Security + Acronyms Flashcards

Need To Know 1,2

1
Q

SSH

A

(Secure Shell)

A protocol for secure remote access to computers. Like a secure tunnel for logging into servers. It’s a type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ISP

A

(Internet Service Provider)

A company that provides access to the internet and related services, such as email, web hosting, and domain registration. Think of it as the company that connects you to the internet, like your gateway to the online world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AUP

A

(Acceptable Use Policy)

A document stipulating a set of rules that define how users can and cannot use an organization’s IT resources, such as networks, devices, and software. Think of it as a rulebook for using company technology responsibly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RBAC

A

(Role-Based Access Control)

Permissions are assigned based on roles instead of individuals. Users are grouped into roles (e.g., “Admin,” “HR,” “Finance”), and roles determine what actions they can perform. Common in enterprise environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SSO

A

(Single Sign-On)

A system that allows users to log in once and gain access to multiple applications without needing to log in again for each service. Common in corporate environments, it simplifies login processes while improving security by centralizing authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PKI

A

(Public Key Infrastructure)

A framework that uses cryptographic keys and digital certificates to secure communications and verify identities. It enables secure data exchange, encryption, and authentication. Think of it as a digital ID system that ensures secure online interactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BPA

A

(Business Partnership Agreement)

A formal agreement between two or more businesses that defines how they will work together, including profit-sharing, decision-making, and dispute resolution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HTTPS

A

(Hypertext Transfer Protocol Secure)

A secure version of HTTP that encrypts data between a web browser and a website using SSL/TLS. It protects sensitive information like passwords and credit card details from being intercepted by attackers. Look for the padlock icon in the browser to know a site is using HTTPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTTP

A

(Hypertext Transfer Protocol)

The standard protocol used for transmitting web pages and other data over the internet. It is not encrypted, making it susceptible to attacks like MITM (Man-in-the-Middle) and eavesdropping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

UEFI

A

(Unified Extensible Firmware Interface)

A modern replacement for BIOS that provides faster boot times, support for larger hard drives, and improved security features like Secure Boot. Think of it as the upgraded, smarter version of BIOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BIOS

A

(Basic Input/Output System)

Firmware used to perform hardware initialization during the boot process and to provide runtime services for operating systems. It’s the first software that runs when a computer starts. Think of it as the computer’s “wake-up call” to get everything ready.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SDLC

A

(Software Development Life Cycle)

The process used to design, develop, test, and deploy software. It includes phases like planning, design, coding, testing, and maintenance. Think of it as the roadmap for building and maintaining software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

UTM

A

(Unified Threat Management)

A comprehensive security solution that combines multiple security features into a single device or platform, such as a firewall, antivirus, intrusion detection, and content filtering. Think of it as an all-in-one security appliance for your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WTLS

A

(Wireless Transport Layer Security)

A security protocol for wireless networks, similar to TLS but optimised for mobile devices. Like HTTPS for older mobile networks. It’s a protocol designed to secure data transmitted over WLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DPO

A

(Data Protection Officer)

A specialist who ensures that a company complies with data privacy laws (e.g., GDPR, HIPAA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DNS

A

(Domain Name System)

A system that translates human-readable domain names (like www.example.com) into IP addresses that computers use to identify each other on the network. Think of it as the phonebook of the internet.

17
Q

OSINT

A

(Open Source Intelligence)

The collection and analysis of information from publicly available sources, such as social media, websites, and news articles, for intelligence or investigative purposes. Think of it as detective work using publicly available clues.

18
Q

PSK

A

(Pre-Shared Key)

A shared secret authentication method used in (WPA, WPA2, and EAP). Like a secret handshake for a club.

19
Q

NAT

A

(Network Address Translation)

A technique used to map private IP addresses on a local network to a single public IP address for communication over the internet. It helps conserve IP addresses and adds a layer of security. Think of it as a translator that lets multiple devices share one public address.

20
Q

HDD

A

(Hard Disk Drive)

A traditional storage device that uses spinning magnetic disks to store and retrieve data. It’s slower than SSDs but offers larger storage capacities at a lower cost. Think of it as a library with spinning shelves for storing data.

21
Q

DHCP

A

(Dynamic Host Configuration Protocol)

A network protocol that automatically assigns IP addresses and other network configuration settings (like subnet mask and gateway) to devices on a network. Think of it as an automatic address book for devices joining a network.

22
Q

MD5

A

(Message Digest 5)

A cryptographic hash function that produces a 128-bit hash value, often used for file checksums. However, it’s no longer secure for cryptographic purposes due to vulnerabilities.

23
Q

POP3

A

(Post Office Protocol version 3)

A protocol used to retrieve emails from a mail server to a local device. It typically downloads and deletes emails from the server, storing them locally. Think of it as a one-way email delivery system.

24
Q

WPA

A

(Wi-Fi Protected Access)

A security protocol designed to protect wireless networks. It replaced WEP and introduced stronger encryption and authentication to prevent hacking. Uses TKIP (Temporal Key Integrity Protocol) for better security than WEP but is still outdated. (Encryption Protocol) Better diary lock (still not great).

25
Q

SDN

A

(Software-Defined Networking)

A networking approach where software controls the traffic flow instead of traditional hardware. Like a traffic cop that can instantly change road layouts.

26
Q

ACL

A

(Access Control List)

A set of rules that controls who or what can access a resource (such as files, networks, or systems). It defines permissions like read, write, or execute for users or groups. Think of it as a VIP list that determines who gets in and what they can do, routers, switches and firewalls are examples of rule-based access control mechanisms.

27
Q

DLP

A

(Data Loss Prevention)

A set of tools and policies designed to prevent sensitive data from being leaked or stolen. It’s like putting a lock on your filing cabinet to keep important documents safe.