Security+ Acronyms Flashcards
NAT
Network Address Translation
APIPA
Automatic Private IP Addressing
VLAN
Virtual LAN
OSI
Open Systems Interconnect
Mbps
Megabits Per Second
UTP
Unshielded Twisted Pair
BNC
British Naval Connector
AUI
Adapter Unit Interface
STP
Shield Twisted Pair
ST
Straight-tip
SC
Subscriber Connector
TCP/IP
Transmission Control Protocol/Internet Protocol
DHCP
Dynamic Host Configuration Protocol
ACK
Acknowledgment
ISN
I
ISN
Initial Sequence Number
SYN
Sequence Number
SCP
Secure copy
802.1x
A port-based authentication protocol. Wireless can use 802.1x.
3DES
Triple Data Encryption Standard - A symmetric algorithm used to encrypt data and provide confidentiality. It is a block cipher that encrypts data in 64-bit blocks.
AAA
Authentication, Authorization, and Accounting -nAAA
ACE
Access Control Entry - Identifies a user or group that is granted permission to a resource. ACEs are contained with in DACL in NTFS.
ACK
Acknowledge - A packet in a TCP handshake. In a SYN flood attack, attackers send the SYN packet, but don’t complete the handshake after receiving the SYN/ACK packet.
ACL
Access Control List - Routers and packet- filtering firewalls perform basic filtering using and ACL to control traffic based on networks, subnets, IP addresses, ports, and some protocols.
In NTFS, a list of ACEs make up the ACL for a resource.
AES
Advanced Encryption Standard - A Symmetric algorithm used to encrypt data and provide confidentiality.
AES is a block cipher and it encrypts data in 128-bit blocks. It is quick, highly secure, and used in wide assortment of Cryptography schemes.
It includes key sizes of 128 bits, 192 bits, and 256 bits.
AES-256
Advanced Encryption Standard 256 bits.
AES sometimes includes the number of bits used in the encryption keys and AES-256 uses 256-bit encryption keys.
Blowfish is quicker than AES-256.