Definitions Flashcards

1
Q

IV

A

Initialization Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MFDs

A

Multi-Functional Devices - Print / Scan / Copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MMS

A

Multimedia Messaging Service - Extention of SMS / Supports sending multimedia content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NIDS

A

Network Based Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MTBF

A

Mean Time Between Failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RADIUS

A

Remote Authentication Dial-In User Service - Central authentication service alternatives: TACACS+ and Diameter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PKI

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PSK

A

Pre-Shared Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NIPS

A

Network Based Intrusion Prevention System - Placed in-line or in-band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

POP3

A

Post Office Protocol Version 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IMAP4

A

Internet Message Protocol Version 4

Protocol used to store and manage email on servers
TCP 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CSR

A

Certificate Signing Request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CTM

A

Counter Mode

Mode of operations used for encryption
Combines an IV with a Counter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VPN

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WAF

A

Web Application Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DMZ

A

DeMilitarized Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CHAP

A

Challenge Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DLL

A

Dynamic Link Library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SOPs

A

Standard Operating Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

NAC

A

Network Access Control

Two types - Permanent and Dissolvable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

NAT

A

Network Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

EAP

A

Extensible Authentication Protocol

Authentication frame work that provides general guidance for authentication methods.

Variations: PEAP, EAP-TLS, EAP–TTLS and EAP-FAST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

SLE

A

Single Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
SLA
Service Level Agreement
26
MDM
Mobile Device Management
27
RAT
Remote Access Trojan Control a system from a remote location
28
RC4
Rivest Cipher version 4 A symetric stream cipher that can use between 40 and 2,048 bits Known to be cracked (obsolete)
29
DOS
Denial of Service | Disk Operating System
30
MITM
Man in the Middle
31
MD5
Message Digest 5 Hashing function for integrity 128 bit hashes referred as MD5 checksums
32
HSM
Hardware Security Module
33
HVAC
Heating Ventilation and Air Conditioning
34
MTTR
Mean Time To Recover The time it takes to restore a failed system
35
SSL
Secure Socket Layer Predecessor to TLS
36
XOR
Logical operation used in some encryption schemes
37
XML
Extensible Markup Language
38
3DES
Triple Data Encryption Standard Symetric Algorithm Block Cipher 64 bit blocks
39
SDN
Software Defined Networks SDN's separate the data and control planes
40
HOTP
HMAC Based One Time Password
41
WPS
WiFi Protected Setup
42
RSA
Rivest Shamir and Adleman Asymmetric algorithm used to encrypt data and digitally sign transmissions
43
WPA2
WiFi Protected Access 2 Supports CCMP for encryption which is based on AES
44
WPA
WiFi Protected Access Superseded by WPA2 This is obsolete DO NOT USE
45
ARP
Address Resolution Protocol
46
BIOS
Basic Input Output System
47
RFID
Radio Frequency Identification System RFID Attacks: Eavesdropping Replay DOS (Denial of Service)
48
FAR
False Acceptance Rate
49
SHA
Secure Hash Algorithm
50
SFTP
Secure File Transfer Protocol Extension of Secure Shell (SSH) used to encrypt FTP traffic. Transmits data using TCP port 22
51
STP
Spanning Tree Protocol
52
SMS
Short Message Service
53
AP
Access Point
54
DH
Diffie-Hellman Asymmetric Algorithm used to privately share symmetric keys.
55
XSS
Cross Site Scripting
56
TLS
Transport Layer Security
57
FRR
False Reject Rate
58
RAID
Redundant Array of Inexpensive Disks
59
BYOD
Bring Your Own Device
60
SSH
Secure Shell Uses TCP Port 22
61
NTLM
New Technology Lan Manager Suite of protocols that provide confidentiality, integrity and authentication within windows systems. Versions: NTLM, NTLMv2 and NTLM2 Session
62
FAR
False Acceptance Rate
63
IaaS
Infrastructure as a Service
64
NDA
Non Disclosure Agreement
65
AES
Advanced Encryption Standard Strong symmetric block cipher. Encrypts in 128 bit blocks Key sizes of 128, 192 or 256
66
ACL's
Access Control Lists
67
ISA
Interconnect Security Agreement
68
RPO
Recovery Point Objective
69
OFDMA
Orthogonal Frequency-Division Multiple Access
70
MU-MIMO
Multiuser multiple input, multiple output
71
USB OTG
Universal Serial Bus On The Go Cable used to connect mobile devices to other devices
72
UTM
Unified Threat Management
73
VDI / VDE
Virtual Desktop Infrastructure / Virtual Desktop Environement
74
VLAN
Virtual Local Areal Network
75
GPO
Group Policy Object
76
ROT-13
Rotate 13 letter spaces. A substitution cipher that uses a key of 13
77
DAC
Discretionary Access Control Microsoft NTFS uses this for authorization
78
CYOD
Choose Your Own Device
79
FAT AP
Fat Access Point An AP that includes everything needed to connect wireless clients to a wireless network. Configured independantly.
80
PII
Personally Identifiable Information
81
GPS
Global Positioning System
82
HIDS
Host Based Intrusion Detection System
83
SED
Self Encrypting Drive
84
IoT
Internet of Things
85
SNMPv3
Simple Network Management Protocol version 3
86
SIEM
Security Information and Event Management
87
RTO
Recovery Time Objective
88
PHI
Personal Health Information
89
MS-CHAPv2
Microsoft Challenge Handshake Authentication Potocol Version 2 Provides mutual authentication. Compare to CHAP and PAP
90
FTPS
File Transfer Protocol Secure Extension of FTP that uses TLS to encrypt FTP traffic TCP 989 and 990
91
FRR
False Rejection Rate
92
AUP
Acceptable Use Policy
93
AAA
Authentication Authorization and Accounting
94
ECB
Electronic Code Book Legacy Mode of Operations used for encryption. It is weak and should not be used.
95
EAP-TTLS
Extensible Authentication Protocol-Tunneled Transport Layer Security
96
EAP-TLS
Extensible Authentication Protocol-Transport Layer Security
97
NIST
National Institution of Standards and Technology Part of the Department of Commerce and includes Information Technology Laboratory (ITL)
98
DNSSEC
Domain Name System Security Extensions A suite of extensions to DNS used to protect the integrity of DNS records
99
SSO
Single Sign On
100
EMP
ElectroMagnetic Pulse
101
EMI
ElectroMagnetic Interference
102
CA
Certificate Authority
103
Firmware OTA Updates
Firmware Over The Air Updates
104
APT
Advanced Persistent Threat
105
ALE
Annualized Loss Expectancy Quantitative Risk Assessment
106
AH
Authentication Header IPSEC (authentication and integrity)
107
PEM
Privacy Enhanced Mail A common format for PKI certificates. Can use either CER(ASCII) or DER(Binary). Can be used for almost any types of certificates
108
CER (2)
Canonical Encoding Rules / Crossover Error Rate
109
IRP
Incident Response Plan
110
DER
Distinguished Encoding Rules Base formation for PKI certificates Base 64 binary encoded files
111
GCM
Galios Counter Mode Combines counter(CTM) mode with hashing techniques for data authenticity and confidentiality
112
ABAC
Attribute Based Access Control
113
EAP-FAST
Extensible Authentication Protocol-Flexible Authentication via Secure Tunnel EAP-FAST supports certificates
114
ESP
Encapsulating Security Payload An option with IPSec to provide confidentiality, integrity and authentication
115
Ephemeral Keys
Ephemeral Keys have a very short lifetime
116
FDE
Full Disk Encryption
117
PBKDF2
Password-Based Key Derivation Function 2 Key stretching technique
118
PAP
Password Authentication Protocol Older authentication protocol where passwords or pins sent across network in clear text
119
S/MIME
Secure Multi-Purpose Internet Mail Extensions
120
SoC
System on a Chip Many mobile devices include an SoC
121
DES
Data Encryption Standard Legacy symmetric encryption standard. It has been compromised and AES and 3DES should be used instead.
122
TOTP
Time Base One Time Password
123
XSRF
Cross Site Request Forgery Tricks users into performing actions on websites such as making purchases without their knowledge.
124
TPM
Trusted Platform Module TPM (Trusted Platform Module) is a computer chip (microcontroller) that can securely store artifacts used to authenticate the platform (your PC or laptop). These artifacts can include passwords, certificates, or encryption keys.
125
UAVs
Unmanned Aerial Vehicles
126
SRTP
Secure Real-Time Transport Protocol RTP is used for audio/video streaming
127
SSID
Service Set Identifier
128
NONCE
A Number Used Once Cryptography elements frequently use a none to add randomness
129
UEFI
Unified Extensible Firmware Interface
130
TACACS+
Terminal Access Controller Access - Control System Plus Alternative to RADIUS
131
TKIP
Temporal Key Integrity Protocol
132
DEP
Data Execution Prevention
133
PIV
Personal Identity Verification Card Like our FOB. used by Federal Agencies
134
P7B-PKCS#7
PKI Certificates CER Based (ASCII) Commonly used to share public keys
135
OCSP
Online Certification Status Protocol Alternative to using CRL
136
DSA
Digital Signature Algorithm Encrypted hash of a message used for authentication, non-repudiation and integrity. The senders private key encrypts the hash of the message.
137
HMAC
Hash Based Message Authentication Code Algorithm used to verify integrity and authenticity of a message with the use of a shared secret. Typically combines with another hashing algorithm such as SHA
138
RSTP
Rapid Spanning Tree Protocol improvement of STP to prevent switching loop prolems
139
CASB
Cloud Access Security Broker
140
KDC
Key Distribution Center Also knowns as a TGT Server
141
SAML
Security Assertion Markup Language
142
RIPEMD
Race Integrity Primitives Evaluation Message Digest Hash function used for integrity. Fixed length hashes of 128,160, 256 or 320 bits
143
Blowfish
Symmetric block cipher 64 Bit Blocks keysize between 32 and 448
144
PFX
Personal Information Exchange Common format for PKI certificates Predecessor to P12 Certificates
145
BPA
Business Partners Agreement
146
CBC
Cipher Block Chaining Used by symmetric encryption ciphers Uses IV for the first block and each subsequent block is combined with the previous block
147
CCMP
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol Based on AES and used with WPA2 for wireless security
148
ARO
Annualized Rate of Occurrence Quantitative Risk Assessment
149
CAC
Common Access Card Used by Department of Defense
150
NFC
Near Field Communication Allows mobile devices to communicate with nearby mobile devices
151
ICS
Industrial Control System Controls large Systems (Power Plants) SCADA system controls the ICS
152
PEAP
Protected Extensible Authentication Protocol Extension of EAP used with 802.1x Requires a certificate on the 802.1x server
153
SCADA
Supervisory Control and Data Aquisition
154
LDAPS
Lightweight Directory Access Protocol Secure Encrypts LDAP with TLS
155
LDAP
Lightweight Directory Access Protocol
156
SATCOM
Satellite Communications
157
SaaS
Software as a Service
158
MAC
Media Access Control / Mandatory Access Control
159
MOU / MOA
Memorandum of Understanding and Memorandum of Agreement Compare this with ISA
160
DDoS
Distributed Denial of Service
161
PaaS
Platform as a Service
162
DNS
Domain Name System DNS Poisoning corrupts DNS results. DNSSEC helps prevent DNS poisoning.
163
COPE
Company Owned Personally Enabled
164
CRL
Certificate Revocation List
165
ROUS
Rodents of Unusual Size Princess Bride
166
RTOS
Real Time Operating System
167
RBAC
Role Based Access Control
168
RB-RBAC
Rule Based Access Control
169
PVC
Permanent Virtual Cicuit