More Acronyms Flashcards
FTP-S
File Transfer Protocol - Secure. FTPS uses SSL, SFTP uses SSH (secure shell FTP). They are not the same..
GCM
Galois Counter Mode : mode of operation for symmetric-key cryptographic block ciphers which is widely adopted for its performance
GDPR
General Data Protection Regulation: data collected on EU citizens must be stored in the EU
GPG
GNU Privacy Guard
GPO
Group Policy Object
GPS
Global Positioning System
GPU
Graphics Processing Unit
GRE
Generic Routing Encapsulation
HA
High Availability
HDD
Hard Disk Drive
HIDS
Host Based Intrusion Detection System
HIPS
Host Based Intrusion Prevention System
HMAC
Hashed message Authentication Code
HOTP
HMAC-based One Time Password
HSM
Hardware Security Module
HTML
Hypertext Markup Language
HTTP/HTTPS
Hypertext Transfer Protocol / sSL/TLS
IaaS
Infrastructure as a Service
ICMP
Internet Control Message Protocol
ICS
Industrial Control System- A network that manages embedded devices.
ID
Identification
IDEA
International Data Encryption Algorythm
IDF
Intermediate Distribution Frame
IdP
Identity Provider
IDS
Intrusion Detection System
IEEE
Institute of Electrical and Electronic Engineers
IIS
Internet Information System
IKE
Internet Key Exchange
IM
Instant Messaging
IMAP4, not authentication
Internet Message Access Protocol 4
IoT
Internet of Things
IP
Internet Protocol
IPSec
Internet Protocol Security
IR (two different cases)
Incident Response and Infrared
IRC
Internet Relay Chat
IRP
Incident Response Plan
ISA
Interconnection Security Agreement
ISP
Internet Service Provider
ISSO
Information Systems Security Officer
ITCP
IT Contingency Plan
IV
Initialization Vector
KDC
Key Distribution Center
KEK
Key Encryption Key
L2TP
Layer 2 Tunneling Protocol
LAN
Local Area Network
LDAP
Lightweight Directory Access Protocol
LEAP
Lightweight Extensible Access Protocol
MaaS
Monitoring as a Service
MAC (3 use cases)
Media Access Controller, Mandatory Access Control, Message Authentication Code
MAN
Metropolitan Area Network
MBR
Master Boot Record
MD5
Message Digest 5
MDF
Main Distribution Frame
MDM
Mobile Device Management
MFA
Multi Factor Authentication
MFD
Multi-Function Device
MITM
Man In The Middle
MMS
Multimedia Message Service
MOA
Memorandum of Agreement
MOU
Memorandum of Understanding
MPLS
Multi-Protocol Label Switching
MSCHAP
Microsoft Challange Handshake Authentication Protocol
MSP
Managed Service Provider
IoC
Indicators of Compromise - A type of forensic evidence that can be used to detect unauthorized access attempts or other malicious activities
MTBF and calculation
Mean Time Between Failures, # of operational hours/# of failures
MTTF
Mean Time To Failure
MTTR and calculation
Mean Time To Repair, total time spent o. Repairs/# of repairs
MTU
Maximum Transmission Unit
NAC
Network Access Control
NAT
Network Address Translation
NDA
Non-disclosure Agreement
NFC
Near Field Communication
NGAC
Next Generation Access Control
NIDS
Network Intrusion Detection System
NIPS
Network Intrusion Prevention System
NIST
National Institute of Standards and Technologies
NTFS
New Technology File System: timestamps are in GMT and not local to the computer.
NTLM
New Technology Lan Manager
NTP
Network Time Protocol
OAUTH
Open Authorization
OCSP
Online Certificate Status Protocol. PKI, checks validity of certificate in real tume
OID
Object Identifier
OS
Operating System
OTA
Over the Air
OVAL
Open Vulnerability Assignment Language
P12
PKCS12 - defines an archive file format for storing many cryptography objects as a single file. .p12 or .pfx file extensions.
P2P
Peer to Peer
PaaS
Platform as a Service
PAC
Proxy Auto Configuration
PAM
Pluggable Authentication Module
PAP, not access
Password Authentication Protocol
PAT
Port Address Translation
PBKDF2
Password-based Key Derivation Function 2 - Key stretching algorithm
PBX
Private Branch Exchange
PCAP
Packet Capture
PEAP
Protected Extensible Authentication Protocol
PED
Personal Electronic Device
PEM
Privacy-enhanced Electronic Mail -private key extension files: .crt, .pem, .cer, and .key
PFS
Perfect Forward Secrecy
PFX
Personal Information Exchange = .pfx file or password protected file
HID
Human Interface Device: mouse, wireless keyboards, etc
OSINT
Open Source Intellegence
NVD
National Vulnerability Database
STIX
Structured Threat Information eXpression: format to transfer threat data (AIS database)
TAXII
Trusted Automated eXchange of Indicator Information: securely share STIX data between organizations.