Security+ Acronyms II - Review Flashcards
MaaS?
Monitoring as a Service
MAC?
Mandatory Access Control
- Address control used to limit access to resources based on the sensitivity of the information that the resource contains and the authorization of the user.
- Uses labels which are made up of a security level and zero or more security categories.
- Security levels indicate a level or hierarchical clasification of the information - confidential or restricted.
- Security categories define the category or group to which the information belongs.
- If the user does not have the proper label for a piece of information, they cannot access it.
Media Access Control
- Sublayer of the Data Link Layer (DLL) in the seven-layer OSI Network reference model.
- MAC is responsible for the transmission of data packets to and from the Network-Interface Card (NIC), and to and from another remotely shared channel.
Message Authentication Code
- Authenticates the source of a message and its integrity.
- Piece of information used to authenticate a message and make sure it came from the intended sender without any unintended modifications.
MAM?
Mobile Application Management
- Used to control enterprise applications and app data on end uer’s devices.
- Provides application-level control to IT admins.
- Different from MDM because MDM aims to control the entire mobile device and requires a service agent to be running on the mobile device.
- MAM instead focuses purely on Apps and their DATA.
- Functions of MAM:
- Control Installation, Updating, Removal of Apps
- Remote Wipe
- Application Usage Monitor
- Control User/Group Access
- Control User Authentication
MAN?
Metropolitan Area Network
- Computer Network larger than a single building.
- Think CITY
MBR?
Master Boot Record
- Special type of boot sector at the very begining of partitioned storage
- Holds information about how logical partitions are organized.
MD5?
Message Digest 5
- Hash function that can very easily be cracked.
MDF?
Main Distribution Frame
MDM?
Mobile Device Management
- Softare that allows administration of devices as a whole.
- Different from MAM because MAM focuses on specific applications while MDM focuses on controlling the entire device.
MFA?
Multifactor Authentication
MFD?
Multi-Function Device
- Device that incorperates the functionality of multiple other devices.
MFP?
Multi-Function Printer
- A Printer that includes Fax, Scanning, Copy, etc…
MITM?
Man-in-the-Middle
- Attack that interrupts a data transfer to eavesdrop.
- Also known as On-Path Attack
- Intercepts packet traffic, gets in the middle of traffic streams to listen in.
ML?
Machine Learning
MMS?
Multimedia Message Service
- Used to send messages that include multimedia content.
MOA?
Memorandum of Agreement
- Legally-binding agreement between two parties.
MOU?
Memorandum of Understanding
- Non-Legally Binding agreement.
- Used to signal willingness between parties to move forward with a contract.
MPLS?
Multi-Protocol Label Switching
- Routing technique to direct data from one note to the next based on the short path labels.
MSA?
Mesurement Systems Analysis
- Mathematical method of determining the amount of variation that exists within a measurement process.
MSCHAP?
Microsoft Challenge Handshake
- Encrypted authentication used in a Wide Area Network (WAN)
- Authentication protocol
MSP?
Managed Service Provider
MSSP?
Managed Security Service Provider
MTBF?
Mean Time Between Failures
- Predicted time Between Failures of a System
MTTF?
Mean Time To Failure
- Used to predict when a system will fail (and can’t be repaired)
MTTR?
Mean Time To Recover
- AKA - Mean Time To Restore
- Average time it takes to recover from a system failure.
MTU?
Maximum Transmission Unit
- Largest packet or frame size that can be sent in a packet or frame-based Network such as the Internet.
NAC?
Network Access Control
- Provides visibility, access control, and compliance
- Can define an implement strict access management controls for Networks.
- Centralized solution to end-point Security
- Uses IEEE 802.1x Standard
- Usually works with TACACS or RADIUS to verify authentication
NAS?
Network Attached Storage
NAT?
Network Address Translation
NDA?
Non-Disclosure Agreement
NFC?
Near Field Communication
- Mobile Payment
- Key Cards
- Smart Cards
NFV?
Network Functions Virtualization
- Virtualizes entire classes of Network node functions into building blocks.
NIC?
Network Interface Card
NIDS?
Network-based Intrusion Detection System
- Detects malicious traffic on a Network
- Detects & Alerts, does not Prevent.
NIPS?
Network-based Intrusion Protection System
- Detects, Alerts, and PREVENTS malicious traffic on a Network.
NIST?
National Institute of Standards & Technology
NNTP?
Network News Transfer Protocol
- TCP
- PORT 119
- Used to transport Usenet Articles.
NTFS?
New Technology File System
- Used by Windows NT to store, organize, and find files on an HD efficiently.
NTLM?
New Technology LAN Manager
- Used to authenticate user identity and protect the integrity and confidentiality of their activity.
- SSO tool
- Relies on a challenge-response protocol to confirm the user without requiring them to submit a password.
- Has known vulnerabilities and is typically only still used for legacy clients and servers.
- Replaced by Kerberos
- Relies on a three-way handshake between the client and server to authenticate a user, while Kerberos uses a two-part process that leverages a Ticket granting service or Key Distribution Center (KDC)
NTP?
Network Time Protocol
- UDP Port 123
- Syncs Network Time
OAUTH?
Open Authentication
- Token-based Authentication
- Lets organizations share info across third-party services without exposing their users - usernames/passwords.
OCSP?
Online Certificate Status Protocol
- Used by Certification Authority (CAs) to check the revocation status of an X.509 Digital Certificate
OID?
Object Identifier
- Standard for naming any object, concept, or thing.
OS?
Operating System
OSI?
Open Systems Interconnection
- Conceptual model.
OSINT?
Open Source Intelligence
OSPF?
Open Shortest Path First
- Distributes Routing information between other Routers automatically.
OT?
Operational Technology
- Hardware/Software that detects or causes a change by directly monitoring and/or controlling industrial equipment, assets, processes, and events.
OTA?
Over the Air
- Pushing updates for software, configuration settings, or even encryption keys, on remote devices.
OTG?
On the Go
OVAL?
Open Vulnerability Assessment Language
- Community standard to promote open and publicly available security content, and to standardize the transfer of this information.
OWASP?
Open Web Application Security Project
P12?
Public Key Cryptography Standards 12
- Archive file format for storing cryptography objects as a single file.
- Used to bundle a private key with its X.509 certificate, or to bundle the members of a chain of trust.
- Think of it as a container for X.509 public key certs, private keys, CRLs, and generic data.
P2P?
Peer-to-Peer
PaaS?
Platform as a Service
- Think of it as Infrastructure as a Service except you’re bringing in all that Cloud Hardware/Resources for a specific purpose, to develop something.
PAC?
Proxy Auto Configuration
- Used to define how web browsers and other user agents can automatically choose the appropriate proxy server for fetching URLs.
- Contains a JavaScript function that returns a string with one or more access method specifications.
PAM?
Privileged Access Management
- Safeguarding identities with special access or admin capabilities.
Pluggable Authentication Modules
- Used to separate the tasks of authentication from applications
- Apps can call PAM libraries to check permissions.
PAP?
Password Authentication Protocol
- Two-way Handshake to provide the peer system with a simple method to establish its identity.
PAT?
Port Address Translation
PBKDF2?
Password-Based Key Derivation Function v2
- Key derivation functions with a sliding computation cost, which is used to reduce vulnerabilities of brute-force attacks.
- Applies a pseudorandom function (Like HMAC) to the input password along with a salt value, and repeats this process multiple times to produce a derived Key.
- Derived Key can then be used as a cryptographic key.
PBX?
Private Branch Exchange
- Telephone system that swithces calls between users on local line
- Multiline telephone system
PCAP?
Packet Capture
- Collects and Records packet data from a Network which can then be analyzed in a Packet Analyzer.
PCI DSS?
Payment Card Industry Data Security Standard
- Security standards to use when accepting, processing, storing, and/or transmitting credit card information.
PDU?
Power Distribution Unit
- Provides multiple electric power outputs.
PEAP?
Protected Extensible Authentication Protocol
- Provides a method to transport securely authenticated data including legacy password-based protocols, via 802.11 WIFI.
PED?
Personal Electronic Device
- Devices like phones, laptops, pagers, radios, tablets, etc…
PEM?
Privacy Enhanced Mail
- File format for storing and sending cryptographic keys, certificates and other data.
- For example, when using SSH, you will often use a .pem file.
- Encodes the binary data using base64.
- Starts with —–BEGIN a label and then —–
PFS?
Perfect Forward Secrecy
- Feature of specific key agreement protocols that gives assurances that session keys will not be compromised, even if long-term secrets used in the session key exchange are compromised.
- Example: HTTPS, the long-term secret is usually the private key of the server.
PFX?
Personal Information Exchange
PGP?
Pretty Good Privacy
- Encryption program used to provide cryptographic privacy and authentication for data communication.
- Useful for signing, encrypting, and decrypting texts, emails, files, directories, and whole disk partitions.
PHI?
Personal Health Information
PII?
Personal Identifiable Information
PIV?
Personal Identity Verification
- MFA on a Smartcard
- Used for identity proofing.
PKCS?
Public-Key Cryptography Standards
- Group of standards for Public Keys.
PKI?
Public Key Infrastructure
- Roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke Digital Certificates and manage public-key encryption.
POP?
Post Office Protocol
- TCP
- PORT 110
- Used to RECEIVE Email from a Mail Server
- UNENCRYPTED
POP SSL/TLS
- TCP
- PORT 995
- Used to RECEIVE email from Mail Servers using an SSL/TLS Encrypted connection.
POTS?
Plain Old Telephone Service
PPP?
Point-to-Point Protocol
- Communication between two Routers directly without any hosts or other Networks in between.
- Data Link Layer
PPTP?
Point-toPoint Tunneling Protocol
- TCP/UDP
- PORT 1723
- Obsolete method of implementing Virtual Private Networks (VPN)
PSK?
Pre-Shared Key
- Shared Secrets sent using a Secure channel before it needs to be used.
PTZ?
Pan-Tilt-Zoom
- Camera that can be remotely controlled, including zoom and directional controls.