O Flashcards
OAUTH
Open Authorization
This is an AUTHORIZATION PROTOCOL! NOT an authentication protocol.
A standard designed to allow a website or application to access resources hosted by other web apps on behalf of a user.
OCSP
Online Certificate Status Protocol
A protocol that is used to check the revocation status of digital certificates.
OID
Object Identifier
A globally unique identifier of a data object represented by a string of numbers and decimals.
OS
Operating System
Software that manages the computer’s memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer’s language.
OSINT
Open-Source Intelligence
Intelligence produced by collecting, evaluating and analyzing publicly available information with the purpose of answering a specific intelligence question.
OSPF
Open Shortest Path First
An IP routing protocol that uses a mathematical algorithm to calculate the most efficient path to direct traffic on IP networks.
OT
Operational Technology
The hardware and software that monitors and controls devices, processes, and infrastructure, and is used in industrial settings. It controls and monitors physical equipment and processes in industries like manufacturing and energy. They focus on real-time management to ensure efficiency and safety.
IT systems, on the other hand, are designed to collect, process, and store data, assisting in business decision-making and communication. IT combines technologies for networking, information processing, enterprise data centers, and cloud systems.
OTA
Over The Air
A technology that updates and changes data in the SIM card without having to reissue it.
It communicates with a SIM card, downloads apps to it, and manages it without being physically connected to the card.
This software download takes place over a cellular network or Wi-Fi connection and is delivered remotely.
OVAL
Open Vulnerability Assessment Language
A component of SCAP
Declarative language for making logical assertions about the state of a system. It is the main component of the SCAP standard. It is used to describe security vulnerabilities or desired configuration of systems.
–
A community-developed language for determining vulnerability and configuration issues on computer systems.
An international, information security, community standard to promote open and publicly available security content, and to standardize the transfer of this information across the entire spectrum of security tools and services.
OVAL includes a language used to encode system details, and an assortment of content repositories held throughout the community.