Security +601 Acronyms and Definitions Flashcards
- Deprecated and considered insecure. Replaced by AES
- Symmetric
- Applies the DES cipher algorithm 3 times to each data block
3DES (Triple Digital Encryption Standard)
Often used to describe RADIUS, or some other form of networking protocol that provides Authentication, Authorization, and Accounting
AAA (Authentication, Authorization, and Accounting)
Database and identity service used to provide identity management
Active Directory (AD)
- Set of rules that allow/permit or deny any traffic flow through routers
- Looks at the packet to determine whether it should be allowed or denied
- Works at layer 3 toprovide security by filtering & controlling the flow of trafficfrom one router to another
ACL (Access Control List)
- Industry-standard for data security
- 128-bit, 192-bit, or 256-bit (strongest) implementations
AES (Advanced Encryption Standard)
- This is the 256-bit implementation of AES
- The 256 references the bit size of keys
AES256 (Advanced Encryption Standards 256bit)
- Used to authenticate origins of packets of data transmitted
- These headers don’t hide any data from attackers, but they do provide proof that the data packets are from a trusted source and that the data hasn’t been tampered with
- Helps protect against replay attacks
AH (Authentication Header)
the theory and development of computer systems able to perform tasks that normally require human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.
AI (Artificial Intelligence)
- DHS and CISA free program
- Enables organizations to share and receive machine-readable cyber threat indicators (CTIs) and defensive measures (DMs) in real-time
- Useful to monitor and defend networks against known threats
AIS (Automated Indicator Sharing)
can expect x number of devices to fail per year
ALE (Annualized Loss Expectancy)
Networking hardware device that provides Wi-Fi access, typically then connected via wire to the router, or directly integrated in the router itself
AP (Access Point)
- used to allow applications to talk to one another
- For example: an application can query an API to retrieve data and then display that data or process it in some way
API (Application Programming Interface)
Stealthy threat actor (usually nation-state or state-sponsored group) that gains unauthorized access to a system and remains undetected for a period of time
APT (Advanced Persistent Threat)
The calculated probability that a risk will occur in a given year
ARO (Annualized Rate of Occurrence)
Helps connect IP devices to MAC addresses
ARP (Address Resolution Protocol)
Prevent exploitation of memory corruption vulnerabilities
ASLR (Address Space Layout Randomization)
- Microsoft server-side scripting language and engine to create dynamic web pages
ASP (Active Server Page)
- Knowledge base framework of adversary tactics and techniques based on real-world observations
- Helpful to build effective threat models and defenses against real threats
ATT&CK Adversarial Tactics, Techniques, and Common Knowledge
Terms that users must accept in order to use a network, system, website, etc…
AUP (Acceptable Use Policy)
- Typically uses signature-based detection
- Not effective against zero-days or polymorphic malware
AV (Antivirus)