Security+ Set A Flashcards
AAA (Authentication, Authorization, Accounting)
security concept where a centralized platform verifies subject identification, ensures subject is assigned permissions, and then logs these actions to create an audit trail.
ABAC (attribute-based access control)
an access control technique that evaluates a set of attributes that each subject possesses to determine if access should be granted.
ACL (Access Control List)
A collection of access control entries (ACEs) that determines which subjects are allowed or denied access to the object and the privileges given.
AES (Advanced Encryption Standard)
A symmetric 128-, 192-, 256-bit block cipher based on the Rijndael algorithm developed by Belgian cryptographers Joan Daemen and Vincent Rijmen and adopted by the U.S. government as its encryption standard to replace DES.
AH (Authentication header)
An IPSec protocol that provides authentication for the origin of transmitted data as well as integrity and protection against replay attacks.
AIS (automated indicator sharing)
threat intelligence data feed operated by the DHS.
ALE (annual loss expectancy)
the total cost of a risk to an organization on an annual basis. This is determined by multiplying the SLE by the annual rate of occurrence (ARO).
AP (access point)
A device that provides a connection between wireless devices and can connect to wired networks. Also known as wireless access point or WAP.
API (application programming interface)
A library of programming utilities used, for example, to enable software developers to access functions of the TCP/IP network stack under a particular operating system.
APT (advanced persistent threat)
an attacker’s ability to obtain, maintain, and diversify access to network systems using exploits and malware.
ARO (annual rate of occurrence)
in risk calculation, an expression of the probability/likelihood of a risk as the number of times per year a particular loss is expected to occur.
ARP inspection
an optional security feature of a switch that prevents excessive ARP replies from flooding a network segment.
ARP poisoning (ARP spoofing)
network based attack where an attacker with access to the target local network segment redirects an IP address to the MAC address of a computer that is not the intended recipient. This can be used to perform a variety of attacks, including DoS, spoofing, and Man-in-the-Middle.
ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge)
a knowledge base maintained by the MITRE corporation for listing and explaining specific adversary tactics, techniques, and procedures.
Agile model (Agile)
A software development model that focuses on iterative and incremental development to account for evolving requirements and expectations.