Sec+ Acronyms + Definitions

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/133

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:30 AM on 2/16/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

134 Terms

1
New cards

AAA

Authentication, Authorization, and Accounting – A security framework that controls access to resources, verifies identity, and logs activity.

2
New cards

ACL

Access Control List – A list of rules that define permissions for accessing network resources.

3
New cards

AES

Advanced Encryption Standard – A symmetric encryption algorithm widely used for secure data encryption.

4
New cards

AH

Authentication Header – A component of IPSec that ensures integrity and authenticity of packets.

5
New cards

APT

Advanced Persistent Threat – A prolonged cyberattack where an attacker gains undetected access to a network.

6
New cards

ARP

Address Resolution Protocol – A protocol that maps IP addresses to MAC addresses.

7
New cards

ASLR

Address Space Layout Randomization – A security technique that randomizes memory addresses to prevent exploitation.

8
New cards

BCP

Business Continuity Planning – A strategy for maintaining operations during disruptions.

9
New cards

BIA

Business Impact Analysis – Identifies critical business functions and potential impacts of disruptions.

10
New cards

BIOS

Basic Input/Output System – Firmware that initializes hardware before the OS loads.

11
New cards

BYOD

Bring Your Own Device – A policy allowing employees to use personal devices at work.

12
New cards

CAC

Common Access Card – A smart card used for authentication in government networks.

13
New cards

CAPTCHA

Completely Automated Public Turing Test to Tell Computers and Humans Apart – A test to differentiate humans from bots.

14
New cards

CBC

Cipher Block Chaining – A mode of encryption that uses the previous ciphertext block for encryption.

15
New cards

CCMP

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol – A security protocol used in WPA2 for wireless encryption.

16
New cards

CCTV

Closed-Circuit Television – A video surveillance system used for security monitoring.

17
New cards

CHAP

Challenge Handshake Authentication Protocol – A protocol that verifies user identity through challenge-response authentication.

18
New cards

CIA

Confidentiality, Integrity, Availability – The core principles of cybersecurity.

19
New cards

CIRT

Computer Incident Response Team – A team that responds to security incidents.

20
New cards

CISO

Chief Information Security Officer – An executive responsible for an organization’s security strategy.

21
New cards

CSRF

Cross-Site Request Forgery – A web attack where an attacker tricks a user into making unauthorized requests.

22
New cards

CSP

Cloud Service Provider – A company that offers cloud-based services like storage, computing, and networking.

23
New cards

CSR

Certificate Signing Request – A request sent to a certificate authority to obtain a digital certificate.

24
New cards

CTF

Capture The Flag – A cybersecurity competition that challenges participants to solve security-related tasks.

25
New cards

CVSS

Common Vulnerability Scoring System – A standardized system for assessing the severity of security vulnerabilities.

26
New cards

DAC

Discretionary Access Control – A security model where owners set access permissions.

27
New cards

DDoS

Distributed Denial of Service – An attack that overwhelms a system with traffic.

28
New cards

DEP

Data Execution Prevention – A security feature that prevents code execution in certain memory areas.

29
New cards

DES

Data Encryption Standard – An outdated encryption algorithm replaced by AES.

30
New cards

DHCP

Dynamic Host Configuration Protocol – Assigns IP addresses to devices on a network.

31
New cards

DLP

Data Loss Prevention – A strategy to prevent unauthorized data transfers.

32
New cards

DMZ

Demilitarized Zone – A network segment that isolates public-facing services from an internal network.

33
New cards

DNS

Domain Name System – Translates domain names into IP addresses.

34
New cards

DoS

Denial of Service – An attack that disrupts system availability.

35
New cards

DRP

Disaster Recovery Plan – A plan to restore IT systems after a disaster.

36
New cards

DSA

Digital Signature Algorithm – A cryptographic algorithm used for digital signatures.

37
New cards

DSS

Digital Signature Standard – A federal standard for digital signatures.

38
New cards

EAP

Extensible Authentication Protocol – A framework that supports various authentication methods like passwords, biometrics, and certificates.

39
New cards

EDR

Endpoint Detection and Response – A security solution focused on detecting and responding to threats on devices like computers and smartphones.

40
New cards

EFS

Encrypting File System – A Windows feature for encrypting files on a computer.

41
New cards

EMS

Enterprise Mobility Suite – A suite of tools for managing mobile devices, apps, and data in an enterprise environment.

42
New cards

ERP

Enterprise Resource Planning – Software used to manage and automate core business processes.

43
New cards

FAR

False Acceptance Rate – The rate at which unauthorized users are incorrectly granted access in biometric systems.

44
New cards

FDE

Full Disk Encryption – The process of encrypting an entire disk to protect data at rest.

45
New cards

FIM

File Integrity Monitoring – A security process that checks for unauthorized changes to files.

46
New cards

FTP

File Transfer Protocol – A protocol for transferring files over a network.

47
New cards

GPO

Group Policy Object – A feature in Windows that defines user and computer configurations.

48
New cards

GPS

Global Positioning System – A satellite-based navigation system.

49
New cards

GRC

Governance, Risk, and Compliance – A framework for managing governance, risk, and compliance requirements in an organization.

50
New cards

HIDS

Host-Based Intrusion Detection System – A security system that monitors and analyzes the activity of a single host to detect suspicious behavior.

51
New cards

HMAC

Hash-Based Message Authentication Code – A mechanism for ensuring the integrity and authenticity of a message using a cryptographic hash function.

52
New cards

HOTP

HMAC-based One-Time Password – A one-time password algorithm based on HMAC.

53
New cards

HTTPS

Hypertext Transfer Protocol Secure – A secure version of HTTP that uses encryption (SSL/TLS) to protect data exchanged between a web server and client.

54
New cards

IAM

Identity and Access Management – A framework for managing digital identities and controlling access to resources.

55
New cards

ICMP

Internet Control Message Protocol – A protocol used for sending control messages, such as error reports and diagnostics, over an IP network.

56
New cards

IDS

Intrusion Detection System – A system that monitors network traffic for signs of malicious activity.

57
New cards

IEC

International Electrotechnical Commission – An international organization that develops standards for electrical, electronic, and related technologies.

58
New cards

IKE

Internet Key Exchange – A protocol used to set up a security association (SA) in the IPSec protocol suite.

59
New cards

IoT

Internet of Things – A network of physical devices that communicate and exchange data with each other over the internet.

60
New cards

IPSec

Internet Protocol Security – A suite of protocols used to secure network traffic through encryption and authentication.

61
New cards

IPv4

Internet Protocol version 4 – The fourth version of IP, widely used for assigning IP addresses.

62
New cards

IPv6

Internet Protocol version 6 – The latest version of IP that uses a larger address space than IPv4.

63
New cards

JIT

Just In Time – A software development and manufacturing approach that minimizes inventory and delays by producing items only when they are needed.

64
New cards

JWT

JSON Web Token – A compact, URL-safe token used to securely transmit information between parties as a JSON object.

65
New cards

KDC

Key Distribution Center – A server that manages keys for secure communication in Kerberos authentication.

66
New cards

KPI

Key Performance Indicator – A measurable value used to assess the success of an organization or project.

67
New cards

LAN

Local Area Network – A network that connects devices within a limited area, such as a home or office.

68
New cards

LDAP

Lightweight Directory Access Protocol – A protocol used to access and manage directory services, such as contact information in an organization.

69
New cards

LFI

Local File Inclusion – A vulnerability that allows attackers to include files from the local server on a website, leading to potential code execution.

70
New cards

LKM

Loadable Kernel Module – A piece of code that can be loaded into the kernel to add functionality to an operating system.

71
New cards

LOLBINs

Living Off the Land Binaries – Legitimate tools or software used maliciously for an attack.

72
New cards

MAC

Media Access Control / Mandatory Access Control – Media Access Control: A unique identifier for network interfaces. Mandatory Access Control: A security model that restricts access to resources based on predefined policies.

73
New cards

MD5

Message Digest 5 – A widely used cryptographic hash function, though considered insecure due to vulnerability to collisions.

74
New cards

MITM

Man In The Middle – An attack where an attacker intercepts and potentially alters communications between two parties.

75
New cards

MSSP

Managed Security Services Provider – A company that provides outsourced monitoring and management of security systems.

76
New cards

MFA

Multi-Factor Authentication – A security process where users provide two or more verification factors to gain access to a resource.

77
New cards

MPLS

Multi-Protocol Label Switching – A method for routing data in high-performance networks using labels instead of traditional IP routing.

78
New cards

NAC

Network Access Control – A security approach that regulates access to a network based on predefined policies.

79
New cards

NAT

Network Address Translation – A method used to modify IP address information in packet headers for routing purposes.

80
New cards

NIDS

Network Intrusion Detection System – A system that monitors network traffic for signs of malicious activity.

81
New cards

NIST

National Institute of Standards and Technology – A federal agency that develops standards and guidelines for cybersecurity.

82
New cards

NTFS

New Technology File System – A file system used by Windows operating systems to manage files on a disk.

83
New cards

OAuth

Open Authorization – An open standard for access delegation that allows users to grant third-party applications access to their resources without sharing passwords.

84
New cards

OCSP

Online Certificate Status Protocol – A protocol used to check the revocation status of an X.509 digital certificate in real-time.

85
New cards

OSINT

Open Source Intelligence – Intelligence gathered from publicly available sources, such as websites, social media, and public records.

86
New cards

OTP

One-Time Password – A password that is valid for only one login session or transaction, used for secure authentication.

87
New cards

P2P

Peer-to-Peer – A decentralized network model where each participant (peer) acts as both a client and server.

88
New cards

PBKDF2

Password-Based Key Derivation Function 2 – A cryptographic algorithm used to derive secure keys from a password, commonly used for password hashing.

89
New cards

PCI-DSS

Payment Card Industry Data Security Standard – A set of security standards designed to ensure that organizations handling card payments protect cardholder data.

90
New cards

PEAP

Protected Extensible Authentication Protocol – A secure method of authenticating wireless clients that encapsulates EAP within a TLS tunnel.

91
New cards

PKI

Public Key Infrastructure – A framework for managing digital keys and certificates for secure communications.

92
New cards

PIV

Personal Identity Verification – A federal government ID card used for identity verification and access control.

93
New cards

PoLP

Principle of Least Privilege – A security concept that ensures users and systems are only granted the minimum permissions necessary for their tasks.

94
New cards

PT

Penetration Testing – The practice of testing a system's security by simulating attacks to identify vulnerabilities.

95
New cards

PSA

Public Service Announcement – A message issued to inform the public about important matters.

96
New cards

PTA

Privacy Threshold Assessment – A process used to determine whether a system or project collects or uses personal data that requires protection.

97
New cards

QoS

Quality of Service – A set of techniques used to manage network resources and prioritize traffic to ensure high-quality service.

98
New cards

RADIUS

Remote Authentication Dial-In User Service – A protocol for authentication, authorization, and accounting for remote network access.

99
New cards

RAID

Redundant Array of Independent Disks – A technology used to combine multiple disk drives into a single unit for redundancy, performance, or both.

100
New cards

RBAC

Role-Based Access Control – A model for restricting access to resources based on users' roles within an organization.

Explore top flashcards

flashcards
¡Qué chévere! Unidad 6B
60
Updated 1196d ago
0.0(0)
flashcards
Exams (1, 2, & 3))
269
Updated 980d ago
0.0(0)
flashcards
Semester 2 exam
103
Updated 1030d ago
0.0(0)
flashcards
Ch. 7 Quiz
30
Updated 526d ago
0.0(0)
flashcards
Hindi
64
Updated 294d ago
0.0(0)
flashcards
Hartwell Math Vocabulary
90
Updated 175d ago
0.0(0)
flashcards
¡Qué chévere! Unidad 6B
60
Updated 1196d ago
0.0(0)
flashcards
Exams (1, 2, & 3))
269
Updated 980d ago
0.0(0)
flashcards
Semester 2 exam
103
Updated 1030d ago
0.0(0)
flashcards
Ch. 7 Quiz
30
Updated 526d ago
0.0(0)
flashcards
Hindi
64
Updated 294d ago
0.0(0)
flashcards
Hartwell Math Vocabulary
90
Updated 175d ago
0.0(0)