy Guard
The free incarnation of a popular cryptosystem, commonly used to secure email.
GPO
Group Policy Object
A feature of Windows that provides centralized management of configuration and settings.
GPS
Global Positioning System
A satellite-based protocol that can closely identify the location or asset.
GPU
Graphic Processing Unit
These processors have an alternate use in discovering keys and cracking.
GRE
Generic Routing Encapsulation
An old and standard protocol that inserts one packet within another.
HA
High Availability
Ensuring that system uptime extends longer than what it normally would.
HDD
Hard Disk Drive
A mass storage system, typically implemented with spinning platters and heads that perform reading and writing.
HIDS
Host-based Intrusion Detection System
A defensive application that identifies anomalous or malicious activities within a device.
HIPS
Host-based Intrusion Prevention System
A defensive application that prevents anomalous or malicious activities within a device.
HMAC
Hashed Message Authentication Code
Implementing non-repudiation via an exchanged value and hashing.
Honeynet
Honeypot Network
A sophisticated system designed to locate, discover, distract and otherwise observe malicious behavior.
Honeypot
Fake Target
Used to identify and distract hackers.
Host Firewall
Software firewall
The last line of defense for a system against a malicious intranet host.
Host File
Local resolver
This is a file wherein the system manager may define their own names to resolve IP addresses.
HOTP
HMAC-based One-Time Password
Performs authentication by requiring a user to enter a system generated code into a hashing or calculating algorithm that produces a response.
HSM
Hardware Security Module
These key management systems are ideally suited for automated private key transactions that require strong security.
HSMaaS
Hardware Security Module as a Service
A cloud-based service that allows customers to create, manage and implement encryption keys.
HTML
Hypertext Markup Language
The scripting used by browsers to interpret and display content.
HTTP
Hypertext Transfer Protocol
The means by which HTML and images are viewed and accessed by browsers.
HTTPS
Hypertext Transfer Protocol over SSL/TLS
Performing HTTP over an encrypted channel.
HVAC
Heating, Ventilation and Air Conditioning
The heating, cooling and other environmental aspects of a building.
IaaS
Infrastructure as a Service
Implementing cloud-based networks, servers and other infrastructure.
IAM
Identity and Access Management
The policies, procedures and technologies that facilitate ensuring that only the appropriate personnel have access to resources in an organization.
ICMP
Internet Control Message Protocol
A multifunctional protocol designed to perform network testing and report errors.
ICS
Industrial Control Systems
Semi-intelligent devices used to control industrial or scientific equipment from central consoles.