Full List Flashcards
CIA
- Confidentiality: prevent unauthorized information disclosure.
- Integrity: data remains unaltered
- Availability: information is accessible to authorized users
AAA
- Authentication: prove your identity, e.g. password
- Authorization: what resources you have access to.
- Accounting: record of the resources used, e.g. login time, logout time
PKI
Public Key Infrastructure: A system of policies, procedures, and technology for managing digital certificates to securely link public keys to people or devices, enabling trusted communication.
TPM
Trusted Platform Module: a microprocessor that provides cryptographic functions for a single device, e.g. storing BitLocker keys.
HSM
Hardware Security Module: a dedicated device for storing and managing encryption keys for many devices, typically used in large environments.
CA
Certificate Authority: A trusted organization that issues and manages digital certificates to verify the identity of entities.
CRL
Certificate Revocation List: list of invalidated certificates that’s maintained by the Certificate Authority.
OCSP
Online Certificate Status Protocol: real-time certificate validity checks through browser.
CSR
Certificate Signing Request: request the Certificate Authority to issue a digital certificate.
SMS
Short Message Service: a text messaging service that allows the exchange of short text messages between mobile devices.
IM
Instant Messaging: the exchange of near-real-time messages through online software.
MSP
Managed Service Providers: A company that manages IT infrastructure and services for organizations remotely.
TOC/TOU
Time-of-check to Time-of-use: exploiting the gap between verification and execution in race conditions. A race condition is exploiting processes running simultaneously.
SQLi
Structured Query Language injection: injecting malicious SQL commands into a database query.
XSS
Cross Site Scripting: injecting scripts into web pages viewed by users.
VM escape
Virtual Machine escape: gaining access to a host from a virtual machine.
RFID cloning
Radio Frequency Identification cloning: duplicating RFID cards or tags.
DDoS
Distributed Denial of Service: flooding a service with requests from several computers to cause downtime.
DNS attack
Domain Name System: exploiting vulnerabilities in DNS to redirect traffic from a website.
IoT
Internet of Things: A network of interconnected devices that communicate and exchange data over the internet.
VLAN
Virtual Local Area Network: a network segmentation technique that groups devices logically to improve performance and security
ACL
Access Control List: a list of rules that lists access permissions based on an allow/deny list.
HIPS
Host-based Intrusion Prevention System: a security software that detects and prevents unauthorized access to a system on a host.
IaC
Infrastructure as Code: Managing and provisioning infrastructure through code, useful in software development to build, test, and deploy applications.
SDN
Software-defined Networking: network infrastructure that enables the network to be centrally controlled using software applications.
ICS/SCADA
Industrial Control Systems & Supervisory Control and Data Acquisition System: systems used to monitor and control industrial processes, e.g. power generation, energy, manufacturing.
RTOS
Real-time Operating System: low-latency systems with high security demands, an OS with deterministic processing schedule, e.g. military environments.
IPS/IDS
Intrusion Prevention/Detection System: designed to monitor and alert (IDS) or actively block (IPS) malicious activities in a network.
PSK
Pre-shared Key: A shared password used for authentication in wireless networks like WPA2/WPA3.
EAP
Extensible Authentication Protocol: authentication framework for secure communication, can be used withan authentication database like RADIUS, LDAP, or TACACS+.
802.1X
IEEE 802.1X: port-based network access control that authenticates users using EAP
WAF
Web Application Firewall: a firewall that protects against web threats like SQL injection, it applies rules to HTTP/HTTPS conversations.