Security + Acronyms Flashcards
Need To Know 3, 4
APT
(Advanced Persistent Threat)
A sophisticated, long-term cyberattack where attackers gain unauthorised access to a network and remain undetected for an extended period. Think of it as a digital spy infiltrating and staying hidden in your system.
RA
(Registration Authority)
An entity that verifies and validates user identities before issuing digital certificates, often working under a Certificate Authority (CA). Think of it as the middleman that checks your ID before giving you a digital passport.
TPM
(Trusted Platform Module)
A hardware chip on a computer’s motherboard that provides secure cryptographic functions, such as generating and supports secure boot encryption. Think of it as a built-in security vault for your device.
PBX
(Private Branch Exchange)
An internal phone system used by businesses to manage calls. These systems can be hacked to make unauthorized calls or steal sensitive communication data.
PAP
(Password Authentication Protocol)
A simple but weakest authentication method that sends usernames and passwords in plaintext, making it insecure for most modern applications. Think of it as sending a postcard with your login details, anyone can read it.
IoC
(Indicators of Compromise)
Signs that a system has been hacked (e.g., unusual network traffic, unauthorised logins). Like footprints at a crime scene.
EAP
(Extensible Authentication Protocol)
A multi-protocol authentication framework frequently used in 802.11 networks and point-to-point connections. It supports multiple authentication methods, making it flexible for different security needs.
ESP
(Encapsulating Security Payload)
A part of IPsec that provides authentication, integrity, and confidentiality (encrypts and authenticates) network packets/messages/mail. Like a locked and signed tamper proof envelop that has important cargo inside (the message in the envelop).
DSA
(Digital Signature Algorithm)
A cryptographic method for verifying the authenticity of a message or document. It ensures the sender is legitimate and that the message hasn’t been tampered with, Used to create digital signatures, which ensure the integrity and authenticity of data.
WIPS
(Wireless Intrusion Prevention System)
An advanced version of WIDS that not only detects threats but also takes action to block or contain them. It can disable rogue access points, prevent unauthorized connections, and enforce security policies to protect the wireless network.
PEDs
(Portable Electronic Devices)
Small, battery-powered devices like smartphones, tablets, and laptops that can be easily carried and used on the go. Think of it as your pocket-sized tech gadgets.
ISO
(International Organisation for Standardisation)
An organisation that develops a wide range of standards on a global level for various industries, including cybersecurity (e.g., ISO 27001 for information security management). Think of it as the gold standard for best practices worldwide.
TTP
(Tactics, Techniques, and Procedures)
The methods and behaviours used by attackers to carry out cyberattacks. Understanding TTPs helps defenders anticipate and stop threats. It’s like studying a burglar’s habits to protect your home.
WAF
(Web Application Firewall)
A security system that protects websites and web applications from attacks such as SQL injection, cross-site scripting (XSS), and other online threats. A dedicated security solution that filters, monitors, and blocks HTTP/HTTPS traffic between a web application and the Internet, Think of it as a security guard for websites that blocks malicious traffic while letting legitimate users in and who also filters, monitors, and blocks HTTP/HTTPS traffic between a web application and the Internet.
HIPS
(Host-Based Intrusion Prevention System)
Protects a single device by blocking attacks in real-time. Like a security guard stopping threats before they happen.
OSPF
(Open Shortest Path First)
A routing protocol used in networks to determine the best path for data to travel between devices. It’s dynamic and efficient, adapting to changes in the network. Think of it as a GPS for data packets.
CVSS
(Common Vulnerability Scoring System)
A standard used to rate the severity of vulnerabilities on a scale of 0 to 10, helping prioritize risk mitigation.
CHAP
(Challenge-Handshake Authentication Protocol)
An authentication method that uses a three-way handshake to verify a user’s identity without sending passwords in plaintext. Think of it as a secret handshake to prove who you are.
ECDSA
(Elliptic Curve Digital Signature Algorithm)
A cryptographic algorithm used for creating digital signatures, offering strong security with smaller key sizes compared to traditional methods. Think of it as a compact, high-security seal for digital documents.
RDP
(Remote Desktop Protocol)
A proprietary protocol developed by Microsoft that allows users to connect to and control a remote computer over a network. Think of it as a virtual window into another computer.
BCP
(Business Continuity Plan)
A plan that ensures an organisation can continue operating during and after a disruption, such as a cyberattack or natural disaster. Think of it as a survival guide for keeping the business running in tough times.
ICS
(Industrial Control System)
A system used to monitor and control industrial processes, such as manufacturing, energy production, or water treatment. Think of it as the brain behind automated factories and critical infrastructure.
L2TP
(Layer 2 Tunnelling Protocol)
A tunnelling protocol used to support virtual private networks (VPNs) but does not provide encryption on its own. It’s often paired with IPsec for security. Think of it as a tunnel for data, but without locks until you add IPsec.