SY0-701 : Objective 1.0 Flashcards
NIPS
Network Intrusion Prevention Systems (NIP)
- a combination of hardware and software that protects computer networks from malicious activity and unauthorized access
IDS
Intrusion Detection System (IDS)
- a cybersecurity solution designed to identify and generate alerts regarding potential intrusions
SIEM
Security Information and Event Management (SIEM)
- a security management system that helps organizations identify, analyze, and respond to security threats
NAC
Network Access Control (NAC)
- a security solution that enforces policy on devices that access networks to increase network visibility and reduce risk
DLP
Data Loss Protection (DLP)
- a cybersecurity solution that helps organizations detect and prevent data breaches and leaks
CIA
Confidentiality, Integrity, Availability (CIA)
AAA
Authentication, Authorization, and Accounting (AAA)
PKI
Public Key Infrastructure (PKI)
- refers to tools used to create and manage public keys for encryption, it is used to create, distribute, manage, store, and revoke digital certificates
CA
Certificate Authority (CA)
- a trusted entity that issues Secure Sockets Layer (SSL) certificates
RA
Registration Authority (RA)
- an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it
CRL
Certification Revocation List (CRL)
- a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their actual or assigned expiration date
OCSP
Online Certificate Status Protocol (OCSP)
- an alternative to the certificate revocation list (CRL) and is used to check whether a digital certificate is valid or if it has been revoked
CSR
Certificate Signing Request (CSR)
- a specially formatted encrypted message sent from a Secure Sockets Layer (SSL) digital certificate applicant to a certificate authority (CA)
WAF
Web Application Firewall (WAF)
- helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet
AES
Advanced Encryption Standard (AES)
RSA
Rivest, Shamir, & Adleman (RSA)
DSA
Digital Signature Algorithm (DSA)
- a FIPS (Federal Information Processing Standard) and public-key cryptosystem that’s used for digital signatures
PKCS
Public Key Cryptographic Standards (PKCS)
- a set of protocols that help ensure secure information exchange over the internet
TLS
Transport Layer Security (TLS)
- a cryptographic protocol that protects data sent over the internet by encrypting the connection between a client and a server
MAC
Message Authentication Code (MAC)
- a cryptographic technique used to verify the authenticity and integrity of a message
TPM
Trusted Platform Module (TPM)
- a specialized chip on a laptop or desktop computer that is designed to secure hardware with integrated cryptographic keys
HSM
Hardware Security Modules (HSM)
- are hardened, tamper-resistant hardware devices that secure cryptographic processes by generating, protecting, and managing keys used for encrypting and decrypting data and creating digital signatures and certificates
SHA
Secure Hashing Algorithm (SHA)
- a modified version of MD5 and used for hashing data and certificates
OID
Object Identifier (OID)
- a unique number that identifies a specific object or attribute in a directory
EFS
Encrypted File System (EFS)
- a Windows feature that encrypts files and folders to protect them from unauthorized access
SAN
Subject Alternative Name (SAN)
- a field in an X.509 certificate that allows multiple hostnames to be associated with a single public key
CVE
Common Vulnerabilities and Exposures (CVE)
- a list of publicly known cybersecurity vulnerabilities that affect software, hardware, and firmware
PEM
Privacy Enhanced Email (PEM)
- a set of standards that define how to secure emails and other data using encryption, digital signatures, and certificates
SAML
Security Assertion Markup Language (SAML)
- open federation standard that allows an identity provider (IdP) to authenticate users and then pass an authentication token to another application known as a service provider (SP)
RADIUS
Remote Authentication Dial-In User Service (RADIUS)
- client-server protocol enables remote access servers to communicate with a central server
SSL
Secure Socket Layer (SSL)
EAP
Extensible Authentication Protocol (EAP)
- an authentication framework that allows for the use of different authentication methods for secure network access technologies