Security +601 Acronyms and Definitions Flashcards

1
Q
  • Deprecated and considered insecure. Replaced by AES
  • Symmetric
  • Applies the DES cipher algorithm 3 times to each data block
A

3DES (Triple Digital Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Often used to describe RADIUS, or some other form of networking protocol that provides Authentication, Authorization, and Accounting

A

AAA (Authentication, Authorization, and Accounting)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Database and identity service used to provide identity management

A

Active Directory (AD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Set of rules that allow/permit or deny any traffic flow through routers
  • Looks at the packet to determine whether it should be allowed or denied
  • Works at layer 3 toprovide security by filtering & controlling the flow of trafficfrom one router to another
A

ACL (Access Control List)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Industry-standard for data security
  • 128-bit, 192-bit, or 256-bit (strongest) implementations
A

AES (Advanced Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • This is the 256-bit implementation of AES
  • The 256 references the bit size of keys
A

AES256 (Advanced Encryption Standards 256bit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Used to authenticate origins of packets of data transmitted
  • These headers don’t hide any data from attackers, but they do provide proof that the data packets are from a trusted source and that the data hasn’t been tampered with
  • Helps protect against replay attacks
A

AH (Authentication Header)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the theory and development of computer systems able to perform tasks that normally require human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.

A

AI (Artificial Intelligence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • DHS and CISA free program
  • Enables organizations to share and receive machine-readable cyber threat indicators (CTIs) and defensive measures (DMs) in real-time
  • Useful to monitor and defend networks against known threats
A

AIS (Automated Indicator Sharing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

can expect x number of devices to fail per year

A

ALE (Annualized Loss Expectancy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Networking hardware device that provides Wi-Fi access, typically then connected via wire to the router, or directly integrated in the router itself

A

AP (Access Point)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • used to allow applications to talk to one another
  • For example: an application can query an API to retrieve data and then display that data or process it in some way
A

API (Application Programming Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stealthy threat actor (usually nation-state or state-sponsored group) that gains unauthorized access to a system and remains undetected for a period of time

A

APT (Advanced Persistent Threat)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The calculated probability that a risk will occur in a given year

A

ARO (Annualized Rate of Occurrence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Helps connect IP devices to MAC addresses

A

ARP (Address Resolution Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Prevent exploitation of memory corruption vulnerabilities

A

ASLR (Address Space Layout Randomization)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • Microsoft server-side scripting language and engine to create dynamic web pages
A

ASP (Active Server Page)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • Knowledge base framework of adversary tactics and techniques based on real-world observations
  • Helpful to build effective threat models and defenses against real threats
A

ATT&CK Adversarial Tactics, Techniques, and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Terms that users must accept in order to use a network, system, website, etc…

A

AUP (Acceptable Use Policy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  • Typically uses signature-based detection
  • Not effective against zero-days or polymorphic malware
A

AV (Antivirus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • Powerful UNIX shell and command language
  • Used to issue commands that get executed, which can also be turned into shell scripts
  • Often used for automation
A

BASH (Bourne Again Shell)

22
Q
  • Plan used to create processes and systems of both prevention and recovery to deal with threats that a company faces
  • This plan outlines how a business can continue delivering products and services if crap hits the fan
A

BCP (Business Continuity Planning)

23
Q

Used to predict the consequences a business would face if there were to be a disruption

A

BIA (Business Impact Analysis)

24
Q
  • The postal service of the Internet”
  • finds the best route for data to travel to reach its destination
A

BGP (Border Gateway Protocol)

25
Q
  • Firmware that performs hardware initialization when systems are booting up, and to provide runtime services for the OS and programs
  • First software to run when you power on a device
A

BIOS (Basic Input/Output System)

26
Q

Defines a contract between two or more parties as to how a business should run

A

BPA (Business Partnership Agreement)

27
Q
  • Frames that have spanning tree protocol information
  • Switches send these with a unique source MAC address to a multicast address with a destination MAC
A

BPDU (Bridge Protocol Data Unit)

28
Q

When employees use personal devices to connect to their organization’s networks and access work-related systems

A

BYOD (Bring Your Own Device)

29
Q
  • An organization that validates the identities of entities through cryptographic keys by issuing digital certificates
A

CA (Certificate Authority)

30
Q

Smart card for active-duty personnel

A

CAC (Common Access Card)

31
Q
  • These are the “problems” you have to solve from time to time to make sure that you are not a robot
  • Typically used for forms (signup, login, purchase, search, etc…) to defend against bots
A

CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)

32
Q

Lists defects that need to be rectified

A

CAR (Corrective Action Report)

33
Q
  • Acts as an intermediary between the cloud and on-premises
  • Monitors all activity
  • ## Enforces security policies
A

CASB (Cloud Access Security Broker)

34
Q
  • CBC is a mode of operation for block ciphers
  • Block ciphers (for encryption) by themselves would only work for a single block of data…a mode of operation like CBC can be used to give instructions on how to apply encryption to multiple blocks of data
  • CBC helps prevent issues of identical blocks, even if you have identical inputs. It does that by using an operation called XOR (exclusive-OR)
  • Each block gets XORed with the previous ciphertext before being encrypted (the first block uses an initialization vector, aka IV)
  • CBC requires that blocks be processed in order, so you can’t parallelize encryption which means it runs slower than some of the other modes (ie: ECB)
  • Think of CBC as building a chain from left to right
  • CBC does have vulnerabilities, including POODLE and Goldendoodle
A

CBC (Cipher Block Chaining)

35
Q
  • An online, self-paced, and interactive training system
  • Students can set their own goals and learn at their own pace
A

CBT (Computer-based Training)

36
Q

Encryption protocol designed for Wireless LAN products

A

CCMP (Counter-Mode/CBC-Mac Protocol)

37
Q
  • Camera monitoring system, especially one that transmits back to a centralized location with a limited number of monitors
  • Could be monitored by security personnel or simply set to record
A

CCTV (Closed Circuit Television)

38
Q
  • Expert group that handles computer security incidents
  • Could also be called CSIRT, which is short for Computer Security Incident Response Team
A

CERT (Computer Emergency Response Team)

39
Q
  • ## When a mode of operation uses the ciphertext from the previous block in the chain
A

CFB (Cipher Feedback)

40
Q
  • Authenticates a user or network host to an authenticating entity
  • Provides protection against replay attacks
  • Requires that both the client and server know the plaintext of the secret, but it’s never sent over the network
A

CHAP (Challenge Handshake Authentication Protocol)

41
Q
  • Company executive responsible for implementing and managing IT
  • Mostly considered to be IT generalists
  • Useful way to think about it: CIO aims to improve processes within and for the company
A

CIO (Chief Information Officer)

42
Q
  • CTO is different from CIO, and typically focuses on development, engineering, and research & development departments
  • Useful way to think about it: CTO uses technology to improve or create products and services for customers
A

CTO (Chief Technology Officer)

43
Q
  • Executives that specialize in security
  • Much more focused of a responsibility than CIO
A

CSO (Chief Security Officer)

44
Q

a security solution that enforces policy on devices that access networks to increase network visibility and reduce risk

A

NAC (network access control)

45
Q

Non-profit organization that helps put together, validate, and promote best practices to help people, businesses, and governments protect themselves against cyber threats

A

CIS (Center for Internet Security)

46
Q

Blank is computer software used to manage the creation and modification of digital content. Blank is typically used for enterprise content management and web content management. An example is WordPress

A

CMS (Content Management System)

47
Q
  • Effort for agencies to make sure they can continue operations during a wide range of emergencies
  • Requires planning for various types of events such as natural or human-caused disasters
A

COOP (Continuity of Operation Planning)

48
Q

Organization provides its employees with mobile computing devices

A

COPE (Corporate Owned Personal Enabled)

49
Q

Used to restore systems and information in the event that systems become compromised

A

CP (Contingency Planning)

50
Q

Used to detect accidental changes in digital networks and storage devices

A

CRC (Cyclical Redundancy Check)